Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3318464.3380594acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article
Public Access

FalconDB: Blockchain-based Collaborative Database

Published: 31 May 2020 Publication History

Abstract

Nowadays an emerging class of applications are based oncollaboration over a shared database among different entities. However, the existing solutions on shared database may require trust on others, have high hardware demand that is unaffordable for individual users, or have relatively low performance. In other words, there is a trilemma among security, compatibility and efficiency. In this paper, we present FalconDB, which enables different parties with limited hardware resources to efficiently and securely collaborate on a database. FalconDB adopts database servers with verification interfaces accessible to clients and stores the digests for query/update authentications on a blockchain. Using blockchain as a consensus platform and a distributed ledger, FalconDB is able to work without any trust on each other. Meanwhile, FalconDB requires only minimal storage cost on each client, and provides anywhere-available, real-time and concurrent access to the database. As a result, FalconDB over-comes the disadvantages of previous solutions, and enables individual users to participate in the collaboration with high efficiency, low storage cost and blockchain-level security guarantees.

Supplementary Material

MP4 File (3318464.3380594.mp4)
Presentation Video

References

[1]
M. Al-Bassam, A. Sonnino, S. Bano, D. Hrycyszyn, and G. Danezis. Chainspace: A sharded smart contracts platform. In NDSS. The Internet Society, 2018.
[2]
E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, page 30. ACM, 2018.
[3]
A. Arasu, K. Eguro, R. Kaushik, D. Kossmann, P. Meng, V. Pandey, and R. Ramamurthy. Concerto: A high concurrency key-value store with integrity. In SIGMOD Conference, pages 251--266. ACM, 2017.
[4]
M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara. Private collaborative forecasting and benchmarking. In Proceedings of the 2004 ACM workshop on Privacy in the electronic society, pages 103--114. ACM, 2004.
[5]
M. J. Atallah, H. G. Elmongui, V. Deshpande, and L. B. Schwarz. Secure supply-chain protocols. In E-Commerce, 2003. CEC 2003. IEEE International Conference on, pages 293--302. IEEE, 2003.
[6]
M. Backes, D. Fiore, and R. M. Reischuk. Verifiable delegation of computation on outsourced data. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 863--874. ACM, 2013.
[7]
D. Billsus and M. J. Pazzani. Learning collaborative information filters. In Icml, volume 98, pages 46--54, 1998.
[8]
E. Buchman, J. Kwon, and Z. Milosevic. The latest gossip on bft consensus. https://tendermint.com/docs/tendermint.pdf, 2018.
[9]
P. Camacho and A. Hevia. On the impossibility of batch update for cryptographic accumulators. In International Conference on Cryptology and Information Security in Latin America, pages 178--188. Springer, 2010.
[10]
R. Canetti, O. Paneth, D. Papadopoulos, and N. Triandopoulos. Verifiable set operations over outsourced databases. In International Workshop on Public Key Cryptography, pages 113--130. Springer, 2014.
[11]
B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears. Benchmarking cloud serving systems with YCSB. In SoCC, pages 143--154. ACM, 2010.
[12]
P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. G. Stubblebine. Flexible authentication of xml documents. Journal of Computer Security, 12(6):841--864, 2004.
[13]
DONOR SEARCH. The largest searchable charitable giving database, 2018. [Online; accessed 12-October-2018].
[14]
W. Du and M. J. Atallah. Privacy-preserving cooperative scientific computations. In csfw, page 0273. IEEE, 2001.
[15]
D. Duplyakin, R. Ricci, A. Maricq, G. Wong, J. Duerig, E. Eide, L. Stoller, M. Hibler, D. Johnson, K. Webb, A. Akella, K. Wang, G. Ricart, L. Landweber, C. Elliott, M. Zink, E. Cecchet, S. Kar, and P. Mishra. The design and operation of CloudLab. In Proceedings of the USENIX Annual Technical Conference (ATC), pages 1--14, July 2019.
[16]
I. Eyal and E. G. Sirer. Majority is not enough: bitcoin mining is vulnerable. Commun. ACM, 61(7):95--102, 2018.
[17]
Federal Audit Clearinghouse (FAC). Federal Audit Clearinghouse (FAC). https://harvester.census.gov/facweb/. [Online; accessed 25-October-2018].
[18]
C. Fournet, M. Kohlweiss, G. Danezis, Z. Luo, et al. Zql: A compiler for privacy-preserving data processing. In USENIX Security Symposium, pages 163--178, 2013.
[19]
J. Gehrke, L. Allen, P. Antonopoulos, A. Arasu, J. Hammer, J. Hunter, R. Kaushik, D. Kossmann, R. Ramamurthy, S. T. V. Setty, J. Szymaszek, A. van Renen, J. Lee, and R. Venkatesan. Veritas: Shared verifiable databases and tables in the cloud. In CIDR. www.cidrdb.org, 2019.
[20]
Y. Gilad, R. Hemo, S. Micali, G. Vlachos, and N. Zeldovich. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles, pages 51--68. ACM, 2017.
[21]
M. T. Goodrich, R. Tamassia, and N. Triandopoulos. Efficient authenticated data structures for graph connectivity and geometric search problems. Algorithmica, 60(3):505--552, 2011.
[22]
S. Hu, C. Cai, Q. Wang, C. Wang, X. Luo, and K. Ren. Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization. In INFOCOM, pages 792--800. IEEE, 2018.
[23]
E. Kokoris-Kogias, P. Jovanovic, L. Gasser, N. Gailly, E. Syta, and B. Ford. Omniledger: A secure, scale-out, decentralized ledger via sharding. In IEEE Symposium on Security and Privacy, pages 583--598. IEEE, 2018.
[24]
A. E. Kosba, D. Papadopoulos, C. Papamanthou, M. F. Sayed, E. Shi, and N. Triandopoulos. Trueset: Faster verifiable set computations. In USENIX Security Symposium, pages 765--780, 2014.
[25]
R. Kumaresan and I. Bentov. How to use bitcoin to incentivize correct computations. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 30--41. ACM, 2014.
[26]
L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS), 4(3):382--401, 1982.
[27]
C. Li, P. Li, W. Xu, F. Long, and A. C. Yao. Scaling nakamoto consensus to thousands of transactions per second. CoRR, abs/1805.03870, 2018.
[28]
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic authenticated index structures for outsourced databases. In SIGMOD, pages 121--132, 2006.
[29]
F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Authenticated index structures for aggregation queries. ACM Trans. Inf. Syst. Secur., 13(4):32:1--32:35, 2010.
[30]
Z. Liu, N. C. Luong, W. Wang, D. Niyato, P. Wang, Y. Liang, and D. I. Kim. A survey on applications of game theory in blockchain. CoRR, abs/1902.10865, 2019.
[31]
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. G. Stubblebine. A general model for authenticated data structures. Algorithmica, 39(1):21--41, 2004.
[32]
K. Mast, L. Chen, and E. G. Sirer. A vision for autonomous blockchains backed by secure hardware. In SysTEX@SOSP, pages 1:1--1:6. ACM, 2019.
[33]
T. McConaghy, R. Marques, A. Müller, D. De Jonghe, T. McConaghy, G. McMullen, R. Henderson, S. Bellemare, and A. Granzotto. Bigchaindb: a scalable blockchain database. white paper, BigChainDB, 2016.
[34]
A. Miller, M. Hicks, J. Katz, and E. Shi. Authenticated data structures, generically. In ACM SIGPLAN Notices, volume 49, pages 411--423. ACM, 2014.
[35]
S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.
[36]
D. Papadopoulos, S. Papadopoulos, and N. Triandopoulos. Taking authenticated range queries to arbitrary dimensions. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 819--830. ACM, 2014.
[37]
D. Papadopoulos, C. Papamanthou, R. Tamassia, and N. Triandopoulos. Practical authenticated pattern matching with optimal proof size. Proceedings of the VLDB Endowment, 8(7):750--761, 2015.
[38]
C. Papamanthou, R. Tamassia, and N. Triandopoulos. Optimal verification of operations on dynamic sets. In Annual Cryptology Conference, pages 91--110. Springer, 2011.
[39]
B. M. Platz, A. F. Filipowski, and K. Doubleday. Flureedb, a practical decentralized database. https://flur.ee/assets/pdf/flureedb_whitepaper_v1.pdf, 2017.
[40]
G. Sachs. Blockchain--putting theory into practice. the-blockchain. com, pages 25--32, 2016.
[41]
Y. Sompolinsky, Y. Lewenberg, and A. Zohar. Spectre: A fast and scalable cryptocurrency protocol. IACR Cryptology ePrint Archive, 2016:1159, 2016.
[42]
E. Syta, P. Jovanovic, E. Kokoris-Kogias, N. Gailly, L. Gasser, I. Khoffi, M. J. Fischer, and B. Ford. Scalable bias-resistant distributed randomness. In IEEE Symposium on Security and Privacy, pages 444--460. IEEE Computer Society, 2017.
[43]
A. Wiggins and K. Crowston. From conservation to crowdsourcing: A typology of citizen science. In System Sciences (HICSS), 2011 44th Hawaii international conference on, pages 1--10. IEEE, 2011.
[44]
G. Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151:1--32, 2014.
[45]
C. Xu, C. Zhang, and J. Xu. vChain: Enabling verifiable boolean range queries over blockchain databases. In Proceedings of the 2019 ACM SIGMOD International Conference on Management of Data, Amsterdam, Netherlands, June 2019.
[46]
Y. Yang, D. Papadias, S. Papadopoulos, and P. Kalnis. Authenticated join processing in outsourced databases. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pages 5--18. ACM, 2009.
[47]
M. Yin, D. Malkhi, M. K. Reiter, G. Golan-Gueta, and I. Abraham. Hotstuff: BFT consensus with linearity and responsiveness. In PODC, pages 347--356. ACM, 2019.
[48]
C. Zhang, C. Xu, J. Xu, Y. Tang, and B. Choi. GEM2-Tree: A gas-efficient structure for authenticated range queries in blockchain. In Proceedings of the 35th IEEE International Conference on Data Engineering, pages 842--853, Macau SAR, China, Apr. 2019.
[49]
Y. Zhang, D. Genkin, J. Katz, D. Papadopoulos, and C. Papamanthou. vsql: Verifying arbitrary SQL queries over dynamic outsourced databases. In IEEE Symposium on Security and Privacy, pages 863--880. IEEE Computer Society, 2017.
[50]
Y. Zhang, J. Katz, and C. Papamanthou. IntegriDB: Verifiable SQL for Outsourced Databases. In ACM Conference on Computer and Communications Security, pages 1480--1491. ACM, 2015.
[51]
Y. Zhang, C. Papamanthou, and J. Katz. Alitheia: Towards practical verifiable graph processing. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 856--867. ACM, 2014.
[52]
Q. Zheng, S. Xu, and G. Ateniese. Efficient query integrity for outsourced dynamic databases. In Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, pages 71--82. ACM, 2012.
[53]
T. Zhu, Z. Zhao, F. Li, W. Qian, A. Zhou, D. Xie, R. Stutsman, H. Li, and H. Hu. Solar: Towards a shared-everything database on distributed log-structured storage. In USENIX Annual Technical Conference, pages 795--807. USENIX Association, 2018.
[54]
ZILLIQA. The zilliqa technical whitepaper. https://docs.zilliqa.com/whitepaper.pdf, 2017.

Cited By

View all
  • (2025)On Enhancing E-Commerce Shipping Policies with Blockchain and Recommender SystemsSN Computer Science10.1007/s42979-025-03687-x6:2Online publication date: 6-Feb-2025
  • (2025)An on-chain and off-chain collaborative data sharing and access control model for electronic medical recordsThe Journal of Supercomputing10.1007/s11227-024-06884-281:2Online publication date: 17-Jan-2025
  • (2024)COLEProceedings of the 22nd USENIX Conference on File and Storage Technologies10.5555/3650697.3650717(329-346)Online publication date: 27-Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '20: Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data
June 2020
2925 pages
ISBN:9781450367356
DOI:10.1145/3318464
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 May 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. blockchain
  2. collaborative database
  3. data integrity

Qualifiers

  • Research-article

Funding Sources

Conference

SIGMOD/PODS '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)804
  • Downloads (Last 6 weeks)88
Reflects downloads up to 06 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)On Enhancing E-Commerce Shipping Policies with Blockchain and Recommender SystemsSN Computer Science10.1007/s42979-025-03687-x6:2Online publication date: 6-Feb-2025
  • (2025)An on-chain and off-chain collaborative data sharing and access control model for electronic medical recordsThe Journal of Supercomputing10.1007/s11227-024-06884-281:2Online publication date: 17-Jan-2025
  • (2024)COLEProceedings of the 22nd USENIX Conference on File and Storage Technologies10.5555/3650697.3650717(329-346)Online publication date: 27-Feb-2024
  • (2024)Towards Trust and Reputation as a Service in Society 5.0Smart Cities10.3390/smartcities70501037:5(2645-2669)Online publication date: 13-Sep-2024
  • (2024)TPGraph: A Highly-scalable Time-partitioned Graph Model for Tracing BlockchainProceedings of the 17th ACM International Systems and Storage Conference10.1145/3688351.3689161(25-38)Online publication date: 16-Sep-2024
  • (2024)Authenticated Range Querying of Historical Blockchain Healthcare Data Using Authenticated Multi-Version IndexDistributed Ledger Technologies: Research and Practice10.1145/36245753:2(1-31)Online publication date: 18-Jun-2024
  • (2024)Enhancing Digital Citizenship Through Secure Identification Technologies in the Global Unified Digital Passport2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies10.1109/TQCEBT59414.2024.10545059(1-5)Online publication date: 22-Mar-2024
  • (2024)Enabling Secure and Traceable Query Services for Internet of Things Using BlockchainIEEE Transactions on Network and Service Management10.1109/TNSM.2024.337104821:3(3112-3123)Online publication date: Jun-2024
  • (2024)Stable Byzantine Fault Tolerance in Wide Area Networks With Unreliable LinksIEEE/ACM Transactions on Networking10.1109/TNET.2024.346187232:6(5310-5325)Online publication date: Dec-2024
  • (2024)CoralDB: A Collaborative Database for Data Sharing Based on Permissioned BlockchainIEEE Transactions on Mobile Computing10.1109/TMC.2024.335749923:9(8886-8901)Online publication date: Sep-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media