Skip to main content

BCSolid: A Blockchain-Based Decentralized Data Storage and Authentication Scheme for Solid

  • Conference paper
  • First Online:
Blockchain and Trustworthy Systems (BlockSys 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1156))

Included in the following conference series:

Abstract

Solid (Social Linked Data) aims to radically change the way web applications work today, giving users true data ownership and improved privacy. However, it is facing two challenges, one is that data in centralized repositories needs to be separated from social web applications that force users to share their information. In addition, a decentralized authentication that guarantees who can operate on user’s data with a secure privacy protection is another significant issue. In this paper, we address these challenges by proposing a blockchain-based decentralized data storage and authentication scheme for Solid, termed BCSolid, in which a user’s data can be independent of multiple web applications and can switch data storage service easily without relying on a trusted third party. Meanwhile, our scheme gurantees data ownership and user’s privacy by leveraging the blockchain miners to perform authentication with the help of certificateless cryptography. Additionally, we present a possible instantiation to illustrate how “transactions” in BCSolid are processed. To our knowledge this is the first work to promote the Solid project using blockchain. The evaluation results show that our scheme can gurantee a low latency network and is a promising solution to Solid.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sambra, A., Guy, A., Capadisli, S., Greco, N.: Building decentralized applications for the social Web. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 1033–1034. International World Wide Web Conferences Steering Committee. ACM (2016)

    Google Scholar 

  2. Mansour, E., et al.: A demonstration of the solid platform for social web applications. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 223–226. International World Wide Web Conferences Steering Committee. ACM (2016)

    Google Scholar 

  3. Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)

    Article  Google Scholar 

  4. Thompson, M.R., Essiari, A., Mudumbai, S.: Certificate-based authorization policy in a PKI environment. ACM Trans. Inf. Syst. Secur. (TISSEC) 6(4), 566–588 (2003)

    Article  Google Scholar 

  5. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)

    Article  MathSciNet  Google Scholar 

  6. Chen, W., et al.: Cooperative and distributed computation offloading for blockchain-empowered industrial internet of things. IEEE Internet Things J. 6(5), 8433–8446 (2019)

    Article  Google Scholar 

  7. Qiu, X., Liu, L., Chen, W., Hong, Z., Zheng, Z.: Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing. IEEE Trans. Veh. Technol. 68(8), 8050–8062 (2019)

    Article  Google Scholar 

  8. Zhang, Y., Deng, R., Zheng, D., Li, J., Wu, P., Cao, J.: Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Trans. Ind. Inform. 15(9), 5099–5108 (2019)

    Article  Google Scholar 

  9. Rafiq, Y., Dickens, L., Russo, A., Bandara, A.K., Yang, M., Stuart, A.: Learning to share: engineering adaptive decision-support for online social networks. In: Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pp. 280–285. IEEE (2017)

    Google Scholar 

  10. Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 15(5), 840–852 (2018)

    Article  Google Scholar 

  11. Gayathri, N.B., Thumbur, G., Kumar, P.R., Rahman, M.Z.U., Reddy, P.V.: Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J. 6(5), 9064–9075 (2019)

    Article  Google Scholar 

  12. Zhang, F., Eyal, I., Escriva, R., Juels, A., Van Renesse, R.: \(\{\)REM\(\}\): resource-efficient mining for blockchains. In: 26th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 2017), pp. 1427–1444. ACM (2017)

    Google Scholar 

  13. Halevi, S., Hazay, C., Polychroniadou, A., Venkitasubramaniam, M.: Round-optimal secure multi-party computation. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10992, pp. 488–520. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96881-0_17

    Chapter  Google Scholar 

  14. Zou, S., Liang, Y., Lai, L., Shamai, S.: An information theoretic approach to secret sharing. IEEE Trans. Inf. Theory 61(6), 3121–3136 (2015)

    Article  MathSciNet  Google Scholar 

  15. Chen, W.H., Fan, C.I., Tseng, Y.F.: Efficient key-aggregate proxy re-encryption for secure data sharing in clouds. In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1–4. IEEE (2018)

    Google Scholar 

Download references

Acknowledgments

The work described in this paper was supported by the National Key Research and Development Plan (2018YFB1003800), the National Natural Science Foundation of China (61802450), the Natural Science Foundation of Guangdong (2018A030313005), the Program for Guangdong Introducing Innovative and Entrepreneurial Teams (2017ZT07X355) and the Science and Technology Research Program of Chongqing Municipal Education Commission (KJZD-K201802401).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wuhui Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cai, T., Chen, W., Yu, Y. (2020). BCSolid: A Blockchain-Based Decentralized Data Storage and Authentication Scheme for Solid. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_55

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-2777-7_55

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-2776-0

  • Online ISBN: 978-981-15-2777-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics