Abstract
Ethereum realizes the application of programs on the blockchain through smart contracts and the peer-to-peer transmission of nodes through consensus mechanisms. In this paper, through smart contracts, cache nodes and three-level cache mechanism are proposed, so that users can efficiently obtain contents through three-level cache in a large-scale network environment to speed up response and reduce network burden; what’s more, to ensure data integrity and accuracy in the untrusted public Ethereum blockchain, RSA&VT integrity verification methods are also introduced, and a large number of tree shapes are saved through IPFS under the chain structure to verify the content integrity, and only a small portion of the verification credentials and verification results are required to be transmitted in the network. Through experiments, it is proved that the request response time of the three-level caching mechanism is better than the ordinary FIFO cache; the performance of RSA&VT method is also better than the Signature scheme from bilinear maps.
Similar content being viewed by others
Data availability
No associated data.
References
Nakamoto, S., & Bitcoin, A. (2008). A peer-to-peer electronic cash system. Bitcoin. https://bitcoin.org/bitcoin.pdf, 4.
Pilkington, M. (2016). Blockchain technology: Principles and applications. Edward Elgar Publishing.
Samaniego, M., Jamsrandorj, U., & Deters, R. (2016). Blockchain as a Service for IoT. In 2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) (pp. 433–436). IEEE.
Vujičić, D., Jagodić, D., & Ranđić, S. (2018). Blockchain technology, bitcoin, and Ethereum: A brief overview. In 2018 17th international symposium infoteh-jahorina (infoteh) (pp. 1–6). IEEE.
Wessling, F., Ehmke, C., Hesenius, M., & Gruhn, V. (2018). How much blockchain do you need? Towards a concept for building hybrid dapp architectures. In 2018 IEEE/ACM 1st international workshop on emerging trends in software engineering for blockchain (WETSEB) (pp. 44–47). IEEE.
Tikhomirov S. (2017). Ethereum: State of knowledge and research perspectives. In International symposium on foundations and practice of security (pp. 206–221). Springer.
Xu, X., Zhang, X., Gao, H., Xue, Y., Qi, L., & Dou, W. (2020). BeCome: Blockchain-enabled computation offloading for IoT in mobile edge computing. IEEE Transactions on Industrial Informatics, 16(6), 4187–4195. https://doi.org/10.1109/TII.2019.2936869
Li, C., Liang, S., Zhang, J., Wang, Q. E., & Luo, Y. (2022). Blockchain-based data trading in edge-cloud computing environment. Information Processing and Management, 59(1), 102786.
Cui, L., Xiaoxin, S., Ming, Z., Chen, Z., Yang, S., Zhou, Y., & Xiao, W. (2022). CREAT: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3014370
Wang, W., Niyato, D., Wang, P., & Leshem, A. (2018). Decentralized caching for content delivery based on Blockchain: A game theoretic perspective. In 2018 IEEE international conference on communications (ICC) (pp. 1–6). Doi: https://doi.org/10.1109/ICC.2018.8422547.
Liu, J., Guo, S., Shi, Y., Feng, L., & Wang, C. (2020). Decentralized caching framework toward edge network based on blockchain. IEEE Internet of Things Journal, 7(9), 9158–9174. https://doi.org/10.1109/JIOT.2020.3003700
Li, C., Qianqian, C., & Luo, Y. (2022). Low-latency edge cooperation caching based on base station cooperation in SDN based MEC. Expert Systems with Applications, 191, 116252.
Zheng, Q., Xu, S., & Ateniese, G. (2014) VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In IEEE INFOCOM 2014-IEEE conference on computer communications. (pp. 522–530). IEEE.
Fan, Y., & Liu, Z. (2017). Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting. In 2017 IEEE second international conference on data science in cyberspace (DSC). (pp. 441–449). IEEE.
Yin, H., Zhang, J., Xiong, Y., Ou, L., Li, F., Liao, S., & Li, K. (2019). CP-ABSE: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access, 7, 5682–5694.
Guo, L., Xie, H., & Li, Y. (2020). Data encryption based blockchain and privacy preserving mechanisms towards big data. Journal of Visual Communication and Image Representation, 70, 102741.
Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32–45.
Aydar, M., Cetin, S. C., Ayvaz, S., & Aygun, B. (2019). Private key encryption and recovery in blockchain. arXiv preprint arXiv:1907.04156
Yan, X., Yuan, X., Ye, Q., & Tang, Y. (2020). Blockchain-based searchable encryption scheme with fair payment. IEEE Access, 8, 109687–109706. https://doi.org/10.1109/ACCESS.2020.3002264
Li, C., Zhang, Y., & Luo, Y. (2022). Intermediate data placement and cache replacement strategy under Spark platform. Journal of Parallel and Distributed Computing, 163, 114–135.
He, Y., Wang, H., Li, Y., Huang, K., Leung, V. C., Yu, F. R., & Ming, Z. (2022). An efficient ciphertext-policy attribute-based encryption scheme supporting collaborative decryption with blockchain. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2021.3099171
Li, C., Cai, Q., & Lou, Y. (2022). Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud. Future Generation Computer Systems, 127, 142–159.
Blum, M., Evans, W., Gemmell, P., Kannan, S., & Naor, M. (1994). Checking the correctness of memories. Algorithmica, 12(2), 225–244.
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007) Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security (pp. 598–609).
Xue, J., Xu, C., Zhao, J., & Ma, J. (2019). Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Science China Information Sciences, 62(3), 32104.
Machado, C., & Medeiros Fröhlich, A. A. (2018). IoT data integrity verification for cyber-physical systems using blockchain. In 2018 IEEE 21st international symposium on real-time distributed computing (ISORC) (pp. 83–90). Doi: https://doi.org/10.1109/ISORC.2018.00019
Yue, D., Li, R., Zhang, Y., Tian, W., & Peng, C. (2018). Blockchain based data integrity verification in P2P cloud storage. In 2018 IEEE 24th international conference on parallel and distributed systems (ICPADS), (pp. 561–568). Doi: https://doi.org/10.1109/PADSW.2018.8644863.
Zhu, Y., Wang, H., Hu, Z., Ahn, G. J., Hu, H. & Yau, S. S. (2011). Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceedings of the 2011 ACM symposium on applied computing (pp 1550–1557).
Zhao, Q., Chen, S., Liu, Z., Baker, T., & Zhang, Y. (2020). Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management, 57(6), 102355.
Milanov, E. (2009). The RSA algorithm. RSA Laboratories, 1–11.
Nikravan, M., & Reza, A. (2020). A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Personal Communications, 111(1), 463–494.
Li, C., Zhang, Y., Gao, X., & Luo, Y. (2022). Energy-latency tradeoffs for edge caching and dynamic service migration based on DQN in mobile edge computing. Journal of Parallel and Distributed Computing, 166, 15–31.
Acknowledgements
The work was supported by the Open Fund of Key Laboratory of Hydraulic and Waterway Engineering of the Ministry of Education, Chongqing Jiaotong University under grants (SLK2021A01), the Open Fund of Jiangsu Key Laboratory of information agriculture of Jiangsu Province, the Open Research Fund Program of Key Laboratory of Knowledge Mining and Knowledge Services in Agricultural Converging Publishing, National Press and Publication Administration (2022KMKS01).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, Q., Li, C., Du, T. et al. Multi-level caching and data verification based on ethereum blockchain. Wireless Netw 29, 713–727 (2023). https://doi.org/10.1007/s11276-022-03151-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-03151-1