Blockchain-Enabled Decentralized Trust Management and Secure Usage Control of IoT Big Data

With the fast development of Internet-of-Things (IoT) technologies, IoT big data and its applications are getting more and more useful. However, traditional IoT data management is fragile and vulnerable. Once the gathered data are untrusted or the stored data are tampered with deliberately from the internal users or attacked by an external hacker, then the tampered data have a serious problem to be utilized. To solve the problems of trust and security of IoT big data management, in this article, we propose a permissioned blockchain-based decentralized trust management and secure usage control scheme of IoT big data (called BlockBDM), upon which all the data operations and management, such as data gathering, invoking, transfer, storage, and usage, are processed over the blockchain smart contract. To encourage the IoT client to supply high-quality content, in our scheme, we design public-blockchain-based tokens reward mechanism for the high-quality data supply contribution. All the data processing and usage procedure can be recorded in a cryptography-signed and Merkle tree-based transaction(s) and block(s) with high-level security in a global and distributed ledger with tamper resistance. For data utilization and consumption, we propose secure usage control for digital rights management and token-based data consumption approach of high-value data from being violated or spread without any limitation. We implemented the BlockBDM scheme based on public and permissioned blockchain for IoT big data management. Finally, a large amount of evaluation manifests that the proposed BlockBDM scheme is feasible, secure, and scalable for decentralized trust management of IoT big data.

[1]  Laurence T. Yang,et al.  Privacy-Preserving Tensor-Based Multiple Clusterings on Cloud for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.

[2]  Khaled Salah,et al.  Decentralized document version control using ethereum blockchain and IPFS , 2019, Comput. Electr. Eng..

[3]  Bharadwaj Veeravalli,et al.  Blockchain-based decentralized content trust for docker images , 2017, Multimedia Tools and Applications.

[4]  Gang Chen,et al.  Untangling Blockchain: A Data Processing View of Blockchain Systems , 2017, IEEE Transactions on Knowledge and Data Engineering.

[5]  S. Ganapathy,et al.  A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications , 2019, Comput. Networks.

[6]  Jiankun Hu,et al.  Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.

[7]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[8]  Yun Liu,et al.  Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing , 2018, IEEE Transactions on Industrial Informatics.

[9]  Zhen Wang,et al.  Blockchain for digital rights management , 2018, Future Gener. Comput. Syst..

[10]  Keke Gai,et al.  Blockchain-Enabled Reengineering of Cloud Datacenters , 2018, IEEE Cloud Computing.

[11]  Jie Xu,et al.  Differentially-Private and Trustworthy Online Social Multimedia Big Data Retrieval in Edge Computing , 2019, IEEE Transactions on Multimedia.

[12]  Liqun Chen,et al.  Identity based authenticated key agreement protocols from pairings , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..

[13]  Issa M. Khalil,et al.  An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data Mobility , 2019, IEEE Access.

[14]  Wei Ni,et al.  Survey on blockchain for Internet of Things , 2019, Comput. Commun..

[15]  Jinjun Chen,et al.  Secure Tensor Decomposition for Big Data Using Transparent Computing Paradigm , 2019, IEEE Transactions on Computers.

[16]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[17]  Thar Baker,et al.  The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey , 2019, Sensors.

[18]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[19]  Anirban Basu,et al.  On blockchain-based anonymized dataset distribution platform , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).

[20]  Paolo Tasca,et al.  Blockchain Technologies: The Foreseeable Impact on Society and Industry , 2017, Computer.

[21]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[22]  Mohsen Guizani,et al.  Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.

[23]  Amir Herzberg,et al.  Blockchain Access Privacy: Challenges and Directions , 2018, IEEE Security & Privacy.

[24]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1983, PODS '83.

[25]  Xu An Wang,et al.  Improved functional proxy re-encryption schemes for secure cloud data sharing , 2018, Comput. Sci. Inf. Syst..

[26]  Chen Chen,et al.  Efficient and secure big data storage system with leakage resilience in cloud computing , 2018, Soft Comput..

[27]  Xiang-Yang Li,et al.  AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers , 2019, IEEE Transactions on Information Forensics and Security.

[28]  Wenfen Liu,et al.  Forward and backward secure fuzzy encryption for data sharing in cloud computing , 2019, Soft Comput..

[29]  Xiaojiang Du,et al.  Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach , 2019, IEEE Network.

[30]  Soohyung Kim,et al.  Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[31]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[32]  Che-Lun Hung,et al.  A multi-layer information dispersal based encryption algorithm and its application for access control , 2018, Sustain. Comput. Informatics Syst..

[33]  F. Richard Yu,et al.  Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.