BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation
Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose...
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 18; no. 11; p. 3785 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI
05.11.2018
MDPI AG |
Subjects | |
Online Access | Get full text |
ISSN | 1424-8220 1424-8220 |
DOI | 10.3390/s18113785 |
Cover
Abstract | Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs. |
---|---|
AbstractList | Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs. Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs.Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs. |
Author | Ai, Tianyi Sun, Yiru Zhou, Lijing Wang, Licheng |
AuthorAffiliation | State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; zhoulj@bupt.edu.cn (L.Z.); aitianyi@bupt.edu.cn (T.A.); syr_2015@bupt.edu.cn (Y.S.) |
AuthorAffiliation_xml | – name: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; zhoulj@bupt.edu.cn (L.Z.); aitianyi@bupt.edu.cn (T.A.); syr_2015@bupt.edu.cn (Y.S.) |
Author_xml | – sequence: 1 givenname: Lijing orcidid: 0000-0001-7792-2669 surname: Zhou fullname: Zhou, Lijing – sequence: 2 givenname: Licheng surname: Wang fullname: Wang, Licheng – sequence: 3 givenname: Tianyi orcidid: 0000-0001-6763-4129 surname: Ai fullname: Ai, Tianyi – sequence: 4 givenname: Yiru surname: Sun fullname: Sun, Yiru |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/30400673$$D View this record in MEDLINE/PubMed |
BookMark | eNplkstu1TAQhi1URC-w4AVQlrBI61schwUSPWrpEZVYUHZIli-THhcnTu0EdN4ew2mrFuTFWJ5_vl-emUO0N8YREHpN8DFjHT7JRBLCWtk8QweEU15LSvHeo_s-Osz5BmPKGJMv0D7DHGPRsgP0_RTgM8AEqaLH-H21imPvHYyz16E6DdH-sBvtx_ps1CaAq9bxqvq6zTMM1S8_b6rzJYRtdRGHctK08bYQhmmZ9ezj-BI973XI8OouHqFv52dXq4v68sun9erjZW05J3OtwZFGU0saaiQljoKgpje0dVQ3sjMGHHeWdqQH3tKWO2FKxG3XaCZJR9gRWu-4LuobNSU_6LRVUXv19yGma6XT7G0AxantGC6fF6zhQmJDDMOubzvCjQNpCuvDjjUtZgBnSyuSDk-gTzOj36jr-FMJKpiQogDe3gFSvF0gz2rw2UIIeoS4ZEUJwxLTVuAiffPY68HkfjxFcLIT2BRzTtAr63etLdY-KILVnwVQDwtQKt79U3EP_V_7G_4hrpw |
CitedBy_id | crossref_primary_10_1007_s11227_022_04586_1 crossref_primary_10_1155_2021_5565663 crossref_primary_10_1186_s13638_021_01986_4 crossref_primary_10_3390_fi11030076 crossref_primary_10_1109_JAS_2023_123870 crossref_primary_10_3390_s19092005 crossref_primary_10_1016_j_trc_2020_01_002 crossref_primary_10_2196_13592 crossref_primary_10_1016_j_tele_2022_101812 crossref_primary_10_1587_transfun_2021CIP0021 crossref_primary_10_3390_fi13080217 crossref_primary_10_1109_ACCESS_2021_3129697 crossref_primary_10_3390_electronics11142200 crossref_primary_10_1016_j_jnca_2022_103465 crossref_primary_10_1016_j_cosrev_2020_100360 crossref_primary_10_3390_s19081935 crossref_primary_10_1002_ett_3741 |
Cites_doi | 10.1145/3190508.3190538 10.1504/IJWGS.2018.095647 10.1007/s102070100002 10.22161/ijaers.4.4.12 10.1109/ACCESS.2018.2883775 10.1109/ACCESS.2017.2757955 10.1109/ANTS.2017.8384164 10.1145/3054977.3055003 10.5220/0006688601050113 10.23919/ICACT.2017.7890132 10.1109/ICSE-C.2017.60 10.1007/978-3-540-24654-1_13 10.1371/journal.pone.0098790 10.14722/ndss.2019.23272 10.1109/PERCOMW.2017.7917634 10.1109/ICWS.2017.54 10.1109/ACCESS.2018.2847632 10.1007/3-540-45325-3_8 10.1007/978-3-319-46568-5_53 10.1109/ICCNC.2018.8390280 10.1145/3205977.3205993 |
ContentType | Journal Article |
Copyright | 2018 by the authors. 2018 |
Copyright_xml | – notice: 2018 by the authors. 2018 |
DBID | AAYXX CITATION NPM 7X8 5PM DOA |
DOI | 10.3390/s18113785 |
DatabaseName | CrossRef PubMed MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed MEDLINE - Academic |
DatabaseTitleList | CrossRef PubMed MEDLINE - Academic |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_42c9300066354680b1b30df7914bde8b PMC6263686 30400673 10_3390_s18113785 |
Genre | Journal Article |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61502048 |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS ADRAZ AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IPNFZ KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RIG RNS RPM TUS UKHRP XSB ~8M NPM PJZUB PPXIY 7X8 PUEGO 5PM |
ID | FETCH-LOGICAL-c441t-aed15a2c152b821d2e62bfb27d2a589bbed4dc291fe47274d6b4720795a381913 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 01:28:31 EDT 2025 Thu Aug 21 18:32:03 EDT 2025 Thu Sep 04 17:55:36 EDT 2025 Mon Jul 21 05:58:33 EDT 2025 Tue Jul 01 01:37:07 EDT 2025 Thu Apr 24 23:05:31 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 11 |
Keywords | outsourcing computation publicly verifiable secret sharing blockchain full homomorphism IoT |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c441t-aed15a2c152b821d2e62bfb27d2a589bbed4dc291fe47274d6b4720795a381913 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0001-6763-4129 0000-0001-7792-2669 |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s18113785 |
PMID | 30400673 |
PQID | 2130802760 |
PQPubID | 23479 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_42c9300066354680b1b30df7914bde8b pubmedcentral_primary_oai_pubmedcentral_nih_gov_6263686 proquest_miscellaneous_2130802760 pubmed_primary_30400673 crossref_citationtrail_10_3390_s18113785 crossref_primary_10_3390_s18113785 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2018-11-05 |
PublicationDateYYYYMMDD | 2018-11-05 |
PublicationDate_xml | – month: 11 year: 2018 text: 2018-11-05 day: 05 |
PublicationDecade | 2010 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationTitleAlternate | Sensors (Basel) |
PublicationYear | 2018 |
Publisher | MDPI MDPI AG |
Publisher_xml | – name: MDPI – name: MDPI AG |
References | ref_14 Zhou (ref_20) 2018; 6 ref_13 ref_12 ref_11 ref_10 ref_30 ref_19 ref_17 ref_16 Sharma (ref_18) 2018; 6 Zheng (ref_4) 2017; 14 ref_25 ref_24 ref_23 ref_22 ref_21 Lamichhane (ref_15) 2017; 4 ref_1 ref_3 ref_2 ref_29 ref_28 ref_26 ref_9 ref_8 ref_5 Johnson (ref_27) 2001; 1 ref_7 ref_6 25007320 - PLoS One. 2014 Jul 09;9(7):e98790 |
References_xml | – ident: ref_22 doi: 10.1145/3190508.3190538 – ident: ref_30 – volume: 14 start-page: 352 year: 2017 ident: ref_4 article-title: Blockchain Challenges and Opportunities: A Survey publication-title: Int. J. Web Grid Serv. doi: 10.1504/IJWGS.2018.095647 – ident: ref_5 – ident: ref_3 – ident: ref_24 – ident: ref_26 – volume: 1 start-page: 36 year: 2001 ident: ref_27 article-title: The elliptic curve digital signature algorithm (ECDSA) publication-title: Int. J. Inf. Secur. doi: 10.1007/s102070100002 – volume: 4 start-page: 93 year: 2017 ident: ref_15 article-title: A smart waste management system using IoT and blockchain technology publication-title: Int. J. Adv. Eng. Res. Sci. doi: 10.22161/ijaers.4.4.12 – ident: ref_23 doi: 10.1109/ACCESS.2018.2883775 – ident: ref_21 – volume: 6 start-page: 115 year: 2018 ident: ref_18 article-title: A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2757955 – ident: ref_7 doi: 10.1109/ANTS.2017.8384164 – ident: ref_1 doi: 10.1145/3054977.3055003 – ident: ref_19 doi: 10.5220/0006688601050113 – ident: ref_6 – ident: ref_8 – ident: ref_14 doi: 10.23919/ICACT.2017.7890132 – ident: ref_9 doi: 10.1109/ICSE-C.2017.60 – ident: ref_25 – ident: ref_29 doi: 10.1007/978-3-540-24654-1_13 – ident: ref_2 doi: 10.1371/journal.pone.0098790 – ident: ref_13 doi: 10.14722/ndss.2019.23272 – ident: ref_16 doi: 10.1109/PERCOMW.2017.7917634 – ident: ref_10 doi: 10.1109/ICWS.2017.54 – volume: 6 start-page: 43472 year: 2018 ident: ref_20 article-title: BeeKeeper: A Blockchain-based IoT System with Secure Storage and Homomorphic Computation publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2847632 – ident: ref_28 doi: 10.1007/3-540-45325-3_8 – ident: ref_12 doi: 10.1007/978-3-319-46568-5_53 – ident: ref_11 doi: 10.1109/ICCNC.2018.8390280 – ident: ref_17 doi: 10.1145/3205977.3205993 – reference: 25007320 - PLoS One. 2014 Jul 09;9(7):e98790 |
SSID | ssj0023338 |
Score | 2.3943233 |
Snippet | Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of... |
SourceID | doaj pubmedcentral proquest pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | 3785 |
SubjectTerms | blockchain full homomorphism IoT outsourcing computation publicly verifiable secret sharing |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA7iSQ_ib-svonjwUm3TNEm9OdmYip4m7CCUJnnFoXbitoP_vS9pNzYRvEgPhTal4b3Xvu9r875HyJmwMnMy6qEV0oQcMggVMxKBHBhEHCZN_WLMh0fRfeJ3_bQ_1-rLrQmr5YFrw11yZrKkyYxcqEjHOolsKbOYawtKu7dvlEVTMtVQrQSZV60jlCCpvxxhHosT6Romz2UfL9L_G7L8uUByLuN01slaAxXpdT3FDbIE1SZZnRMQ3CLPLYB7gA_4pOwiuqKufm_gS2_xwhbmqVfzgtQ_bPsKKUtvhz1aa5RT9wGWOgL6RbvDd9zQ4AND6y4P3l3b5KnT7t10w6ZfQmgQ1IzDAmycFsxgStaKxZaBYLrUTFpWpCrTGiy3hmVxCRxhC7dC4z6SWVp43pbskOVqWMEeoU4lEZmQcfSIl4VUwmgEAyUYpE-lMgE5n9oxN42YuOtp8ZYjqXAmz2cmD8jpbOhHraDx26CWc8ZsgBO99gcwFPImFPK_QiEgJ1NX5viQuD8fRQXDyShnmKkVEnARBWS3du3sVol7jQmZBEQuOH1hLotnqsGLF-J2Sj5Cif3_mPwBWUEspnyZY3pIlsefEzhCvDPWxz60vwGgpPw1 priority: 102 providerName: Directory of Open Access Journals |
Title | BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation |
URI | https://www.ncbi.nlm.nih.gov/pubmed/30400673 https://www.proquest.com/docview/2130802760 https://pubmed.ncbi.nlm.nih.gov/PMC6263686 https://doaj.org/article/42c9300066354680b1b30df7914bde8b |
Volume | 18 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1ba9swFD708rI9lG3dxVsXtNGHvbizZVmSC2MsI1nW0jJGA3kYGOviNbSzuySF9d_vSHZMPfIwDDbYMpZ1LJ_vk3S-A3DIjcicjHpouNAhs5kNJdUCgZzViDh0mvrFmGfnfDJlJ7N0tgXrHJttAy43UjuXT2q6uD768_vuI3b4D45xImV_v0QvFSdCptuwiw6JOw52xrrJBJokPqG1i-nCitCoERjq39pzS169fxPk_Hfl5D1XNH4Eey2GJJ8aoz-GLVs9gYf3lAX34cfQ2lNrb-yC0KPomLjAvrmPycUbh-jArvRlMa_CkQ-dMuRrfUEa8XLiRmaJY6Z3ZFL_wg0tMdekSf_g7fgUpuPRxedJ2CZSCDWinVVYWBOnBdXoq5WksaGWU1UqKgwtUpkpZQ0zmmZxaRniGWa4wmMksrTwhC55BjtVXdkXQJx8IlIk7XgTKwshuVaIEkqrkVeVUgfwbt2OuW5Vxl2yi-sc2YZr8rxr8gDedkVvGmmNTYWGzhhdAaeG7U_Ui59527lyRnWWtOiJcRmpWCWRKUUWM2WsVAG8WZsyx97jpkSKyta3y5yiC5fIzHkUwPPGtN2jEvd_4yIJQPSM3qtL_0o1v_QK3U7ih0v-8n_e8BU8QBAmfXxjegA7q8WtfY1AZ6UGsC1mAvdy_GUAu8PR-bfvAz9oMPAf-F_4Nf3v |
linkProvider | Scholars Portal |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=BeeKeeper+2.0%3A+Confidential+Blockchain-Enabled+IoT+System+with+Fully+Homomorphic+Computation&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Zhou%2C+Lijing&rft.au=Wang%2C+Licheng&rft.au=Ai%2C+Tianyi&rft.au=Sun%2C+Yiru&rft.date=2018-11-05&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=18&rft.issue=11&rft.spage=3785&rft_id=info:doi/10.3390%2Fs18113785&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_s18113785 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |