Elsevier

Information Sciences

Volume 623, April 2023, Pages 293-310
Information Sciences

A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things

https://doi.org/10.1016/j.ins.2022.11.169Get rights and content

Highlights

  • We propose a verifiable way to judge whether cloud mining pools are honest. This method enables fast verification without being affected by the performance limitations of IoT devices, while also helping IoT devices to select high-performance cloud mining pools in BCoT.

  • By implementing the additive homomorphic ElGamal cryptosystem, we not only achieve privacy protection in data transmission but also utilize a semi-honest cloud server to reduce the computational overhead of resource-constrained IoT devices.

  • We design the scheme in detail and analyzed the correctness and security of the scheme. Simultaneously, after the performance analysis and comparison with related schemes, our scheme has higher efficiency in the stage of aggregation and encryption and decryption.

Abstract

Blockchain of Things (BCoT), as a new paradigm that incorporates blockchain with the Internet of Things (IoT), can address the privacy and extensibility issues in IoT systems and effectively enhance the data management of IoT devices. Asmost of theIoT devices are resource-constrained in terms of computing power, storage capacity, and energy consumption. Meanwhile,the enormous computational consumption in the consensus process of the blockchain makes it difficult to integrate with IoT closely and exert the great potential of BCoT. latterly, the ”cloud mining” mechanism has been proposed to address these issues, however,some potential problems still exist, such as data privacy and dishonest cloud mining pools, etc. In this paper, we propose a verifiable and privacy-preserving cloud mining pool selection scheme in BCoT (namely, VPP-CMPS). To obtain a better solution for cloud mining pool selection, we implement an improved time-locked puzzles technique to identify dishonest mining pools and perform the authenticity for mining pool selection.Afterwards,we obtain the privacy protection of the data during the entire selection process by adopting additively homomorphic ElGamal cryptosystem. Meanwhile, considering the resource-constrained case in IoT devices, we use a semi-honest cloud server to cooperate in dealing with the selection procedure, thereby reducing the computational overhead of IoT devices. Experimental results indicate that our scheme is more efficient and provides less computational cost.

Introduction

Over the last few years, the Internet of Things (IoT) has received a wide range of concerns from academia and industry [13]. The IoT is an expanding network of smart devices beyond traditional computing devices that deals with tasks from the cloud server and collects and sends data over the Internet [27]. Meanwhile, these IoT devices are forming some emerging applications, such as smart grid [21], [30], smart transportation [40], [25] and medical system [41] and so on. Nonetheless, the scalability, privacy, and security issues in IoT applications are gradually increasing with the expansion of the IoTs.

The emerging technology of blockchain technology has become a hot topic for both researchers and industry in the past few years, and Blockchain of Things (BCoT) [5], [20] is proposed by researchers as a new paradigm. As illustrated in Fig. 1, BCoT provides a new paradigm that combines blockchain with IoT, which not only increases the ability to exchange information between IoT devices, but also ensures the reliability of IoT data [22]. At the same time, it can also ensure the traceability of IoT device data in the blockchain platform [4]. Nonetheless,there still have some challenges to be solved in the process of combining blockchain with IoT. For instance, the consensus mechanism PoW [12], [43] in the blockchain requires to consume a large number of computing resources and energies. Specifically, each participating IoT device will play as a miner to continuously compute hash values to obtain the reward for successful mining. Nevertheless, the vast bulk of IoT devices have low performance and are constraintin terms of computational power, storage capacity, and energy resources. Moreover, the massive computing consumption of the blockchain will make it challenging to integrate with the Internet of Things well and it will not be able to give full play to the great potential of BCoT [28].

In IoT network, the storage space of edge devices is often limited, which is far from fulfilling the requirements of practical applications[44]. Researchers have proposed the cloud mining mechanism [26], [7] to figure out a better choice for BCoT. Cloud mining enables resource-constrained IoT devices to offload their computational tasks and storage loads to cloud servers or other edge devices [36]. Therefore, more and more resource-constrained IoT devices can join and help the consensus process through cloud mining [37]. However, with the exponential growth of IoT devices, there is a slim chance of a single device mining success. More and more individual IoT devices are willing to team up andform a mining pool to obtain a stable income [19]. Generally, high-performance mining pools will also have acceptable returns. To gain more benefit, an IoT device will always try to choose a high-performance mining pool to join. Nonetheless, there still exist issues of trust and privacy during the selection process of IoT devices, and some dishonest mining pools may lie about their high performance and high stakes to deceive IoT devices to volume up. In [15], [18], researchers have proposed the reputation mechanism to identify the honest nodes, but this generally requires a trusted third party to manage the reputation system. In addition, attacks from the outside cannot be ignored, which means that the private data of IoT devices and mining pools should be protected from being obtained by external adversaries [38]. Thus, a secure and reliable cloud mining pool selection scheme in BCoT needs to address privacy and trust issues.

To overcome the aforementioned challenges, we propose a verifiable and privacy-preserving cloud mining pool selection scheme in BCoT (namely VPP-CMPS scheme). Our proposal takes into account the transfer of private data between IoT devices and mining pools in BCoT. Simultaneously, for the sake of trust issue, we provide a verifiable approach to ensure that the mining pools can not misrepresent their performance, which is also applicable to other scenarios such as the selection of worker abilities in mobile crowdsensing [34], [32]. In addition, we consider the case of resource-constrained IoT devices and do not use a trusted third party to mitigate their computational overhead. Our main contributions are listed as below:

  • 1.

    We propose an improved time-lock puzzles protocol to judge whether the cloud mining pools are honest or not. The improved time-lock puzzles protocol enables a fast verification without being affected by the performance limitations of IoT devices while also helping IoT devices to select high-performance cloud mining pools in BCoT systems.

  • 2.

    By employing the additive homomorphic ElGamal cryptosystem, we achieve the privacy protection in data transmission and utilize a semi-honest cloud server to reduce the computational overhead of resource-constrained IoT devices.

  • 3.

    We give the concrete scheme in detail and analyze the correctness and security of the scheme. Simultaneously, after the performance analysis and comparison with related schemes [35], [6], it shows that our scheme provides a higher efficiency in the aggregation stage.

The rest of this paper is organized as follows. Section 2 gives the related work associated with cloud mining, worker selection, and privacy protection. Section 3 introduces some preliminaries used in this paper. In Section 4, we provide the system model, threat model, and design goals of our scheme. We give detailed protocol steps in Section 5. In Section 6, we present the correctness and security analysis of our scheme. Also, the performance evaluation is presented in Section 7. Finally, Section 8 draws a conclusion of the paper.

Section snippets

Related work

In 2019, Dai et al. [5] introduced the paradigm of BCoT, which tried to incorporate cloud mining to address the limitations of IoT devices. Qiu et al. [26] gave the cloud mining to assist in blockchain and IoT, in which they allow several miners to act as mining proxies for IoT nodes so that mining tasks could be offloaded to cloud servers to balance dynamic network usage. Yao et al. [39] presented a mechanism to integrate cloud computing into the blockchain platform in the IoT, which mainly

Preliminaries

In this section, we review the cryptographic primitives and mathematical concepts, including ElGamal Cryptosystem, Schnorr Signature and Time-lock Puzzles. Table 1 shows the symbols used in the paper.

System model and problem statement

In this section, we give the system model, threat model and design goal of our scheme.

Scheme construction

In this section, we describe our verifiable and privacy-preserving cloud mining pool selection scheme.

Analysis

In this section, we will conduct a detailed analysis of the correctness and security of our VPP-CMPS scheme.

Performance evaluation

In this section, we will compare the feature of our solution with other similar solutions, and conduct theoretical analysis and evaluation of experimental performance.

Conclusion

In this paper, we propose a verifiable and privacy-preserving cloud mining pool selection scheme to solve the privacy, performance, and verifiability in BCoT systems. In our scheme, cloud mining pools are selected using the improved time-lock puzzles protocol, where the IoT device can quickly verify whether or not the mining pools are honest. We use the variant of ElGamal cryptosystem and Schnorr signature technology to ensure the privacy and integrity of the data in the scheme. Furthermore,

CRediT authorship contribution statement

Mingwu Zhang: Funding acquisition, Writing - review & editing, Formal analysis, Methodology, Conceptualization. Mingxuan Yang: Investigation, Validation, Writing - original draft, Software. Gang Shen: Validation, Writing - review & editing. Zhe Xia: Formal analysis, Funding acquisition, Supervision. Yuntao Wang: Writing - review & editing, Formal analysis, Methodology.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References (46)

  • Yu Chen et al.

    Pp-ocq: A distributed privacy-preserving optimal closeness query scheme for social networks

    Computer Standards & Interfaces

    (2021)
  • Ma.ha. Kadadha et al.

    Sensechain: A blockchain-based crowdsensing framework for multiple requesters and multiple workers

    Future Generation Computer Systems

    (2020)
  • Aydin Abadi et al.

    Multi-instance publicly verifiable time-lock puzzle and its applications

  • Joseph A. Akinyele et al.

    Charm: a framework for rapidly prototyping cryptosystems

    Journal of Cryptographic Engineering

    (2013)
  • Lichen Cheng et al.

    Account guarantee scheme: Making anonymous accounts supervised in blockchain

    ACM Transactions on Internet Technology (TOIT)

    (2021)
  • Hong-Ning Dai et al.

    Blockchain for internet of things: A survey

    IEEE Internet of Things Journal

    (2019)
  • Yong Ding et al.

    Secure metering data aggregation with batch verification in industrial smart grid

    IEEE Transactions on Industrial Informatics

    (2020)
  • Jasenka Dizdarević et al.

    A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration

    ACM Computing Surveys (CSUR)

    (2019)
  • Taher ElGamal

    A public key cryptosystem and a signature scheme based on discrete logarithms

    IEEE transactions on information theory

    (1985)
  • Georg Fuchsbauer et al.

    Blind schnorr signatures and signed elgamal encryption in the algebraic group model

  • Sheng Gao et al.

    Trustworker: A trustworthy and privacy-preserving worker selection scheme for blockchain-based crowdsensing

    IEEE Transactions on Services Computing

    (2021)
  • Debiao He et al.

    Privacy-preserving data aggregation scheme against internal attackers in smart grids

    Wireless Networks

    (2016)
  • Junqin Huang et al.

    Towards secure industrial iot: Blockchain system with credit-based consensus mechanism

    IEEE Transactions on Industrial Informatics

    (2019)
  • Xumin Huang et al.

    Software defined networking for energy harvesting internet of things

    IEEE Internet of Things Journal

    (2018)
  • Jiawen Kang et al.

    Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory

    IEEE Internet of Things Journal

    (2019)
  • Jiawen Kang et al.

    Reliable federated learning for mobile networks

    IEEE Wireless Communications

    (2020)
  • D.H. Lehmer

    On euler’s totient function

    Bulletin of the American Mathematical Society

    (1932)
  • Lu. Zhuoran et al.

    Data-driven many-objective crowd worker selection for mobile crowdsourcing in industrial iot

    IEEE Transactions on Industrial Informatics

    (2021)
  • Tianle Mai et al.

    Cloud mining pool aided blockchain-enabled internet of things: An evolutionary game approach

    IEEE Transactions on Cloud Computing

    (2021)
  • Mahdi H Miraz

    Blockchain of things (bcot): The fusion of blockchain and iot technologies

  • Muhammad Baqer Mollah et al.

    Blockchain for future smart grid: A comprehensive survey

    IEEE Internet of Things Journal

    (2020)
  • Dinh C. Nguyen et al.

    Integration of blockchain and cloud of things: Architecture, applications and challenges

    IEEE Communications Surveys & Tutorials

    (2020)
  • Jianli Pan et al.

    Edgechain: An edge-iot framework and prototype based on blockchain and smart contracts

    IEEE Internet of Things Journal

    (2019)
  • Cited by (5)

    • An Efficient Keyword-Based Ciphertext Retrieval Scheme

      2023, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

    This work is in part supported by the National Natural Science Foundation of China under grants 62072134 and U2001205, and the Key Research and Development Program of Hubei Province under Grant 2021BEA163.

    View full text