A scalable ledger-assisted architecture for secure query processing over distributed IoT data
- PDF / 1,909,850 Bytes
- 15 Pages / 595.276 x 790.866 pts Page_size
- 69 Downloads / 250 Views
REGULAR PAPER
A scalable ledger‑assisted architecture for secure query processing over distributed IoT data Xingliang Yuan1 · Chengjun Cai2 · Cong Wang2 · Qian Wang3 Received: 10 March 2020 / Accepted: 29 July 2020 © China Computer Federation (CCF) 2020
Abstract Massive amount of IoT data poses unique challenges in centralized data management systems. Specifically, IoT data can originate from heterogeneous and distributed sources, and commonly regulations forbid data from different IoT stakeholders to be managed via central governance. To serve for IoT applications, recent proposals leverage distributed ledgers (e.g., blockchains) to function on top of distributed data storage with improved data interoperability. Unfortunately, most of them do not consider data security and privacy in the first place. Along with this transformative paradigm, in this paper, we propose a ledger-assisted architecture for secure distributed IoT data management. This architecture adapts searchable encryption to decentralized storage network to enable encrypted query processing. Meanwhile, it is designed to leverage the distributed ledger to harden both data and query integrity. To deal with continuously generated IoT data, we further devise an efficient secure data insertion protocol, and employ a recent variant of blockchain for users to validate updated query results in a scalable manner. Evaluations on Azure blockchain service confirm the practicality of our proposed architecture. Keywords Searchable encryption · Blockchain · IoT · Distributed storage
1 Introduction Recent years have witnessed rapid growth of the Internet of Things (IoT). IoT applications spread far and wide, involving sectors like healthcare, energy, transportation, etc (Verizon 2016). Apart from massive volumes and high generation rates, IoT data poses unique obstacles due to its intrinsic nature. IoT data originates from various sources (Verizon 2016), and it is commonly forbidden to be centralized because of regulations (Stolpe 2016). However, data collected from one specific source may also be valuable * Xingliang Yuan [email protected] Chengjun Cai chencai‑[email protected] Cong Wang [email protected] Qian Wang [email protected] 1
Monash University, Melbourne, Australia
2
City University of Hong Kong, Kowloon, Hong Kong
3
Wuhan University, Wuhan, China
to others (Shafagh et al. 2017). Therefore, current practice requires an ecosystem with multiple backend support for data access (Stolpe 2016; Shafagh et al. 2017), which incurs tedious business processes and hinders interoperability of heterogeneous IoT data. To streamline data-driven operations in IoT sectors, new proposals based on distributed ledgers are advocated (Christidis and Devetsikiotis 2016; Croman et al. 2016; IBM 2017; Dorri et al. 2017; Shafagh et al. 2017). They envision a distributed and layered architecture, where data and services are decoupled for scalability and interoperability. Particularly, tamper-proof blockchain is utilized by IoT stakeholders to record
Data Loading...