A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach

  • PDF / 2,517,906 Bytes
  • 19 Pages / 595.224 x 790.955 pts Page_size
  • 87 Downloads / 176 Views

DOWNLOAD

REPORT


A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach Yuqi Fan1 · JingLin Zou2 · Siyu Liu3 · Qiran Yin1 · Xin Guan1 · Xiaohui Yuan4

· Weili Wu5 · Dingzhu Du5

Received: 10 April 2019 / Accepted: 18 February 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract A blockchain is resistant to modification based on the consensus of the network majority, which requires a large amount of communication among distributed nodes. Existing data dissemination protocol solves the wrong block problem also at a high communication cost. This paper investigates the error-correcting tamper-proofing data storage problem and proposes a three-layer framework to store the data in the blockchain to achieve data integrity. The data are stored as blocks, and we design a two-dimension chain data structure consisting of horizontal and vertical chains. This paper proposes a Rotating multiple random Masters and Error-Correcting data storage framework based on blockchain (RMEC) to strike a trade-off between system decentralization and the amount of communication. The proposed Rotating Multiple Random Sampling consensus mechanism (RMRS) randomly selects multiple temporary master nodes to handle each data access request so as to reduce the communication cost. We also propose two error-correcting mechanisms to validate and correct the wrong data blocks. Finally, we implement a prototype and conduct analyses on the system performance. The experiments demonstrate that the framework can achieve data tamper-proof and effectively reduce the communication cost. Keywords Blockchain · Data integrity · Data storage · Error-correcting

1 Introduction The traceability and integrity of data are critical for many data storage systems. Traditional centralized and distributed storage systems face the problem that the data are prone to be tampered by outside or internal attackers. Two  Xiaohui Yuan

[email protected] Yuqi Fan [email protected] 1

School of Computer and Information Engineering, Anhui Province Key Laboratory of Industry Safety and Emergency Technology, Hefei University of Technology, Hefei, Anhui, 230601, China

2

School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China

3

School of Computer Science and Technology, Harbin Institute of Technology, Harbin 15001, China

4

Department of Computer Science and Engineering, University of North Texas, Denton, TX 76203, USA

5

Department of Computer Science, University of Texas at Dallas, Richardson, TX 75080, USA

techniques, digital signature and digital watermarking are currently widely used to protect data integrity. Using the digital signature, the sender signs the protected data with the tag of the data, and the tag is the hash value of the data with the private key of the sender using the public key cryptographic mechanism. The sender transmits both the data and the tag to the receiver who verifies the integrity of the received data. That is, the receiver calculates the hash value of th