Skip to main content

Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing

  • Conference paper
  • First Online:
Security and Privacy in Digital Economy (SPDE 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1268))

Included in the following conference series:

  • 1753 Accesses

Abstract

As an attractive cloud computing model, outsourcing computation often has a fair payment issues. In cloud computing, resource-constrained users outsource tasks and pay for them. However, the traditional outsourcing computation model can hardly resist the threat of collusion between calculators. In this paper, we propose a new scheme of Bitcoin-based anti-collusion fair payments for outsourcing computations (BAPay), give the architecture of BAPay, security requirements, and describe the design details. Besides, the scheme guarantees that an honest calculator will be paid for doing the calculations, regardless of the outsourcer’s behaviour. In addition, the security analysis shows that BAPay achieves completeness and fairness.

This work is supported by the Key Projects of the Joint Fund of the National Natural Science Foundation of China (No. U1836205); the National Natural Science Foundation of China (No. 61662009, No. 61772008); the Guizhou Province Science and Technology Major Special Plan (No. 20183001); the Research on Key Technologies of Blockchain for Big Data Applications (No. [2019]1098); the Foundation of Postgraduate of Guizhou Province (No. YJSCXJH2019015).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, Y.H., Deng, R., Liu, X.M., Zhang, D.: Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462, 262–277 (2018)

    Article  MathSciNet  Google Scholar 

  2. Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  3. Huang, Z., Liu, S., Mao, X., Chen, K., Li, J.: Insight of the protection for data security under selective opening attacks. Inf. Sci. 412, 223–241 (2017)

    Article  Google Scholar 

  4. Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1–12 (2018)

    Article  Google Scholar 

  5. Zhang, Y., Li, J., Chen, X., Li, H.: Anonymous attribute-based proxy reencryption for access control in cloud computing. Secur. Commun. Netw. 9(14), 2397–2411 (2016)

    Article  Google Scholar 

  6. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)2007, pp. 598–609. ACM (2007). https://doi.org/10.1007/978-1-59593-703-2/07/0011

  7. Chen, X., Li, J., Huang, X., Ma, J., Lou, W.: New publicly verifiable databases with efficient updates. IEEE Trans. Dependable Secure Comput. 12(5), 546–556 (2015)

    Article  Google Scholar 

  8. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  9. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy 2015, San Jose, USA, pp. 104–121 (2015). https://doi.org/10.1109/SP.2015.14

  10. Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. In: IEEE Symposium on Security and Privacy(SP)2014, San Jose, USA, pp. 443–458 (2014). https://doi.org/10.1109/SP.2014.35

  11. Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, Ł.: Fair two-party computations via bitcoin deposits. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105–121. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_8

    Chapter  Google Scholar 

  12. Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421–439. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44381-1_24

    Chapter  Google Scholar 

  13. Golle, P., Stubblebine, S.: Secure distributed computing in a commercial environment. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 289–304. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-46088-8_23

    Chapter  Google Scholar 

  14. Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425–440. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45353-9_31

    Chapter  Google Scholar 

  15. Szajda, D., Lawson, B., Owen, J.: Hardening functions for large scale distributed computations. In: Symposium on Security and Privacy 2003, Berkeley, USA, pp. 216–224 (2003). https://doi.org/10.1109/SECPRI.2003.1199338

  16. Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener. Comput. Syst. 18(4), 561–572 (2002)

    Article  Google Scholar 

  17. Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable grid computing. In: Proceedings of the 24th International Conference on Distributed Computing, Systems, ICDCS 2004, pp. 4–11. IEEE Computer Society (2004). https://doi.org/10.1109/ICDCS.2004.1281562

  18. Monrose, F., Wyckoff, P., Rubin, A. D.: Distributed execution with remote audit. In: Proceedings of the 1999 ISOC Network and Distributed System Security Symposium (NDSS) 1999, San Diego, pp. 103–113 (1999)

    Google Scholar 

  19. Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14623-7_25

    Chapter  Google Scholar 

  20. Carbunar, B., Tripunitara, M.V.: Payments for outsourced computations. IEEE Trans. Parallel Distrib. Syst. 23(2), 313–320 (2012)

    Article  Google Scholar 

  21. Chen, X., Li, J., Susilo, W.: Efficient fair conditional payments for outsourcing computations. IEEE Trans. Inf. Forensics Secur. 7(6), 1687–1694 (2012)

    Article  Google Scholar 

  22. Dong, C., Wang, Y., Aldweesh, A., McCorry, P., Moorsel, A.: Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) 2017, pp. 211–227. ACM (2001). arXiv:1708.01171v4

  23. Huang, H., Chen, X., Wu, Q., Huang, X., Shen, J.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78, 850–858 (2018)

    Article  Google Scholar 

  24. Chen, X., Li, J., Ma, J., Lou, W., Wong, D.S.: New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37, 252–258 (2014)

    Article  Google Scholar 

  25. Zhang, Y., Deng, R., Liu, X., Zheng, D.: Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans. Serv. Comput. 8(7), 1–14 (2018)

    Google Scholar 

  26. Ding, J., Yu, N., Lin, X., Zhang, W.: A private information retrieval and payment protocol based on bitcoin. Inf. Secur. 4(06), 1–9 (2019)

    Google Scholar 

  27. Quick, D., Choo, K.R.: Digital droplets: microsoft skydrive forensic data remnants. Future Gener. Comput. Syst. 29(6), 1378–1394 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Youliang Tian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, D., Zhang, X., Gao, S., Tian, Y. (2020). Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics