skip to main content
research-article

An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application

Published: 09 January 2024 Publication History

Abstract

Internet of things (IoT) development tends to reduce the reliance on centralized servers. The zero-trust distributed system combined with blockchain technology has become a hot topic in IoT research. However, distribution data storage services and different blockchain protocols make network interoperability and cross-platform more complex. Relay chain is a promising cross-chain technology that solves the complexity and compatibility issues associated with blockchain cross-chain transactions by utilizing relay blockchains as cross-chain connectors. Yet relay chain cross-chain transactions need to collect asset information and implement asset transactions via two-way peg. Due to the release of user transaction information, there is the issue of privacy leakage. In this article, we propose a cross-chain privacy protection protocol based on the Groth16 zero-knowledge proof algorithm and coin-mixing technology, which changes the authentication mechanism and uses a combination of generating functions to map virtual external addresses in transactions. It allows fast cross-chain anonymous transactions while hiding the genuine user’s address. The experiment shows that, in a zero-trust IoT context, our scheme can effectively protect user privacy information, accomplish controlled transaction traceability operations, and guarantee cross-chain transaction security.

References

[1]
Fenhua Bai, Tao Shen, Zhuo Yu, Kai Zeng, and Bei Gong. 2021. Trustworthy blockchain-empowered collaborative edge computing-as-a-service scheduling and data sharing in the IIoE. IEEE IoT J. 9, 16 (2021), 14752–14766.
[2]
Sairath Bhattacharjya and Hossein Saiedian. 2022. Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture. International Journal of Information Security 21, 3 (Jun 2022), 427--436.
[3]
Dai Bingrong, Jiang Shengming, Li Dunwei, et al. 2021. Evaluation model of cross-chain notary mechanism based on improved pagerank algorithm. Comput. Eng. 47, 2 (2021), 26–31.
[4]
Ling Cao and Bo Song. 2021. Blockchain cross-chain protocol and platform research and development. In Proceedings of the International Conference on Electronics, Circuits and Information Engineering (ECIE’21). IEEE, 264–269.
[5]
Ling Cao and Zheyi Wan. 2020. Anonymous scheme for blockchain atomic swap based on zero-knowledge proof. In Proceedings of the IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA’20). IEEE, 371–374.
[6]
Sheng Cao, Jing Wang, Xiaojiang Du, Xiaosong Zhang, and Xiaolin Qin. 2020. CEPS: A cross-blockchain based electronic health records privacy-preserving scheme. In Proceedings of the IEEE International Conference on Communications (ICC’20). IEEE, 1–6.
[7]
Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, and Chien-Lung Wang. 2021. Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains. Secur. Commun. Netw. (2021).
[8]
Li Da Xu, Yang Lu, and Ling Li. 2021. Embedding blockchain technology into IoT for security: A survey. IEEE IoT J. 8, 13 (2021), 10452–10473.
[9]
Liping Deng, Huan Chen, Jing Zeng, and Liang-Jie Zhang. 2018. Research on cross-chain technology based on sidechain and hash-locking. In International conference on edge computing, Vol. 10973. Springer, Springer International Publishing, Cham, 144--151.
[10]
Apoorvaa Deshpande and Maurice Herlihy. 2020. Privacy-preserving cross-chain atomic swaps. In International Conference on Financial Cryptography and Data Security, Vol. 12063. Springer, Springer International Publishing, 540--549.
[11]
Donghui Ding, Kang Li, Linpeng Jia, Zhongcheng Li, Jun Li, and Yi Sun. 2019. Privacy protection for blockchains with account and multi-asset model. Chin. Commun. 16, 6 (2019), 69–79.
[12]
Yepeng Ding and Hiroyuki Sato. 2021. Sunspot: A decentralized framework enabling privacy for authorizable data sharing on transparent public blockchains. In International Conference on Algorithms and Architectures for Parallel Processing, Vol. 13155. Springer, Springer International Publishing, Cham, 693--709.
[13]
Tianlong Fei, Yuan Chang, Jiaqi Wang, Ning Lu, and Wenbo Shi. 2020. Anonymous bitcoin mixing scheme based on semi-trusted supervisor. In Proceedings of the IEEE 3rd International Conference on Electronics Technology (ICET’20). IEEE, 845–850.
[14]
Fusion Foundation. 2018. An Inclusive Cryptofinance Platform Based on Blockchain. Fusion Whitepaper (2018). Retrieved from https://whitepaper.io/document/55/fusion-whitepaper.
[15]
Philipp Frauenthaler, Marten Sigwart, Christof Spanring, Michael Sober, and Stefan Schulte. 2020. ETH relay: A cost-efficient relay for ethereum-based blockchains. In Proceedings of the IEEE International Conference on Blockchain (Blockchain’20). IEEE, 204–213.
[16]
Jens Groth. 2016. On the size of pairing-based non-interactive arguments. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vol. 9666. Springer, Berlin, 305--326.
[17]
Xuan Han, Yong Yuan, and Fei-Yue Wang. 2019. Security problems on blockchain: The state of the art and future trends. Acta Autom. Sin. 45, 1 (2019), 206–225.
[18]
Yuanhang He, Daochao Huang, Lei Chen, Yi Ni, and Xiangjie Ma. 2022. A survey on zero trust architecture: challenges and future trends. Wireless Communications and Mobile Computing 2022 (2022), 1--13.
[19]
Laphou Lao, Zecheng Li, Songlin Hou, Bin Xiao, Songtao Guo, and Yuanyuan Yang. 2020. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput. Surv. 53, 1 (2020), 1–32.
[20]
Fang Li, Zhuo-Ran Li, and He Zhao. 2019. Research on the progress in cross-chain technology of blockchains. J. Softw. 30, 6 (2019), 1649–1660.
[21]
G. Li, D. He, B. Guo, and S. Lu. 2020. Blockchain privacy protection algorithms based on zero knowledge proof. J. Huazhong Univ. Sci. Technol. (Natural Science Edition) 48, 7 (2020), 112--116.
[22]
Shan Li, Muddesar Iqbal, and Neetesh Saxena. 2022. Future industry internet of things with zero-trust security. Inf. Syst. Front. (2022), 1–14.
[23]
Shaofeng Lin, Yihan Kong, and Shaotao Nie. 2021. Overview of block chain cross chain technology. In Proceedings of the 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA’21). IEEE, 357–360.
[24]
Ting Lin, Xu Yang, Taoyi Wang, Tu Peng, Feng Xu, Shengxiong Lao, Siyuan Ma, Hanfeng Wang, and Wenjiang Hao. 2020. Implementation of high-performance blockchain network based on cross-chain technology for IoT applications. Sensors 20, 11 (2020), 3268.
[25]
Yizhi Liu, Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo, and Geyong Min. 2023. A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 72, 2 (Feb 2023), 501--512.
[26]
Mohammad Madine, Khaled Salah, Raja Jayaraman, Yousof Al-Hammadi, Junaid Arshad, and Ibrar Yaqoob. 2021. Appxchain: Application-level interoperability for blockchain networks. IEEE Access 9 (2021), 87777–87791.
[27]
Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2014. Coinshuffle: Practical decentralized coin mixing for bitcoin. In 19th European Symposium on Research in Computer Security (ESORICS), Vol. 8713. Springer, Springer International Publishing, and Wroclaw Univ Technol, Wroclaw, 345--364.
[28]
Mayra Samaniego and Ralph Deters. 2018. Zero-trust hierarchical management in IoT. In Proceedings of the IEEE International Congress on Internet of Things (ICIOT’18). IEEE, 88–95.
[29]
Sisi Shao, Fei Chen, Xiaoying Xiao, Weiheng Gu, Yicheng Lu, Shu Wang, Wen Tang, Shangdong Liu, Fei Wu, Jing He, et al. 2021. IBE-BCIOT: An IBE based cross-chain communication mechanism of blockchain in IoT. World Wide Web 24, 5 (2021), 1665–1690.
[30]
YE Shao-Jie, Wang Xiao-Yi, Xu Cai-Chao, et al. 2020. BitXHub: Side-relay chain based heterogeneous blockchain interoperable platform. Comput. Sci. 47, 06 (2020), 300–308.
[31]
Fei Song, Zhengyang Ai, Haowei Zhang, Ilsun You, and Shiyong Li. 2020. Smart collaborative balancing for dependable network components in cyber-physical systems. IEEE Trans. Industr. Inf. 17, 10 (2020), 6916–6924.
[32]
Fei Song, Letian Li, Ilsun You, Shui Yu, and Hongke Zhang. 2022. Optimizing high-speed mobile networks with smart collaborative theory. IEEE Wireless Commun. 29, 3 (2022), 48–54.
[33]
Fei Song, Yu-Tong Zhou, Yu Wang, Tian-Ming Zhao, Ilsun You, and Hong-Ke Zhang. 2019. Smart collaborative distribution for privacy enhancement in moving target defense. Inf. Sci. 479 (2019), 593–606.
[34]
Fei Song, Mingqiang Zhu, Yutong Zhou, Ilsun You, and Hongke Zhang. 2019. Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain. IEEE IoT J. 7, 7 (2019), 6046–6055.
[35]
Xiaowen Sun, Tan Yang, and Bo Hu. 2022. LSTM-TC: Bitcoin coin mixing detection method with a high recall. Appl. Intell. 52, 1 (2022), 780–793.
[36]
Erkan Tairi, Pedro Moreno-Sanchez, and Matteo Maffei. 2021. A 2 l: Anonymous atomic locks for scalability in payment channel hubs. In Proceedings of the IEEE Symposium on Security and Privacy (SP’21). IEEE, 1834–1851.
[37]
Qin Wang, Xinqi Zhu, Yiyang Ni, Li Gu, and Hongbo Zhu. 2020. Blockchain for the IoT and industrial IoT: A review. IoT 10 (2020), 100081.
[38]
Jiagui Xie, Zhiping Li, and Jian Jin. 2022. Cross-chain mechanism based on spark blockchain. J. Comput. Appl.ions 42, 2 (2022), 519.
[39]
Anping Xiong, Guihua Liu, Qingyi Zhu, Ankui Jing, and Seng W. Loke. 2022. A notary group-based cross-chain mechanism. Digital Communications and Networks 8, 6 (2022), 1059--1067.
[40]
Jiahua Xu, Damien Ackerer, and Alevtina Dubovitskaya. 2021. A game-theoretic analysis of cross-chain atomic swaps with HTLCs. In Proceedings of the IEEE 41st International Conference on Distributed Computing Systems (ICDCS’21). IEEE, 584–594.
[41]
Mingcheng Xu, Gaojian Xu, Haoyu Xu, Jiadong Zhou, and Shaowen Li. 2022. A decentralized lightweight authentication protocol under blockchain. Concurr. Comput.: Pract. Exp. 34, 13 (2022), e6920.
[42]
Xiaofeng Zhan, Xuelin Cheng, Wei Guo, Keting Yin, and Xiaoyu Lu. 2021. An distributed CA system: Identity authentication system in transnational railway transportation based on blockchain. In Proceedings of the International Conference on Computer Information Science and Artificial Intelligence (CISAI’21). IEEE, 989–994.
[43]
Cong Zhong, Zhihong Liang, Yuxiang Huang, Fei Xiong, Mingming Qin, and Zhichang Guo. 2022. Research on cross-chain technology of blockchain: Challenges and prospects. In Proceedings of the IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA’22). IEEE, 422–428.

