| Literature DB >> 30400673 |
Lijing Zhou1, Licheng Wang2, Tianyi Ai3, Yiru Sun4.
Abstract
Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs.Entities:
Keywords: IoT; blockchain; full homomorphism; outsourcing computation; publicly verifiable secret sharing
Year: 2018 PMID: 30400673 PMCID: PMC6263686 DOI: 10.3390/s18113785
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1An overview of BeeKeeper 2.0. TX, TX, TX, TX and TX are transactions sent to blockchain. TX includes verification key (VK); TX includes encrypted core-shares and commitments of these core-share; TX includes encrypted numbers; TX includes a request; and TX includes an encrypted response and a commitment of this response. This figure shows the work process of BeeKeeper 2.0 in the case where all sent transactions are valid. In fact, if any transaction is invalid, this transaction will not be appended in the blockchain, and it will not be seen by others.
Figure 2Construction of a decentralized outsourcing computation.
Affiliation of algorithms.
| Participant | Algorithms of Participant |
|---|---|
| Device | |
| Server | |
| Validator |
Performance of algorithms.
|
| 4 | 5 | 6 | 7 | 8 | 9 | 10 |
|---|---|---|---|---|---|---|---|
|
| 0.1282777 | 0.1560096 | 0.2025866 | 0.2608900 | 0.3187592 | 0.3766045 | 0.4376585 |
|
| 0.0000354 | 0.0000364 | 0.0000366 | 0.0000352 | 0.0000358 | 0.0000362 | 0.0000362 |
|
| 0.0000042 | 0.0000043 | 0.0000043 | 0.0000044 | 0.0000043 | 0.0000044 | 0.0000043 |
|
| 0.0019154 | 0.0017049 | 0.0017740 | 0.0017232 | 0.0016155 | 0.0017323 | 0.0017263 |
|
| 0.0004520 | 0.0003650 | 0.0003395 | 0.0003912 | 0.0004041 | 0.0003230 | 0.0003862 |
|
| 0.1483874 | 0.2377457 | 0.3686747 | 0.5367989 | 0.7667174 | 1.0569477 | 1.3313813 |
|
| 0.0030455 | 0.0046279 | 0.0059521 | 0.0074007 | 0.0105726 | 0.0123372 | 0.0142269 |
|
| 0.0238838 | 0.0321993 | 0.0496330 | 0.0658040 | 0.0818657 | 0.0965642 | 0.1221394 |
|
| 0.0012397 | 0.0012423 | 0.0012381 | 0.0012378 | 0.0012473 | 0.0012376 | 0.0012333 |
|
| 0.0012635 | 0.0012635 | 0.0012635 | 0.0012635 | 0.0012635 | 0.0012635 | 0.0012635 |
denotes the maximum degree of the polynomial that the server can calculate. We implemented a (3,4) BeeKeeper 2.0 system to show the performance of algorithms.
Figure 3Chaincode invoke latency.
Figure 4Transaction success rate.
Figure 5Query latency.
Figure 6Step latency.