Skip to main content
Log in

Multi-level caching and data verification based on ethereum blockchain

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Ethereum realizes the application of programs on the blockchain through smart contracts and the peer-to-peer transmission of nodes through consensus mechanisms. In this paper, through smart contracts, cache nodes and three-level cache mechanism are proposed, so that users can efficiently obtain contents through three-level cache in a large-scale network environment to speed up response and reduce network burden; what’s more, to ensure data integrity and accuracy in the untrusted public Ethereum blockchain, RSA&VT integrity verification methods are also introduced, and a large number of tree shapes are saved through IPFS under the chain structure to verify the content integrity, and only a small portion of the verification credentials and verification results are required to be transmitted in the network. Through experiments, it is proved that the request response time of the three-level caching mechanism is better than the ordinary FIFO cache; the performance of RSA&VT method is also better than the Signature scheme from bilinear maps.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

No associated data.

References

  1. Nakamoto, S., & Bitcoin, A. (2008). A peer-to-peer electronic cash system. Bitcoin. https://bitcoin.org/bitcoin.pdf, 4.

  2. Pilkington, M. (2016). Blockchain technology: Principles and applications. Edward Elgar Publishing.

    Google Scholar 

  3. Samaniego, M., Jamsrandorj, U., & Deters, R. (2016). Blockchain as a Service for IoT. In 2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) (pp. 433–436). IEEE.

  4. Vujičić, D., Jagodić, D., & Ranđić, S. (2018). Blockchain technology, bitcoin, and Ethereum: A brief overview. In 2018 17th international symposium infoteh-jahorina (infoteh) (pp. 1–6). IEEE.

  5. Wessling, F., Ehmke, C., Hesenius, M., & Gruhn, V. (2018). How much blockchain do you need? Towards a concept for building hybrid dapp architectures. In 2018 IEEE/ACM 1st international workshop on emerging trends in software engineering for blockchain (WETSEB) (pp. 44–47). IEEE.

  6. Tikhomirov S. (2017). Ethereum: State of knowledge and research perspectives. In International symposium on foundations and practice of security (pp. 206–221). Springer.

  7. Xu, X., Zhang, X., Gao, H., Xue, Y., Qi, L., & Dou, W. (2020). BeCome: Blockchain-enabled computation offloading for IoT in mobile edge computing. IEEE Transactions on Industrial Informatics, 16(6), 4187–4195. https://doi.org/10.1109/TII.2019.2936869

    Article  Google Scholar 

  8. Li, C., Liang, S., Zhang, J., Wang, Q. E., & Luo, Y. (2022). Blockchain-based data trading in edge-cloud computing environment. Information Processing and Management, 59(1), 102786.

    Article  Google Scholar 

  9. Cui, L., Xiaoxin, S., Ming, Z., Chen, Z., Yang, S., Zhou, Y., & Xiao, W. (2022). CREAT: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3014370

    Article  Google Scholar 

  10. Wang, W., Niyato, D., Wang, P., & Leshem, A. (2018). Decentralized caching for content delivery based on Blockchain: A game theoretic perspective. In 2018 IEEE international conference on communications (ICC) (pp. 1–6). Doi: https://doi.org/10.1109/ICC.2018.8422547.

  11. Liu, J., Guo, S., Shi, Y., Feng, L., & Wang, C. (2020). Decentralized caching framework toward edge network based on blockchain. IEEE Internet of Things Journal, 7(9), 9158–9174. https://doi.org/10.1109/JIOT.2020.3003700

    Article  Google Scholar 

  12. Li, C., Qianqian, C., & Luo, Y. (2022). Low-latency edge cooperation caching based on base station cooperation in SDN based MEC. Expert Systems with Applications, 191, 116252.

    Article  Google Scholar 

  13. Zheng, Q., Xu, S., & Ateniese, G. (2014) VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. In IEEE INFOCOM 2014-IEEE conference on computer communications. (pp. 522–530). IEEE.

  14. Fan, Y., & Liu, Z. (2017). Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting. In 2017 IEEE second international conference on data science in cyberspace (DSC). (pp. 441–449). IEEE.

  15. Yin, H., Zhang, J., Xiong, Y., Ou, L., Li, F., Liao, S., & Li, K. (2019). CP-ABSE: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access, 7, 5682–5694.

    Article  Google Scholar 

  16. Guo, L., Xie, H., & Li, Y. (2020). Data encryption based blockchain and privacy preserving mechanisms towards big data. Journal of Visual Communication and Image Representation, 70, 102741.

    Article  Google Scholar 

  17. Li, H., Tian, H., Zhang, F., & He, J. (2019). Blockchain-based searchable symmetric encryption scheme. Computers & Electrical Engineering, 73, 32–45.

    Article  Google Scholar 

  18. Aydar, M., Cetin, S. C., Ayvaz, S., & Aygun, B. (2019). Private key encryption and recovery in blockchain. arXiv preprint arXiv:1907.04156

  19. Yan, X., Yuan, X., Ye, Q., & Tang, Y. (2020). Blockchain-based searchable encryption scheme with fair payment. IEEE Access, 8, 109687–109706. https://doi.org/10.1109/ACCESS.2020.3002264

    Article  Google Scholar 

  20. Li, C., Zhang, Y., & Luo, Y. (2022). Intermediate data placement and cache replacement strategy under Spark platform. Journal of Parallel and Distributed Computing, 163, 114–135.

    Article  Google Scholar 

  21. He, Y., Wang, H., Li, Y., Huang, K., Leung, V. C., Yu, F. R., & Ming, Z. (2022). An efficient ciphertext-policy attribute-based encryption scheme supporting collaborative decryption with blockchain. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2021.3099171

    Article  Google Scholar 

  22. Li, C., Cai, Q., & Lou, Y. (2022). Optimal data placement strategy considering capacity limitation and load balancing in geographically distributed cloud. Future Generation Computer Systems, 127, 142–159.

    Article  Google Scholar 

  23. Blum, M., Evans, W., Gemmell, P., Kannan, S., & Naor, M. (1994). Checking the correctness of memories. Algorithmica, 12(2), 225–244.

    Article  MATH  Google Scholar 

  24. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007) Provable data possession at untrusted stores. In Proceedings of the 14th ACM conference on computer and communications security (pp. 598–609).

  25. Xue, J., Xu, C., Zhao, J., & Ma, J. (2019). Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Science China Information Sciences, 62(3), 32104.

    Article  Google Scholar 

  26. Machado, C., & Medeiros Fröhlich, A. A. (2018). IoT data integrity verification for cyber-physical systems using blockchain. In 2018 IEEE 21st international symposium on real-time distributed computing (ISORC) (pp. 83–90). Doi: https://doi.org/10.1109/ISORC.2018.00019

  27. Yue, D., Li, R., Zhang, Y., Tian, W., & Peng, C. (2018). Blockchain based data integrity verification in P2P cloud storage. In 2018 IEEE 24th international conference on parallel and distributed systems (ICPADS), (pp. 561–568). Doi: https://doi.org/10.1109/PADSW.2018.8644863.

  28. Zhu, Y., Wang, H., Hu, Z., Ahn, G. J., Hu, H. & Yau, S. S. (2011). Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceedings of the 2011 ACM symposium on applied computing (pp 1550–1557).

  29. Zhao, Q., Chen, S., Liu, Z., Baker, T., & Zhang, Y. (2020). Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management, 57(6), 102355.

    Article  Google Scholar 

  30. Milanov, E. (2009). The RSA algorithm. RSA Laboratories, 1–11.

  31. Nikravan, M., & Reza, A. (2020). A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Personal Communications, 111(1), 463–494.

    Article  Google Scholar 

  32. Li, C., Zhang, Y., Gao, X., & Luo, Y. (2022). Energy-latency tradeoffs for edge caching and dynamic service migration based on DQN in mobile edge computing. Journal of Parallel and Distributed Computing, 166, 15–31.

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported by the Open Fund of Key Laboratory of Hydraulic and Waterway Engineering of the Ministry of Education, Chongqing Jiaotong University under grants (SLK2021A01), the Open Fund of Jiangsu Key Laboratory of information agriculture of Jiangsu Province, the Open Research Fund Program of Key Laboratory of Knowledge Mining and Knowledge Services in Agricultural Converging Publishing, National Press and Publication Administration (2022KMKS01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunlin Li.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Q., Li, C., Du, T. et al. Multi-level caching and data verification based on ethereum blockchain. Wireless Netw 29, 713–727 (2023). https://doi.org/10.1007/s11276-022-03151-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-03151-1

Keywords

Navigation