Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain

Published: 05 January 2021 Publication History

Abstract

In blockchain networks, reaching effective supervision while maintaining anonymity to the public has been an ongoing challenge. In existing solutions, certification authorities need to record all pairs of identities and pseudonyms, which is demanding and costly. This article proposed an account guarantee scheme to realize feasible supervision for existing anonymous blockchain networks with lower storage costs. Users are able to guarantee anonymous accounts with account guarantee key pairs generated from certificated polynomial functions, which inherently maintains one-to-n mapping certifications. Single or limited account guarantee key pairs do not leak privacy. Victims are able to request TCs to screen a cheater or disclose a cheater with enough fraud transactions by themselves. Detailed security and privacy analysis showed that the account guarantee scheme preserves user privacy and realizes feasible supervision. Experimental results demonstrated that the account guarantee scheme is efficient and practical.

References

[1]
Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 459--474.
[2]
Weili Chen, Zibin Zheng, Jiahui Cui, Edith Ngai, Peilin Zheng, and Yuren Zhou. 2018. Detecting Ponzi schemes on Ethereum: Towards healthier blockchain technology. In Proceedings of the World Wide Web Conference, Vol. 4. ACM, 1409--1418.
[3]
Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, and Wei Wang. 2019. Polynomial-based modifiable blockchain structure for removing fraud transactions. Fut. Gen. Comput. Syst. 99 (Oct. 2019), 154--163.
[4]
Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, and Wei Wang. 2019. SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs. IEEE Trans. Computat. Soc. Syst. (2019), 1--10.
[5]
Christian Cachin. 2016. Architecture of the Hyperledger Blockchain Fabric. Retrieved from https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf.
[6]
Hong-Ning Dai, Zibin Zheng, and Yan Zhang. 2019. Blockchain for Internet of Things: A survey. IEEE Internet Things J. 6, 5 (2019), 8076--8094.
[7]
Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, and Ji Wang. 2018. Untangling blockchain: A data processing view of blockchain systems. IEEE Trans. Knowl. Data Eng. 30, 7 (2018), 1366--1385.
[8]
Ethereum. 2018. Ethereum Project. Retrieved from https://www.ethereum.org/.
[9]
Michael Fleder, Michael S. Kester, and Sudeep Pillai. 2015. Bitcoin transaction graph analysis. arXiv (2015), 1--8. arxiv:1502.01657v1
[10]
Thomas Hardjono and Alex Pentland. 2019. Verifiable anonymous identities and access control in permissioned blockchains. Retrieved from http://connection.mit.edu/wp-content/uploads/sites/29/2014/12/ChainAnchor-Identities-04172016.pdf.
[11]
Nicholas J. Higham. 2004. The numerical stability of barycentric Lagrange interpolation. IMA J. Numer. Anal. 24, 4 (Oct. 2004), 547--556. Retrieved from https://academic.oup.com/imajna/article-abstract/24/4/547/687371
[12]
Yutao Jiao, Ping Wang, Dusit Niyato, and Kongrath Suankaewmanee. 2019. Auction mechanisms in cloud/fog computing resource allocation for public blockchain networks. IEEE Trans. Parallel Distrib. Syst. 30, 9 (2019), 1975--1989.
[13]
Nam-Yong Lee, Jinhong Yang, Md Mehedi Hassan Onik, and Chul-Soo Kim. 2019. Modifiable public blockchains using truncated hashing and sidechains. IEEE Access 7 (2019), 173571--173582.
[14]
Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, and Xiangliang Zhang. 2018. CreditCoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. IEEE Trans. Intell. Transport. Syst. 19, 7 (July 2018), 2204--2220.
[15]
Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang, and Xiangliang Zhang. 2020. Privacy risk analysis and mitigation of analytics libraries in the Android ecosystem. IEEE Trans. Mob. Comput. 19, 5 (May 2020), 1184--1199.
[16]
Yinqiu Liu, Kun Wang, Yun Lin, and Wenyao Xu. 2019. LightChain: A lightweight blockchain system for industrial Internet of Things. IEEE Trans. Industr. Inform. 15, 6 (2019), 3571--3581.
[17]
R. Lowen. 1990. A fuzzy Lagrange interpolation theorem. Fuzzy Sets Syst. 34, 1 (Jan. 1990), 33--38.
[18]
Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, and Aquinas Hobor. 2016. Making smart contracts smarter. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). ACM Press, New York, NY, 254--269.
[19]
E. Meijering. 2002. A chronology of interpolation: From ancient astronomy to modern signal and image processing. Proc. IEEE, Vol. 90. 319--342.
[20]
Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 397--411.
[21]
Monero. 2018. Monero—Secure, private, untraceable. Retrieved from https://getmonero.org/.
[22]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Www.Bitcoin.Org (2008). arxiv:43543534534v343453.
[23]
Abdullah Al Omar, Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Mohammad Shahriar Rahman. 2019. Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Fut. Gen. Comput. Syst. 95 (June 2019), 511--521.