Cited By

View all
  • (2024)RGB-D Data Compression via Bi-Directional Cross-Modal Prior Transfer and Enhanced Entropy ModelingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370299721:2(1-17)Online publication date: 5-Nov-2024
  • (2024)Co-Sharding: A Sharding Scheme for Large-Scale Internet of Things ApplicationDistributed Ledger Technologies: Research and Practice10.1145/36412903:1(1-16)Online publication date: 18-Mar-2024
  • (2024)Pseudo Label Association and Prototype-Based Invariant Learning for Semi-Supervised NIR-VIS Face RecognitionIEEE Transactions on Image Processing10.1109/TIP.2024.336453033(1448-1463)Online publication date: 1-Jan-2024
  • Show More Cited By

Index Terms

  1. An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 20, Issue 2
      March 2024
      572 pages
      EISSN:1550-4867
      DOI:10.1145/3618080
      • Editor:
      • Wen Hu
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 09 January 2024
      Online AM: 31 March 2023
      Accepted: 17 January 2023
      Revised: 15 November 2022
      Received: 31 August 2022
      Published in TOSN Volume 20, Issue 2

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Zero trust
      2. relay chain
      3. groth16
      4. privacy protection
      5. vritual address

      Qualifiers

      • Research-article

      Funding Sources

      • Major Scientific and Technological Projects in Yunnan Province
      • Yunnan Key Laboratory of Blockchain Application Technology
      • National Natural Science Foundation of China
      • Yunnan Reserve Talents of Young and Middle-Aged Academic and Technical Leaders
      • Yunnan Young Top Talents of Ten thousand Plan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)520
      • Downloads (Last 6 weeks)28
      Reflects downloads up to 20 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)RGB-D Data Compression via Bi-Directional Cross-Modal Prior Transfer and Enhanced Entropy ModelingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370299721:2(1-17)Online publication date: 5-Nov-2024
      • (2024)Co-Sharding: A Sharding Scheme for Large-Scale Internet of Things ApplicationDistributed Ledger Technologies: Research and Practice10.1145/36412903:1(1-16)Online publication date: 18-Mar-2024
      • (2024)Pseudo Label Association and Prototype-Based Invariant Learning for Semi-Supervised NIR-VIS Face RecognitionIEEE Transactions on Image Processing10.1109/TIP.2024.336453033(1448-1463)Online publication date: 1-Jan-2024
      • (2024)Unsupervised NIR-VIS Face Recognition via Homogeneous-to-Heterogeneous Learning and Residual-Invariant EnhancementIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334617619(2112-2126)Online publication date: 1-Jan-2024
      • (2024)SoK: Security and Privacy of Blockchain Interoperability2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00255(3840-3865)Online publication date: 19-May-2024
      • (2024)F2C2T: A Freeze-Free Cross-chain Transfer Consistency Guarantee Mechanism for Data Asset with Associations2024 IEEE International Conference on Web Services (ICWS)10.1109/ICWS62655.2024.00136(1135-1144)Online publication date: 7-Jul-2024
      • (2024)Leveraging Zero-Knowledge Proofs for Blockchain Interoperability: Experiences with Ethereum and Hyperledger Fabric2024 L Latin American Computer Conference (CLEI)10.1109/CLEI64178.2024.10700385(1-10)Online publication date: 12-Aug-2024
      • (2024)An energy-aware secure routing scheme in internet of things networks via two-way trust evaluationPervasive and Mobile Computing10.1016/j.pmcj.2024.101995105(101995)Online publication date: Dec-2024
      • (2024)Enhancing Zero Trust Security in Edge Computing Environments: Challenges and SolutionsGood Practices and New Perspectives in Information Systems and Technologies10.1007/978-3-031-60221-4_41(433-444)Online publication date: 13-May-2024

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media