Skip to main content

Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing

  • Conference paper
  • First Online:
Science of Cyber Security (SciSec 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11933))

Included in the following conference series:

  • 857 Accesses

Abstract

This paper proposes a distributed data anonymous storage and transaction protocol that discards the centralized architecture and distributes the computational pressure to each edge device through blockchain and edge computing. In addition, a pseudo-identity-based data anonymous storage scheme is designed based on ElGamal cryptosystem, and the anonymous transaction scheme based on ECDLP and blinding signature allows sellers and buyers to directly trade through the blockchain. The protocol proposed in this paper effectively guarantees the security of data storage and the anonymity of data transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)

    Google Scholar 

  2. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  3. Fernández-Caramés, T.M., Fraga-Lamas, P.: A review on the use of blockchain for the Internet of Things. IEEE Access 6, 32979–33001 (2018)

    Article  Google Scholar 

  4. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)

    Google Scholar 

  5. Yeow, K., Gani, A., Ahmad, R.W., Rodrigues, J.J., Ko, K.: Decentralized consensus for edge-centric internet of things: A review, taxonomy, and research issues. IEEE Access 6, 1513–1524 (2017)

    Article  Google Scholar 

  6. Xu, Q., Aung, K.M.M., Zhu, Y., Yong, K.L.: A blockchain-based storage system for data analytics in the internet of things. In: Yager, R., Pascual Espada, J. (eds.) New Advances in the Internet of Things. SCI, vol. 715, pp. 119–138. Springer, Cham (2018)

    Chapter  Google Scholar 

  7. Li, R., Song, T., Mei, B., Li, H., Cheng, X., Sun, L.: Blockchain for large-scale internet of things data storage and protection. IEEE Trans. Serv. Comput. (2018)

    Google Scholar 

  8. Wang, T., Zhou, J., Liu, A., Bhuiyan, M.Z.A., Wang, G., Jia, W.: Fog-based computing and storage offloading for data synchronization in IoT. IEEE Internet Things J. (2018)

    Google Scholar 

  9. Liu, J., Li, B., Chen, L., Hou, M., Xiang, F., Wang, P.: A data storage method based on blockchain for decentralization DNS. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 189–196. IEEE (2018)

    Google Scholar 

  10. Li, Z., Yang, Z., Xie, S., Chen, W., Liu, K.: Credit-based payments for fast computing resource trading in edge-assisted internet of things. IEEE Internet Things J. (2019)

    Google Scholar 

  11. Nagato, T., Tsutano, T., Kamada, T., Takaki, Y., Ohta, C.: Distributed key-value storage for edge computing and its explicit data distribution method. In:  2019 International Conference on Information Networking (ICOIN), pp. 147–152. IEEE (2019)

    Google Scholar 

  12. Tsiounis, Y., Yung, M.: On the security of ElGamal based encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054019

    Chapter  Google Scholar 

  13. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA).  Int. J. Inform. Secur. 1, 36–63 (2001)

    Article  Google Scholar 

  14. Merkle, R.C.: Protocols for public key cryptosystems. In: 1980 IEEE Symposium on Security and Privacy, p. 122. IEEE (1980)

    Google Scholar 

  15. Kaashoek, M.F., Karger, D.R.: Koorde: a simple degree-optimal distributed hash table. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735, pp. 98–107. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45172-3_9

    Chapter  Google Scholar 

Download references

Funding

The funding that Humanities and Social Science Research Planning Fund of the Education Ministry of China under grant No. 15YJCZH201.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi Qiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qiao, Z., Zhu, C., Wang, Z., Yang, N. (2019). Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge Computing. In: Liu, F., Xu, J., Xu, S., Yung, M. (eds) Science of Cyber Security. SciSec 2019. Lecture Notes in Computer Science(), vol 11933. Springer, Cham. https://doi.org/10.1007/978-3-030-34637-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34637-9_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34636-2

  • Online ISBN: 978-3-030-34637-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics