Journal of Guangxi Normal University(Natural Science Edition) ›› 2023, Vol. 41 ›› Issue (4): 84-95.doi: 10.16088/j.issn.1001-6600.2022111103

Previous Articles     Next Articles

A Blockchain-Based IoT Data Security Transaction Scheme

YU Feng1,2,3*, MENG Linghui1,2,3, PENG Jiahui4, LI Xianxian1,2,3, QU Bin1,2,3   

  1. 1. School of Computer Science and Engineering, Guangxi Normal University, Guilin Guangxi 541004, China;
    2. Key Lab of Education Blockchain and Intelligent Technology, Ministry of Education (Guangxi Normal University), Guilin Guangxi 541004, China;
    3. Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing (Guangxi Normal University), Guilin Guangxi 541004, China;
    4. Guangxi Power Grid Materials Co. LTD, Nanning Guangxi 530022, China
  • Received:2022-11-11 Revised:2023-03-16 Online:2023-07-25 Published:2023-09-06

Abstract: The Internet of Things (IoT) has been widely applied in the primary, secondary and tertiary industries in China. IoT devices (such as cameras) have generated a huge amount of image and video multimedia data, and the value contained in it has been paid more and more attention. How to meet the new demand of value-added data exchange and paid sharing and build a safe and fair data transaction mechanism is one of the important foundations of data element value exchange. In view of problems such as privacy leakage and lack of security in the scheme of using traditional third parties to conduct Internet of Things data transaction, this paper realizes secure transaction of Internet of Things data by using technical features such as traceability and tamper-proof of blockchain, and turns security transaction of Internet of Things data into two-stage Stackelberg game. The double-chain architecture is used to ensure the security and privacy protection of the transaction process, and the perceptive hash technology is used to realize data right confirmation, so as to protect the rights and interests of all participants in the transaction to the greatest extent. The improvement of the proposed scheme in time, TPS and zero-knowledge proof, as well as the trend of optimal profit distribution after two-stage Stackelberg game are verified by experiments, further verifying the advantages and feasibility of the proposed scheme. Finally, the possible security threats of this scheme are analyzed, and it is proved that the scheme can effectively resist the risks of collusive attack, denial and frame-up under different scenarios.

Key words: security transaction, data transaction, blockchain, Stackelberg game, dual-chain