[24]
Serguei Popov. 2018. The Tangle. Retrieved from https://assets.ctfassets.net/r1dr6vzfxhev/2t4uxvsIqk0EUau6g2sw0g/45eae33637ca92f85dd9f4a3a218e1ec/iota1_4_3.pdf.
[25]
Ripple. 2018. Ripple—One Frictionless Experience to Send Money Globally | Ripple. Retrieved from https://ripple.com/.
[26]
Khaled Salah, M. Habib Ur Rehman, Nishara Nizamuddin, and Ala Al-Fuqaha. 2019. Blockchain for AI: Review and open research challenges. IEEE Access 7 (2019), 10127--10149.
[27]
Thomas Sauer and Yuan Xu. 1995. On multivariate Lagrange interpolation. Math. Comp. 64, 211 (Sept. 1995), 1147--1147.
[28]
David Schwartz, Noah Youngs, and Arthur Britto. 2014. The ripple protocol consensus algorithm. Retrieved from https://ripple.com/files/ripple_consensus_whitepaper.pdf.
[29]
Mohammad Shahriar Rahman, Abdullah Al Omar, Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Guojon Wang. 2020. Accountable cross-border data sharing using blockchain under relaxed trust assumption. IEEE Trans. Eng. Manag. (2020).
[30]
Michele Spagnuolo, Federico Maggi, and Stefano Zanero. 2014. Bitiodine: Extracting intelligence from the bitcoin network. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8437. Springer Verlag, 457--468.
[31]
Qi Tao, Xiaohui Cui, Xiaofang Huang, Angella M. Leigh, and Hehe Gu. 2019. Food safety supervision system based on hierarchical multi-domain blockchain network. IEEE Access 7 (2019), 51817--51826.
[32]
Buterin Vitalik. 2016. CRITICAL UPDATE Re: DAO Vulnerability—Ethereum Blog. Retrieved from https://blog.ethereum.org/2016/06/17/critical-update-re-dao-vulnerability/.
[33]
Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, and Xiangliang Zhang. 2018. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Fut. Gen. Comput. Syst. 78 (Jan. 2018), 987--994.
[34]
Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, and Jiqiang Liu. 2020. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511 (Feb. 2020), 284--296.
[35]
Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, and Chunhua Su. 2020. ContractWard: Automated vulnerability detection models for ethereum smart contracts. IEEE Trans. Netw. Sci. Eng. (Jan. 2020), 1--1.
[36]
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang. 2014. Exploring permission-induced risk in Android applications for malicious application detection. IEEE Trans. Inf. Forens. Secur. 9, 11 (Nov. 2014), 1869--1882.
[37]
Wei Wang, Mengxue Zhao, and Jigang Wang. 2019. Effective Android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J. Amb. Intell. Humaniz. Comput. 10, 8 (Aug. 2019), 3035--3043.
[38]
E. Waring. 1779. Problems concerning Interpolations. By Edward Waring, M. D. F. R. S. and of the Institute of Bononia, Lucasian Professor of Mathematics in the University of Cambridge. Philos. Trans. Roy. Soc. London 69, 0 (Jan. 1779), 59--67.
[39]
Mingli Wu, Kun Wang, Xiaoqin Cai, Song Guo, Minyi Guo, and Chunming Rong. 2019. A comprehensive survey of blockchain: From theory to IoT applications and beyond. IEEE Internet Things J. 6, 5 (2019), 8114--8154.
[40]
Zehui Xiong, Shaohan Feng, Wenbo Wang, Dusit Niyato, Ping Wang, and Zhu Han. 2019. Cloud/fog computing resource management and pricing for blockchain networks. IEEE Internet Things J. 6, 3 (2019), 4585--4600.
[41]
Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Xiangping Chen, and Huaimin Wang. 2018. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 14, 4 (2018), 352--375.

Cited By

View all
  • (2023)A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of thingsInformation Sciences10.1016/j.ins.2022.11.169623(293-310)Online publication date: Apr-2023
  • (2021)Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group SignatureProceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications10.1145/3491396.3506528(223-228)Online publication date: 28-Dec-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 21, Issue 1
Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
February 2021
534 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3441681
  • Editor:
  • Ling Liu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 January 2021
Accepted: 01 June 2020
Revised: 01 May 2020
Received: 01 December 2019
Published in TOIT Volume 21, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. anonymity
  3. polynomial function
  4. supervision

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Central Universities of China
  • Major Scientific and Technological Innovation Projects of Shandong Province, China
  • Natural Science Foundation of China
  • State Scholarship Fund of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of thingsInformation Sciences10.1016/j.ins.2022.11.169623(293-310)Online publication date: Apr-2023
  • (2021)Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group SignatureProceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications10.1145/3491396.3506528(223-228)Online publication date: 28-Dec-2021

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media