Skip to main content

Liberate Your Servers: A Decentralized Content Compliance Validation Protocol

  • Conference paper
  • First Online:
Data and Applications Security and Privacy XXXVI (DBSec 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13383))

Included in the following conference series:

  • 704 Accesses

Abstract

Content compliance validation provides a formal and secure procedure for applications (like emails or social networks) to determine how an intended action can be carried out. By conducting the validation against predefined policies, only compliant content is allowed to be delivered. Unfortunately, current solutions suffer from multiple issues such as intensive server-side overheads, intransparency and centralization.

To address these drawbacks, we propose DeCCV, the first decentralized content compliance validation protocol for real-world applications. In our work, the application requires to transparently declare its validation policies (\({{\textbf {Policy}}^\textsf {Cont}_\textsf {VAL}}\)) on the blockchain. Meanwhile, we outsource the resource-intensive validations to multiple decentralized off-chain validation nodes, which verify user’s content locally and issue the proofs (signatures) accordingly. Therefore, the burden of server-end workloads is minimized to merely signature-based verification. Moreover, a dedicated incentive mechanism is proposed to motivate high accountability of validation participants. DeCCV is platform-friendly that can be compatible with most real-world applications. We fully implement DeCCV for Gmail, Twitter and Dropbox to show its versatility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    This consideration has been widely adopted in the trusted oracles [6, 7, 9] selection process in many Decentralized Finance (DeFi) platforms. As each reputable node is registered into \({{\textbf {Contr}}_\textsf {App}}\), the platform users can be aware of its identity.

  2. 2.

    Every public key is registered and stored on \({{\textbf {Contr}}_\textsf {App}}\) at initialization.

  3. 3.

    \({{\textbf {Proof}}_\textsf {Dispute}}\) includes one single signature of disputer.

References

  1. Vulnerability in TLS 1.2 (2014). https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3566

  2. Youtube loophole (2017). https://www.bbc.com/news/technology-38652906

  3. Detoxify (2020). https://github.com/unitaryai/detoxify

  4. Machine learning based tools (2020). https://bit.ly/31fsn6K

  5. Nsfw content detection (2020). https://github.com/GantMan/nsfw_model

  6. Tellor network (2020). https://tellor.io/

  7. Uniswap (2020). https://uniswap.org/

  8. Virus detection tools (2020). https://bit.ly/3EYIrJl

  9. Chainlink (2021). https://chain.link/

  10. Clamav (2021). https://www.clamav.net/

  11. Gmail rules (2021). https://support.google.com/a/answer/2364580?hl=en

  12. Google YouTube validation process (2021). https://bit.ly/3Eya77E

  13. How YouTube validates your video (2021). https://bit.ly/3CE6DPp

  14. The node-localstorage package (2021). https://www.npmjs.com/package/node-localstorage

  15. Solidity language (2021). https://docs.soliditylang.org/en/v0.4.24/

  16. Truffle testnet (2021). https://www.trufflesuite.com/

  17. Twitter (2021). https://twitter.com/home

  18. Twitter’s non-compliance (2021). https://bit.ly/3kLUhP3

  19. Web3.js library (2021). https://web3js.readthedocs.io/en/v1.5.2/

  20. Aes-gcm-256 (2022). https://en.wikipedia.org/wiki/Galois/Counter_Mode

  21. Binance smart chain (2022). https://docs.binance.org/

  22. Dropbox (2022). https://www.dropbox.com/

  23. Ecdh key exchange (2022). https://en.wikipedia.org/wiki/Elliptic-curve_Diffie%E2%80%93Hellman

  24. Ethereum (2022). https://ethereum.org/en/

  25. Google detects email malware (2022). https://support.google.com/a/answer/9157861?hl=en

  26. Polkadot (2022). https://polkadot.network/

  27. Polygon (2022). https://polygon.technology/

  28. Reference (2022). https://bit.ly/3NWMrPc

  29. Baron, J., Defrawy, K.E., Lampkins, J., Ostrovsky, R.: Communication-optimal proactive secret sharing for dynamic groups. In: Malkin, T., Kolesnikov, V., Lewko, A.B., Polychronakis, M. (eds.) ACNS 2015. LNCS, vol. 9092, pp. 23–41. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-28166-7_2

    Chapter  Google Scholar 

  30. Bowers, K.D., Juels, A., et al.: HAIL: a high-availability and integrity layer for cloud storage. In: ACM Conference on Computer and Communications Security (2009)

    Google Scholar 

  31. Buterin, V.: Ethereum: a next-generation smart contract and decentralized application platform (2013)

    Google Scholar 

  32. Cheng, R., Zhang, F., Kos, J., He, W., Hynes, N., et al.: Ekiden: a platform for confidentiality-preserving, trustworthy, and performant smart contracts. In: IEEE European Symposium on Security and Privacy (2019)

    Google Scholar 

  33. Choudhuri, A.R., Green, M., Jain, A., Kaptchuk, G., Miers, I.: Fairness in an unfair world: fair multiparty computation from public bulletin boards. In: ACM Conference on Computer and Communications Security (2017)

    Google Scholar 

  34. Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptology ePrint (2016)

    Google Scholar 

  35. Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2 (2008)

    Google Scholar 

  36. Haakegaard, R., Lang, J.: The elliptic curve Diffie-Hellman (ECDH) (2015). https://koclab.cs.ucsb.edu/teaching/ecc/project/2015Projects/Haakegaard+Lang.pdf

  37. Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or: how to cope with perpetual leakage. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 339–352. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-44750-4_27

    Chapter  Google Scholar 

  38. Kumaresan, R., Bentov, I.: Amortizing secure computation with penalties. In: ACM Conference on Computer and Communications Security (2016)