CLC Number:  TP309
[1] 李宇杰, 李煊鹏, 张为公. 基于视觉的三维目标检测算法研究综述[J]. 计算机工程与应用, 2020, 56(1): 11-24. DOI: 10.3778/j.issn.1002-8331.1909-0024.
[2] DELGADO-SEGURA S, PÉREZ-SOLÀ C, NAVARRO-ARRIBAS G, et al. A fair protocol for data trading based on Bitcoin transactions[J]. Future Generation Computer Systems, 2020, 107: 832-840. DOI: 10.1016/j.future.2017.08.021.
[3] GAO J T, WU T, LI X L. Secure, fair and instant data trading scheme based on bitcoin[J]. Journal of Information Security and Applications, 2020, 53: 102511. DOI: 10.1016/j.jisa.2020.102511.
[4] NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL].(2008-10-31)[2022-11-11].https://nakamotoinstitute.org/bitcoin/.
[5] LI X X, PENG J H, SHI Z K, et al. Achieving fair and accountable data trading scheme for educational multimedia data based on blockchain[C]// Quality, Reliability, Security and Robustness in Heterogeneous Systems. Cham: Springer, 2021: 111-125. DOI: 10.1007/978-3-030-91424-0_7.
[6] SHEN J Y. Blockchain technology and its applications in digital content copyright protection[C]// Proceedings of the 4th International Conference on Economic Management and Green Development. Singapore: Springer, 2021: 18-25. DOI: 10.1007/978-981-16-5359-9_3.
[7] 赵海丽, 许艳萍, 杨永. 基于FlashAccess数字版权在线多媒体保护技术研究[C]// 第十九届全国青年通信学术年会论文集. 北京: 国防工业出版社, 2014: 306-316.
[8] LIU Z Y, FU J Q. Resource pricing and offloading decisions in mobile edge computing based on the Stackelberg game[J]. The Journal of Supercomputing, 2022, 78: 7805-7824. DOI: 10.1007/s11227-021-04246-w.
[9] 张倩. 浅议物联网的技术与价值[J]. 信息系统工程, 2016(12): 98. DOI: 10.3969/j.issn.1001-2362.2016.12.063.
[10] MISSIER P, BAJOUDAH S, CAPOSSELE A, et al. Mind my value: a decentralized infrastructure for fair and trusted IoT data trading[C]// IoT’17: Proceedings of the Seventh International Conference on the Internet of Things. New York, NY: Association for Computing Machinery, 2017: 15. DOI: 10.1145/3131542.3131564.
[11] 查选, 王旭, 倪巍, 等. 区块链技术的一致性和容量的研究与发展及在物联网中的应用[J]. 物联网学报, 2017, 1(1): 21-33. DOI: 10.11959/j.issn.2096-3750.2017.00004.
[12] 王涵, 王绪安, 周能, 等. 基于区块链的可审计数据分享方案[J]. 广西师范大学学报(自然科学版), 2020, 38(2): 1-7. DOI: 10.16088/j.issn.1001-6600.2020.02.001.
[13] 黄小红, 张勇, 闪德胜, 等. 基于多目标效用优化的分布式数据交易算法[J]. 通信学报, 2021, 42(2): 52-63. DOI: 10.11959/j.issn.1000-436x.2021034.
[14] LIN C H V, HUANG C C J, YUAN Y H, et al. A fully decentralized infrastructure for Subscription-based IoT data trading[C]// 2020 IEEE International Conference on Blockchain (Blockchain). Los Alamitos, CA: IEEE Computer Society, 2020: 162-169. DOI: 10.1109/Blockchain50366.2020.00027.
[15] 汪靖伟, 郑臻哲, 吴帆, 等. 基于区块链的数据市场[J]. 大数据, 2020, 6(3): 21-35. DOI: 10.11959/j.issn.2096-0271.2020021.
[16] 丁璇. 基于计算机大数据的信息安全处理技术研究[J]. 数字通信世界, 2022(9): 35-37. DOI: 10.3969/J.ISSN.1672-7274.2022.09.012.
[17] ZHANG X H, LI X H, MIAO Y B, et al., A data trading scheme with efficient data usage control for industrial IoT[J]. IEEE Transactions on Industrial Informatics, 2022, 18(7): 4456-4465. DOI: 10.1109/TII.2021.3123312.
[18] ABUBAKER Z, KHAN A U, ALMOGREN A, et al. Trustful data trading through monetizing IoT data using BlockChain based review system[J]. Concurrency and Computation: Practice and Experience, 2022, 34(5): e6739. DOI: 10.1002/cpe.6739.
[19] 许璐. 分析区块链在数据交易中的应用[J]. 智库时代, 2018(44): 38-39.
[20] JAKOBSSON M, JUELS A. Proofs of work and bread pudding protocols (extended abstract)[C]// Secure Information Networks: Communications and Multimedia Security. Boston, MA: Springer, 1999: 258-272. DOI: 10.1007/978-0-387-35568-9_18.
[21] BUTERIN V. Ethereum white paper[EB/OL].(2018-05-03)[2022-11-11]. https://ethereum.org/zh/whitepaper/.
[22] HUANG Y D, ZENG Y M, YE F, et al. Fair and protected profit sharing for data trading in pervasive edge computing environments[C]// IEEE INFOCOM 2020: IEEE Conference on Computer Communications. Piscataway, NJ: IEEE, 2020: 1718-1727. DOI: 10.1109/INFOCOM41043.2020.9155399.
[23] 李敦锋, 肖瑶, 冯勇. 一种面向物联网数据交易的高效PCN路由策略[J]. 计算机科学, 2022, 49(11A): 211100010. DOI: 10.11896/jsjkx.211100010.
[24] 蔡婷, 林晖, 陈武辉, 等. 区块链赋能的高效物联网数据激励共享方案[J]. 软件学报, 2021, 32(4): 953-972. DOI: 10.13328/j.cnki.jos.006229.
[25] 张学旺, 殷梓杰, 冯家琦, 等. 基于区块链与可信计算的数据交易方案[J]. 计算机应用, 2021, 41(4): 939-944. DOI: 10.11772/j.issn.1001-9081.2020111723.
[26] DAI W Q, DAI C K, CHOO K K R, et al. SDTE: a secure blockchain-based data trading ecosystem[J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 725-737. DOI: 10.1109/TIFS.2019.2928256.
[27] REN K, GUO Y, LI J Q, et al. Hybridx: new hybrid index for volume-hiding range queries in data outsourcing services[C]// 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS). Los Alamitos, CA: IEEE Computer Society, 2020: 23-33. DOI: 10.1109/ICDCS47774.2020.00014.
[28] 李绍民, 姚远. 区块链多媒体数据版权保护方法研究[J]. 科技资讯, 2015, 13(35): 13, 15. DOI: 10.16661/j.cnki. 1672-3791.2015.35.013.
[29] 李悦, 黄俊钦, 王瑞锦. 基于区块链的数字作品DCI管控模型[J]. 计算机应用, 2017, 37(11): 3281-3287. DOI: 10.11772/j.issn.1001-9081.2017.11.3281.
[30] QURESHI A, MEGÍAS D. Blockchain-based P2P multimedia content distribution using collusion-resistant fingerprinting[C]// 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). Piscataway, NJ: IEEE, 2019: 1606-1615. DOI: 10.1109/APSIPAASC47483.2019.9023054.
[31] WANG L, LIU X F, LIN X D. A fair and privacy-preserving image trading system based on blockchain and group signature[J]. Security and Communication Networks, 2021, 2021: 5701258. DOI: 10.1155/2021/5701258.
[32] SHENG D J, XIAO M J, LIU A, et al. CPchain: a copyright-preserving crowdsourcing data trading framework based on blockchain[C]// 2020 29th International Conference on Computer Communications and Networks (ICCCN). Piscataway, NJ: IEEE, 2020: 1-9. DOI: 10.1109/ICCCN49398.2020.9209731.
[33] HUANG C, LIU D X, NI J B, et al. Achieving accountable and efficient data sharing in industrial internet of things[J]. IEEE Transactions on Industrial Informatics, 2021, 17(2): 1416-1427. DOI: 10.1109/TII.2020.2982942.
[34] 黄建华, 黄雪茹, 季钰翔, 等. 一种基于双链模型的分区共识协议[J]. 计算机应用研究, 2021, 38(2): 356-362. DOI: 10.19734/j.issn.1001-3695.2020.01.0002.
[1] BAI Shangwang, MA Xiaoqian, GAO Gaimei, LIU Chunxia, DANG Weichao. Byzantine Fault Tolerant Consensus Algorithm Based on Verifiable Random Function and BLS Signature [J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(3): 194-201.
[2] WANG Han, WANG Xu’an, ZHOU Neng, LIU Yudong. Blockchain-based Public Verifiable Scheme for Sharing Data [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 1-7.
[3] CHEN Xiong, ZHU Yu, FENG Ke, YU Tongwei. Identity Authentication of Power System Safetyand Stability Control Terminals Based on Blockchain [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 8-18.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] XU Jiu-cheng, LI Xiao-yan, LI Shuang-qun, ZHANG Ling-jun. Feature Images Retrieval Method of Tolerance Granular-basedMulti-level Texture[J]. Journal of Guangxi Normal University(Natural Science Edition), 2011, 29(1): 186 -187 .
[2] BAI Defa, XU Xin, WANG Guochang. Review of Generalized Linear Models and Classification for Functional Data[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(1): 15 -29 .
[3] ZENG Qingfan, QIN Yongsong, LI Yufang. Empirical Likelihood Inference for a Class of Spatial Panel Data Models[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(1): 30 -42 .
[4] ZHANG Xilong, HAN Meng, CHEN Zhiqiang, WU Hongxin, LI Muhang. Survey of Ensemble Classification Methods for Complex Data Stream[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(4): 1 -21 .
[5] TONG Lingchen, LI Qiang, YUE Pengpeng. Research Progress and Prospects of Karst Soil Organic Carbon Based on CiteSpace[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(4): 22 -34 .
[6] WANG Dangshu, YI Jiaan, DONG Zhen, YANG Yaqiang, DENG Xuan. Research on Bridgeless Boost PFC Converter with Ripple Suppression Unit Based on Single Cycle Control[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(4): 47 -57 .
[7] YU Siting, PENG Jingjing, PENG Zhenyun. Rank Constraint Least Square Symmetric Semidefinite Solutions and Its Optimal Approximation of the Matrix Equation[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(4): 136 -144 .
[8] QIN Chengfu, MO Fenmei. Structure ofC3-and C4-Critical Graphs[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(4): 145 -153 .
[9] YIN Yudong, KE Shanzhe, HUANG Jiayan, DENG Mengxiang, LIU Guanyan, CHENG Keguang. One-pot Generation of Allylated Products from Alcohols, Carboxylic Acids and Amines with 1,3-Dibromopropane by Sodium Hydride[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(4): 154 -161 .
[10] DU Libo, LI Jinyu, ZHANG Xiao, LI Yonghong, PAN Weidong. Chemical Constituents and Biological Activity from the Bark of Toona ciliata var. pubescens[J]. Journal of Guangxi Normal University(Natural Science Edition), 2022, 40(4): 162 -172 .