A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things

被引:4
|
作者
Zhang, Mingwu [1 ,2 ]
Yang, Mingxuan [1 ]
Shen, Gang [1 ]
Xia, Zhe [3 ]
Wang, Yuntao [4 ]
机构
[1] Hubei Univ Technol, Sch Comp, Wuhan 430068, Peoples R China
[2] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guilin 541004, Peoples R China
[3] Wuhan Univ Techonl, Sch Comp Sci & Engn, Wuhan 430070, Peoples R China
[4] Osaka Univ, Grad Sch Engn, Suita, Japan
基金
中国国家自然科学基金;
关键词
Data aggregation; Privacy preservation; Cloud mining pool; Verifiable selection; Blockchain of things; INDUSTRIAL INTERNET; SECURE; AGGREGATION; COMPUTATION; FRAMEWORK;
D O I
10.1016/j.ins.2022.11.169
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain of Things (BCoT), as a new paradigm that incorporates blockchain with the Internet of Things (IoT), can address the privacy and extensibility issues in IoT systems and effectively enhance the data management of IoT devices. Asmost of theIoT devices are resource-constrained in terms of computing power, storage capacity, and energy con-sumption. Meanwhile,the enormous computational consumption in the consensus process of the blockchain makes it difficult to integrate with IoT closely and exert the great poten-tial of BCoT. latterly, the "cloud mining" mechanism has been proposed to address these issues, however,some potential problems still exist, such as data privacy and dishonest cloud mining pools, etc. In this paper, we propose a verifiable and privacy-preserving cloud mining pool selection scheme in BCoT (namely, VPP-CMPS). To obtain a better solution for cloud mining pool selection, we implement an improved time-locked puzzles technique to identify dishonest mining pools and perform the authenticity for mining pool selection. Afterwards,we obtain the privacy protection of the data during the entire selection process by adopting additively homomorphic ElGamal cryptosystem. Meanwhile, considering the resource-constrained case in IoT devices, we use a semi-honest cloud server to cooperate in dealing with the selection procedure, thereby reducing the computational overhead of IoT devices. Experimental results indicate that our scheme is more efficient and provides less computational cost.(c) 2022 Published by Elsevier Inc.
引用
收藏
页码:293 / 310
页数:18
相关论文
共 50 条
  • [31] PPSS: A Privacy-Preserving Supervision Scheme Based on Blockchain
    Chen, Ming
    Shi, Peichang
    Fu, Xiang
    Jiang, Feng
    Gao, Fei
    Ma, Penghui
    Kong, Jinzhu
    [J]. 2022 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING, ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM, 2022, : 556 - 561
  • [32] More Efficient and Verifiable Privacy-Preserving Aggregation Scheme for Internet of Things-Based Federated Learning
    Shi, Rongquan
    Wei, Lifei
    Zhang, Lei
    [J]. APPLIED SCIENCES-BASEL, 2024, 14 (13):
  • [33] Privacy-Preserving Techniques in Cloud/Fog and Internet of Things
    Lee, Cheng-Chi
    Gheisari, Mehdi
    Shayegan, Mohammad Javad
    Ahvanooey, Milad Taleby
    Liu, Yang
    [J]. CRYPTOGRAPHY, 2023, 7 (04)
  • [34] A Multi-Cloud based Privacy-Preserving Data Publishing Scheme for the Internet of Things
    Yang, Lei
    Humayed, Abdulmalik
    Li, Fengjun
    [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 30 - 39
  • [35] Secure authentication and privacy-preserving blockchain for industrial internet of things
    Sharma, Prakash Chandra
    Mahmood, Md Rashid
    Raja, Hiral
    Yadav, Narendra Singh
    Gupta, Brij B.
    Arya, Varsha
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
  • [36] TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing
    Gao, Sheng
    Chen, Xiuhua
    Zhu, Jianming
    Dong, Xuewen
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3577 - 3590
  • [37] Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud
    Hu, Chenfei
    Zhang, Chuan
    Lei, Dian
    Wu, Tong
    Liu, Ximeng
    Zhu, Liehuang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3476 - 3491
  • [38] Privacy-preserving internet of things data filtering scheme
    Zhou, Rang
    Zhang, Xiaosong
    Wang, Xiaofen
    Li, Dongfen
    Chen, Tao
    Zhang, Xiaojun
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 45 - 53
  • [39] A Privacy-Preserving Homomorphic Encryption Scheme for the Internet of Things
    Zouari, Jaweher
    Hamdi, Mohamed
    Kim, Tai-Hoon
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 1939 - 1944
  • [40] Verifiable Privacy-preserving Monitoring for Cloud-assisted mHealth Systems
    Guo, Linke
    Fang, Yuguang
    Li, Ming
    Li, Pan
    [J]. 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,