    Google Scholar 

  39. Liu, B., Sun, S., Szalachowski, P.: SMACS: smart contract access control service. In: IEEE/IFIP Conference on Dependable Systems and Networks (2020)

    Google Scholar 

  40. Maram, S.K.D., et al.: CHURP: dynamic-committee proactive secret sharing. In: ACM Conference on Computer and Communications Security (2019)

    Google Scholar 

  41. Ostrovsky, R., Yung, M.: How to withstand mobile virus attacks. In: ACM Symposium on Principles of Distributed Computing (1991)

    Google Scholar 

  42. Rescorla, E., Dierks, T.: The transport layer security (TLS) protocol version 1.3 (2018)

    Google Scholar 

  43. Schultz, D.A., Liskov, B., Liskov, M.: Mobile proactive secret sharing. In: ACM Symposium on Principles of Distributed Computing (2008)

    Google Scholar 

  44. Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Post-quantum authentication in TLS 1.3: a performance study. Cryptology ePrint Archive (2020)

    Google Scholar 

  45. Zyskind, G., Nathan, O., et al.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops (2015)

    Google Scholar 

Download references

Acknowledgment

We thank the anonymous reviewers for their valuable comments. This work is supported by the Ministry of Education, Singapore, under the MOE AcRF Tier 2 grant (MOE2018-T2-1-111).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bowen Liu .

Editor information

Editors and Affiliations

Appendices

A Detailed Interactions of DeCCV

The detailed interactions among system participants are shown in Fig. 3. The numbered procedures correspond with the high-level interactions (described in Fig. 1). Note that the transmitted data objects between protocol actors are encrypted over a secure channel. Meanwhile, the incentive interfaces, including penalties, disputes and payouts etc., are not depicted in Fig. 3 as these actions can be triggered whenever any misbehavior is detected.

B Secure Communication Handshake Performance

DeCCV purses a confidentiality-preserving tunnel, and we utilize the latest version of TLS in our experiments. As discussed in Sect. 2.2, a full handshake process is divided into key exchange phase and authentication phase. In our experiment, the time consumption of these two procedures is 487ms and 671ms, respectively. Note that TLS is not the only design choice in practical for achieving transport protection. In Appendix C.1, we will discuss the considerations towards more design choices of communication protection.

C Discussions

In this section, we provide the discussions with respect to transport protection, a future direction toward a more fine-grained economic reward mechanism, and the generalizability of our protocol.

Fig. 3.
figure 3

The interactions of DeCCV.

1.1 C.1 Secure Communication Design Choices

In DeCCV, we adopt TLS protocol as a channel protection method among system parties. In practice, the feasible approaches are not limited to it. For instance, a dynamic secret sharing scheme [29, 30, 37, 40, 41, 43] is regarded as an alternative that DeCCV can employ a recently proposed secret sharing scheme [40] for communication encryption. Concretely, with dynamical secret sharing, \({{\textbf {App}}}\) can first generate a key pair (\({pk_{\textsf {Apps}}}\), \({sk_{\textsf {Apps}}}\)), hardcode \({pk_{\textsf {Apps}}}\) into the blockchain for an arbitrary user to encrypt his content, and distribute the associated \({sk_{\textsf {Apps}}}\) to the key management committee members (i.e., a dedicated group of committee members to withhold the key). Once receiving an encrypted content from a user, each \({{\textbf {Node}}_\textsf {VAL}}\) will contact key management committees, then recover the \({sk_{\textsf {Apps}}}\), and decrypt the content for validation. We emphasize that secret sharing is seen as an alternative approach for transport protection. In particular, the proposed incentive mechanism could also applied to those key management members. In terms of performance, TLS is more resource-efficient when the number of key management members is beyond four. Moreover, since \({{\textbf {Node}}_\textsf {VAL}}\) and key management committees involve massive communications, TLS is deemed a more secure approach. We will keep track on the emergence of more effective transport protection schemes.

1.2 C.2 Towards A Fine-Grained Reward Design

Recall Sect. 5.2, with the increase in the number of registration, \({{\textbf {Node}}_\textsf {VAL}}\) would compete against each other to provide better validation services. Currently, we set the amount of rewards for each honest behavior as a fixed value. One possible improvement is making such the mechanism more fine-grained. For instance, as the computation consumption should vary in the size of user’s contents and the complexity of App’s policies, we could link the amount of reward to the size of requested content and the workloads of policy validations. More interestingly, \({{\textbf {App}}}\) and \({{\textbf {Node}}_\textsf {VAL}}\) could transparentize their reward fees and service commissions, respectively, which would create a better service market. We will leave such the design direction as future work.

1.3 C.3 Generalizability

In Appendix C.1, different techniques for transport protection are able to be switched in our system based on the security and performance considerations. In addition, we stress that DeCCV is platform-agnostic with regards to blockchains and real-world applications. Although \({{\textbf {Contr}}_\textsf {App}}\) is deployed on Ethereum platform in our experiments, the policy declaration and incentive design can be easily implemented on other blockchains that have similar smart contract capabilities [21, 26, 27]. Meanwhile, any real-world application which requires regulating the delivered contents can take advantage of DeCCV to filter out non-compliant contents. All an \({{\textbf {App}}}\) owner needs to do is policy declaration and smart contract deployment. We expect to see the possibility of collaboration with more real-world companies.

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, B., Zhou, J. (2022). Liberate Your Servers: A Decentralized Content Compliance Validation Protocol. In: Sural, S., Lu, H. (eds) Data and Applications Security and Privacy XXXVI. DBSec 2022. Lecture Notes in Computer Science, vol 13383. Springer, Cham. https://doi.org/10.1007/978-3-031-10684-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-10684-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-10683-5

  • Online ISBN: 978-3-031-10684-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics