Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3342559.3365333acmotherconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

A vision for autonomous blockchains backed by secure hardware

Published: 27 October 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Blockchains have emerged as a potential mechanism to enable immutable and consistent sharing of data across organizational boundaries. While much of the discussion on blockchains to date has been structured around public versus permissioned blockchains, both of these architectures have significant drawbacks. Public blockchains are energy inefficient, hard to scale and suffer from limited throughput and high latencies, while permissioned blockchains depend on specially designated nodes, potentially leak metainformation, and also suffer from scale and performance bottlenecks. This raises the question if blockchains, in their current form, are the only class of datastores that can provide such strong integrity guarantees.
    We introduce autonomous blockchains, an architecture based on free-standing, immutable, eidetic databases that implement independent timelines, linked together through interactions. Autonomous blockchains can be realized using trusted execution environments in combination with audit mechanisms. This architecture does not only provide block-chain-like integrity and auditability guarantees but also supports storing and querying private data. Further, multiple autonomous blockchains can be linked together through federated transactions to exchange data and order mutual operations. These transactions are amenable to audits and yield tamper-proof witnesses. Evaluation shows that this design can achieve high throughput while providing stronger integrity guarantees than conventional datastores.

    References

    [1]
    Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravishankar Ramamurthy, and Ramarathnam Venkatesan. Orthogonal Security with Cipherbase. CIDR, 2013.
    [2]
    Arvind Arasu, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ping-fan Meng, Vineet Pandey, and Ravi Ramamurthy. Concerto: A High Concurrency Key-Value Store with Integrity. Proceedings of the 2017 ACM International Conference on Management of Data, pages 251--266, 2017.
    [3]
    Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, Rüdiger Kapitza, Peter Pietzuch, and Christof Fetzer. SCONE: Secure Linux Containers with Intel SGX. Symposium on Operating System Design and Implementation, pages 689--703, Savannah, Georgia, November 2016.
    [4]
    Sumeet Bajaj and Radu Sion. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. IEEE Transactions on Knowledge and Data Engineering, 26(3):752--765, 2014.
    [5]
    Iddo Bentov, Rafael Pass, and Elaine Shi. The Sleepy Model of Consensus. IACR Cryptology ePrint Archive, 2016.
    [6]
    Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient out-of-order execution. 27th {USENIX} Security Symposium ({USENIX} Security 18), 2018.
    [7]
    Christian Cachin. Architecture of the Hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers, 2016.
    [8]
    Miguel Castro, Barbara Liskov, and others. Practical Byzantine fault tolerance. Symposium on Operating System Design and Implementation, pages 173--186, New Orleans, Louisiana, February 1999.
    [9]
    Byung-Gon Chun, Petros Maniatis, Scott Shenkert, and John Kubiatowicz. Attested Append-only Memory: Making Adversaries Stick to Their Word. Symposium on Operating Systems Principles, pages 189--204, Stevenson, Washington, October 2007.
    [10]
    Victor Costan and Srinivas Devadas. Intel SGX Explained. IACR Cryptology ePrint Archive, 2016:86, 2016.
    [11]
    Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, and others. On scaling decentralized blockchains. International Conference on Financial Cryptography and Data Security, pages 106--125, 2016.
    [12]
    Cynthia Dwork. Ask a better question, get a better answer: A new approach to private data analysis. ICDT, pages 18--27, 2007.
    [13]
    Ariel Ekblaw, Asaph Azaria, John D. Halamka, and Andrew Lippman. A Case Study for Blockchain in Healthcare: "MedRec" prototype for electronic health records and medical research data. Proceedings of IEEE Open & Big Data Conference, 2016.
    [14]
    Andreas Haeberlen, Petr Kouznetsov, and Peter Druschel. PeerReview: Practical Accountability for Distributed Systems. Symposium on Operating Systems Principles, pages 175--188, Stevenson, Washington, October 2007.
    [15]
    Maurice P. Herlihy and Jeannette M. Wing. Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst., pages 463--492, 1990.
    [16]
    Tyler Hunt, Zhiting Zhu, Yuanzhong Xu, Simon Peter, and Emmett Witchel. Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data. Symposium on Operating System Design and Implementation, pages 533--549, Savannah, Georgia, November 2016.
    [17]
    Taehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh. ShieldStore: Shielded In-memory Key-value Storage with SGX. European Conference on Computer Systems, 2019.
    [18]
    Paul Kocher, Jann Horn, Anders Fogh, and Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. Spectre Attacks: Exploiting Speculative Execution. 40th IEEE Symposium on Security and Privacy (S&P'19), 2019.
    [19]
    Ramakrishna Kotla, Lorenzo Alvisi, Mike Dahlin, Allen Clement, and Edmung Wong. Zyzzyva: Speculative byzantine fault tolerance. ACM SIGOPS Operating Systems Review, pages 45--58, 2007.
    [20]
    Robert Krahn, Bohdan Trach, Anjo Vahldiek-Oberwagner, Thomas Knauth, Pramod Bhatotia, and Christof Fetzer. PESOS: Policy Enhanced Secure Object Store. European Conference on Computer Systems, 2018.
    [21]
    Dave Levin, John R. Douceur, Jacob R. Lorch, and Thomas Moscibroda. TrInc: Small Trusted Hardware for Large Distributed Systems. Symposium on Networked System Design and Implementation, pages 1--14, Boston, Massachusetts, April 2009.
    [22]
    Feifei Li, Marios Hadjieleftheriou, George Kollios, and Leonid Reyzin. Dynamic authenticated index structures for outsourced databases. SIGMOD International Conference on Management of Data, pages 121--132, Chicago, Illinois, June 2006.
    [23]
    Jinyuan Li, Maxwell N. Krohn, David Mazières, and Dennis Shashas. Secure Untrusted Data Repository (SUNDR). Symposium on Operating System Design and Implementation, San Francisco, California, December 2004.
    [24]
    Jinyuan Li and David Mazières. Beyond One-Third Faulty Replicas in Byzantine Fault Tolerant Systems. Symposium on Networked System Design and Implementation, Cambridge, Massachusetts, April 2007.
    [25]
    Jed Liu, Michael D. George, K. Vikram, Xin Qi, Lucas Waye, and Andrew C. Myers. Fabric: A Platform for Secure Distributed Computation and Storage. Symposium on Operating Systems Principles, pages 321--334, Big Sky, Montana, October 2009.
    [26]
    Umesh Maheshwari, Radek Vingralek, and William Shapiro. How to build a trusted database system on untrusted storage. Symposium on Operating System Design and Implementation, San Diego, California, October 2000.
    [27]
    Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. The honey badger of BFT protocols. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 31--42, 2016.
    [28]
    JP Morgan. Quorum. https://www.jpmorgan.com/global/Quorum, 2017.
    [29]
    Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008.
    [30]
    Raluca Ada Popa, Nickolai Zeldovich, and Hari Balakrishnan. CryptDB: A practical encrypted relational DBMS. ACM, Technical Report, 2011.
    [31]
    Christina Priebe, Kapil Vaswan, and Manuel Costa. EnclaveDB: A Secure Database using SGX. EnclaveDB: A Secure Database using SGX, 2018.
    [32]
    Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, and Stefan Mangard. Malware guard extension: Using SGX to conceal cache attacks. arXiv preprint arXiv:1702.08719, 2017.
    [33]
    Stephen Tu, Frans M. Kaashoek, Samuel Madden, and Nickolai Zeldovich. Processing analytical queries over encrypted data. International Conference on Very Large Data Bases, pages 289--300, 2013.
    [34]
    Anjo Vahldiek-Oberwagner, Eslam Elnikety, Aastha Mehta, Deepak Garg, Peter Druschel, Rodrigo Rodrigues, Johannes Gehrke, and Ansley Post. Guardat: Enforcing data policies at the storage layer. European Conference on Computer Systems, page 13, 2015.
    [35]
    Shawn Wilkinson, Jim Lowry, and Tome Boshevski. Metadisk a blockchain-based decentralized file storage application. STORJ, Technical Report, 2014.
    [36]
    Gavin Wood. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151, 2014.
    [37]
    Aydan R. Yumerefendi and Jeffrey S. Chase. Strong Accountability for Network Storage. Trans. Storage, 3(3), 2007.
    [38]
    Wenting Zhang, Dave Ankur, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. Opaque: An Oblivious and Encrypted Distributed Analytics Platform. Symposium on Networked System Design and Implementation, pages 283--298, Boston, Massachusetts, March 2017.
    [39]
    Guy Zyskindand, Nathan Oz, and others. Decentralizing privacy: Using blockchain to protect personal data. Security and Privacy Workshops (SPW), 2015 IEEE, pages 180--184, 2015.

    Cited By

    View all
    • (2023)Intel Software Guard Extensions Applications: A SurveyACM Computing Surveys10.1145/359302155:14s(1-38)Online publication date: 17-Jul-2023

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SysTEX '19: Proceedings of the 4th Workshop on System Software for Trusted Execution
    October 2019
    42 pages
    ISBN:9781450368889
    DOI:10.1145/3342559
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 October 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    SOSP '19

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)2

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Intel Software Guard Extensions Applications: A SurveyACM Computing Surveys10.1145/359302155:14s(1-38)Online publication date: 17-Jul-2023

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media