A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things☆
Introduction
Over the last few years, the Internet of Things (IoT) has received a wide range of concerns from academia and industry [13]. The IoT is an expanding network of smart devices beyond traditional computing devices that deals with tasks from the cloud server and collects and sends data over the Internet [27]. Meanwhile, these IoT devices are forming some emerging applications, such as smart grid [21], [30], smart transportation [40], [25] and medical system [41] and so on. Nonetheless, the scalability, privacy, and security issues in IoT applications are gradually increasing with the expansion of the IoTs.
The emerging technology of blockchain technology has become a hot topic for both researchers and industry in the past few years, and Blockchain of Things (BCoT) [5], [20] is proposed by researchers as a new paradigm. As illustrated in Fig. 1, BCoT provides a new paradigm that combines blockchain with IoT, which not only increases the ability to exchange information between IoT devices, but also ensures the reliability of IoT data [22]. At the same time, it can also ensure the traceability of IoT device data in the blockchain platform [4]. Nonetheless,there still have some challenges to be solved in the process of combining blockchain with IoT. For instance, the consensus mechanism PoW [12], [43] in the blockchain requires to consume a large number of computing resources and energies. Specifically, each participating IoT device will play as a miner to continuously compute hash values to obtain the reward for successful mining. Nevertheless, the vast bulk of IoT devices have low performance and are constraintin terms of computational power, storage capacity, and energy resources. Moreover, the massive computing consumption of the blockchain will make it challenging to integrate with the Internet of Things well and it will not be able to give full play to the great potential of BCoT [28].
In IoT network, the storage space of edge devices is often limited, which is far from fulfilling the requirements of practical applications[44]. Researchers have proposed the cloud mining mechanism [26], [7] to figure out a better choice for BCoT. Cloud mining enables resource-constrained IoT devices to offload their computational tasks and storage loads to cloud servers or other edge devices [36]. Therefore, more and more resource-constrained IoT devices can join and help the consensus process through cloud mining [37]. However, with the exponential growth of IoT devices, there is a slim chance of a single device mining success. More and more individual IoT devices are willing to team up andform a mining pool to obtain a stable income [19]. Generally, high-performance mining pools will also have acceptable returns. To gain more benefit, an IoT device will always try to choose a high-performance mining pool to join. Nonetheless, there still exist issues of trust and privacy during the selection process of IoT devices, and some dishonest mining pools may lie about their high performance and high stakes to deceive IoT devices to volume up. In [15], [18], researchers have proposed the reputation mechanism to identify the honest nodes, but this generally requires a trusted third party to manage the reputation system. In addition, attacks from the outside cannot be ignored, which means that the private data of IoT devices and mining pools should be protected from being obtained by external adversaries [38]. Thus, a secure and reliable cloud mining pool selection scheme in BCoT needs to address privacy and trust issues.
To overcome the aforementioned challenges, we propose a verifiable and privacy-preserving cloud mining pool selection scheme in BCoT (namely VPP-CMPS scheme). Our proposal takes into account the transfer of private data between IoT devices and mining pools in BCoT. Simultaneously, for the sake of trust issue, we provide a verifiable approach to ensure that the mining pools can not misrepresent their performance, which is also applicable to other scenarios such as the selection of worker abilities in mobile crowdsensing [34], [32]. In addition, we consider the case of resource-constrained IoT devices and do not use a trusted third party to mitigate their computational overhead. Our main contributions are listed as below:
- 1.
We propose an improved time-lock puzzles protocol to judge whether the cloud mining pools are honest or not. The improved time-lock puzzles protocol enables a fast verification without being affected by the performance limitations of IoT devices while also helping IoT devices to select high-performance cloud mining pools in BCoT systems.
- 2.
By employing the additive homomorphic ElGamal cryptosystem, we achieve the privacy protection in data transmission and utilize a semi-honest cloud server to reduce the computational overhead of resource-constrained IoT devices.
- 3.
We give the concrete scheme in detail and analyze the correctness and security of the scheme. Simultaneously, after the performance analysis and comparison with related schemes [35], [6], it shows that our scheme provides a higher efficiency in the aggregation stage.
Section snippets
Related work
In 2019, Dai et al. [5] introduced the paradigm of BCoT, which tried to incorporate cloud mining to address the limitations of IoT devices. Qiu et al. [26] gave the cloud mining to assist in blockchain and IoT, in which they allow several miners to act as mining proxies for IoT nodes so that mining tasks could be offloaded to cloud servers to balance dynamic network usage. Yao et al. [39] presented a mechanism to integrate cloud computing into the blockchain platform in the IoT, which mainly
Preliminaries
In this section, we review the cryptographic primitives and mathematical concepts, including ElGamal Cryptosystem, Schnorr Signature and Time-lock Puzzles. Table 1 shows the symbols used in the paper.
System model and problem statement
In this section, we give the system model, threat model and design goal of our scheme.
Scheme construction
In this section, we describe our verifiable and privacy-preserving cloud mining pool selection scheme.
Analysis
In this section, we will conduct a detailed analysis of the correctness and security of our VPP-CMPS scheme.
Performance evaluation
In this section, we will compare the feature of our solution with other similar solutions, and conduct theoretical analysis and evaluation of experimental performance.
Conclusion
In this paper, we propose a verifiable and privacy-preserving cloud mining pool selection scheme to solve the privacy, performance, and verifiability in BCoT systems. In our scheme, cloud mining pools are selected using the improved time-lock puzzles protocol, where the IoT device can quickly verify whether or not the mining pools are honest. We use the variant of ElGamal cryptosystem and Schnorr signature technology to ensure the privacy and integrity of the data in the scheme. Furthermore,
CRediT authorship contribution statement
Mingwu Zhang: Funding acquisition, Writing - review & editing, Formal analysis, Methodology, Conceptualization. Mingxuan Yang: Investigation, Validation, Writing - original draft, Software. Gang Shen: Validation, Writing - review & editing. Zhe Xia: Formal analysis, Funding acquisition, Supervision. Yuntao Wang: Writing - review & editing, Formal analysis, Methodology.
Declaration of Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
References (46)
- et al.
Pp-ocq: A distributed privacy-preserving optimal closeness query scheme for social networks
Computer Standards & Interfaces
(2021) - et al.
Sensechain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers
Future Generation Computer Systems
(2020) - et al.
Multi-instance publicly verifiable time-lock puzzle and its applications
- et al.
Charm: a framework for rapidly prototyping cryptosystems
Journal of Cryptographic Engineering
(2013) - et al.
Account guarantee scheme: Making anonymous accounts supervised in blockchain
ACM Transactions on Internet Technology (TOIT)
(2021) - et al.
Blockchain for internet of things: A survey
IEEE Internet of Things Journal
(2019) - et al.
Secure metering data aggregation with batch verification in industrial smart grid
IEEE Transactions on Industrial Informatics
(2020) - et al.
A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration
ACM Computing Surveys (CSUR)
(2019) A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE transactions on information theory
(1985)- et al.
Blind schnorr signatures and signed elgamal encryption in the algebraic group model
Trustworker: A trustworthy and privacy-preserving worker selection scheme for blockchain-based crowdsensing
IEEE Transactions on Services Computing
Privacy-preserving data aggregation scheme against internal attackers in smart grids
Wireless Networks
Towards secure industrial iot: Blockchain system with credit-based consensus mechanism
IEEE Transactions on Industrial Informatics
Software defined networking for energy harvesting internet of things
IEEE Internet of Things Journal
Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory
IEEE Internet of Things Journal
Reliable federated learning for mobile networks
IEEE Wireless Communications
On euler’s totient function
Bulletin of the American Mathematical Society
Data-driven many-objective crowd worker selection for mobile crowdsourcing in industrial iot
IEEE Transactions on Industrial Informatics
Cloud mining pool aided blockchain-enabled internet of things: An evolutionary game approach
IEEE Transactions on Cloud Computing
Blockchain of things (bcot): The fusion of blockchain and iot technologies
Blockchain for future smart grid: A comprehensive survey
IEEE Internet of Things Journal
Integration of blockchain and cloud of things: Architecture, applications and challenges
IEEE Communications Surveys & Tutorials
Edgechain: An edge-iot framework and prototype based on blockchain and smart contracts
IEEE Internet of Things Journal
Cited by (5)
DTC-MDD: A spatiotemporal data acquisition technology for privacy-preserving in MCS
2024, Information SciencesSecurity and privacy protection technologies in securing blockchain applications
2023, Information SciencesThe blockchain conundrum: An in-depth examination of challenges, contributing technologies, and alternatives
2024, Concurrency and Computation: Practice and ExperienceDesign of Hybrid Metaheuristic Optimization Algorithm for Trust-Aware Privacy Preservation in Cloud Computing
2023, International Journal of Computer Networks and ApplicationsAn Efficient Keyword-Based Ciphertext Retrieval Scheme
2023, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- ☆
This work is in part supported by the National Natural Science Foundation of China under grants 62072134 and U2001205, and the Key Research and Development Program of Hubei Province under Grant 2021BEA163.