BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation

Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 18; no. 11; p. 3785
Main Authors Zhou, Lijing, Wang, Licheng, Ai, Tianyi, Sun, Yiru
Format Journal Article
LanguageEnglish
Published Switzerland MDPI 05.11.2018
MDPI AG
Subjects
Online AccessGet full text
ISSN1424-8220
1424-8220
DOI10.3390/s18113785

Cover

Abstract Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs.
AbstractList Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs.
Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs.Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs.
Author Ai, Tianyi
Sun, Yiru
Zhou, Lijing
Wang, Licheng
AuthorAffiliation State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; zhoulj@bupt.edu.cn (L.Z.); aitianyi@bupt.edu.cn (T.A.); syr_2015@bupt.edu.cn (Y.S.)
AuthorAffiliation_xml – name: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; zhoulj@bupt.edu.cn (L.Z.); aitianyi@bupt.edu.cn (T.A.); syr_2015@bupt.edu.cn (Y.S.)
Author_xml – sequence: 1
  givenname: Lijing
  orcidid: 0000-0001-7792-2669
  surname: Zhou
  fullname: Zhou, Lijing
– sequence: 2
  givenname: Licheng
  surname: Wang
  fullname: Wang, Licheng
– sequence: 3
  givenname: Tianyi
  orcidid: 0000-0001-6763-4129
  surname: Ai
  fullname: Ai, Tianyi
– sequence: 4
  givenname: Yiru
  surname: Sun
  fullname: Sun, Yiru
BackLink https://www.ncbi.nlm.nih.gov/pubmed/30400673$$D View this record in MEDLINE/PubMed
BookMark eNplkstu1TAQhi1URC-w4AVQlrBI61schwUSPWrpEZVYUHZIli-THhcnTu0EdN4ew2mrFuTFWJ5_vl-emUO0N8YREHpN8DFjHT7JRBLCWtk8QweEU15LSvHeo_s-Osz5BmPKGJMv0D7DHGPRsgP0_RTgM8AEqaLH-H21imPvHYyz16E6DdH-sBvtx_ps1CaAq9bxqvq6zTMM1S8_b6rzJYRtdRGHctK08bYQhmmZ9ezj-BI973XI8OouHqFv52dXq4v68sun9erjZW05J3OtwZFGU0saaiQljoKgpje0dVQ3sjMGHHeWdqQH3tKWO2FKxG3XaCZJR9gRWu-4LuobNSU_6LRVUXv19yGma6XT7G0AxantGC6fF6zhQmJDDMOubzvCjQNpCuvDjjUtZgBnSyuSDk-gTzOj36jr-FMJKpiQogDe3gFSvF0gz2rw2UIIeoS4ZEUJwxLTVuAiffPY68HkfjxFcLIT2BRzTtAr63etLdY-KILVnwVQDwtQKt79U3EP_V_7G_4hrpw
CitedBy_id crossref_primary_10_1007_s11227_022_04586_1
crossref_primary_10_1155_2021_5565663
crossref_primary_10_1186_s13638_021_01986_4
crossref_primary_10_3390_fi11030076
crossref_primary_10_1109_JAS_2023_123870
crossref_primary_10_3390_s19092005
crossref_primary_10_1016_j_trc_2020_01_002
crossref_primary_10_2196_13592
crossref_primary_10_1016_j_tele_2022_101812
crossref_primary_10_1587_transfun_2021CIP0021
crossref_primary_10_3390_fi13080217
crossref_primary_10_1109_ACCESS_2021_3129697
crossref_primary_10_3390_electronics11142200
crossref_primary_10_1016_j_jnca_2022_103465
crossref_primary_10_1016_j_cosrev_2020_100360
crossref_primary_10_3390_s19081935
crossref_primary_10_1002_ett_3741
Cites_doi 10.1145/3190508.3190538
10.1504/IJWGS.2018.095647
10.1007/s102070100002
10.22161/ijaers.4.4.12
10.1109/ACCESS.2018.2883775
10.1109/ACCESS.2017.2757955
10.1109/ANTS.2017.8384164
10.1145/3054977.3055003
10.5220/0006688601050113
10.23919/ICACT.2017.7890132
10.1109/ICSE-C.2017.60
10.1007/978-3-540-24654-1_13
10.1371/journal.pone.0098790
10.14722/ndss.2019.23272
10.1109/PERCOMW.2017.7917634
10.1109/ICWS.2017.54
10.1109/ACCESS.2018.2847632
10.1007/3-540-45325-3_8
10.1007/978-3-319-46568-5_53
10.1109/ICCNC.2018.8390280
10.1145/3205977.3205993
ContentType Journal Article
Copyright 2018 by the authors. 2018
Copyright_xml – notice: 2018 by the authors. 2018
DBID AAYXX
CITATION
NPM
7X8
5PM
DOA
DOI 10.3390/s18113785
DatabaseName CrossRef
PubMed
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
MEDLINE - Academic
DatabaseTitleList
CrossRef
PubMed

MEDLINE - Academic
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_42c9300066354680b1b30df7914bde8b
PMC6263686
30400673
10_3390_s18113785
Genre Journal Article
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61502048
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
ADRAZ
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IPNFZ
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RIG
RNS
RPM
TUS
UKHRP
XSB
~8M
NPM
PJZUB
PPXIY
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c441t-aed15a2c152b821d2e62bfb27d2a589bbed4dc291fe47274d6b4720795a381913
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 01:28:31 EDT 2025
Thu Aug 21 18:32:03 EDT 2025
Thu Sep 04 17:55:36 EDT 2025
Mon Jul 21 05:58:33 EDT 2025
Tue Jul 01 01:37:07 EDT 2025
Thu Apr 24 23:05:31 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 11
Keywords outsourcing computation
publicly verifiable secret sharing
blockchain
full homomorphism
IoT
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c441t-aed15a2c152b821d2e62bfb27d2a589bbed4dc291fe47274d6b4720795a381913
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0001-6763-4129
0000-0001-7792-2669
OpenAccessLink http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s18113785
PMID 30400673
PQID 2130802760
PQPubID 23479
ParticipantIDs doaj_primary_oai_doaj_org_article_42c9300066354680b1b30df7914bde8b
pubmedcentral_primary_oai_pubmedcentral_nih_gov_6263686
proquest_miscellaneous_2130802760
pubmed_primary_30400673
crossref_citationtrail_10_3390_s18113785
crossref_primary_10_3390_s18113785
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2018-11-05
PublicationDateYYYYMMDD 2018-11-05
PublicationDate_xml – month: 11
  year: 2018
  text: 2018-11-05
  day: 05
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2018
Publisher MDPI
MDPI AG
Publisher_xml – name: MDPI
– name: MDPI AG
References ref_14
Zhou (ref_20) 2018; 6
ref_13
ref_12
ref_11
ref_10
ref_30
ref_19
ref_17
ref_16
Sharma (ref_18) 2018; 6
Zheng (ref_4) 2017; 14
ref_25
ref_24
ref_23
ref_22
ref_21
Lamichhane (ref_15) 2017; 4
ref_1
ref_3
ref_2
ref_29
ref_28
ref_26
ref_9
ref_8
ref_5
Johnson (ref_27) 2001; 1
ref_7
ref_6
25007320 - PLoS One. 2014 Jul 09;9(7):e98790
References_xml – ident: ref_22
  doi: 10.1145/3190508.3190538
– ident: ref_30
– volume: 14
  start-page: 352
  year: 2017
  ident: ref_4
  article-title: Blockchain Challenges and Opportunities: A Survey
  publication-title: Int. J. Web Grid Serv.
  doi: 10.1504/IJWGS.2018.095647
– ident: ref_5
– ident: ref_3
– ident: ref_24
– ident: ref_26
– volume: 1
  start-page: 36
  year: 2001
  ident: ref_27
  article-title: The elliptic curve digital signature algorithm (ECDSA)
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s102070100002
– volume: 4
  start-page: 93
  year: 2017
  ident: ref_15
  article-title: A smart waste management system using IoT and blockchain technology
  publication-title: Int. J. Adv. Eng. Res. Sci.
  doi: 10.22161/ijaers.4.4.12
– ident: ref_23
  doi: 10.1109/ACCESS.2018.2883775
– ident: ref_21
– volume: 6
  start-page: 115
  year: 2018
  ident: ref_18
  article-title: A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2757955
– ident: ref_7
  doi: 10.1109/ANTS.2017.8384164
– ident: ref_1
  doi: 10.1145/3054977.3055003
– ident: ref_19
  doi: 10.5220/0006688601050113
– ident: ref_6
– ident: ref_8
– ident: ref_14
  doi: 10.23919/ICACT.2017.7890132
– ident: ref_9
  doi: 10.1109/ICSE-C.2017.60
– ident: ref_25
– ident: ref_29
  doi: 10.1007/978-3-540-24654-1_13
– ident: ref_2
  doi: 10.1371/journal.pone.0098790
– ident: ref_13
  doi: 10.14722/ndss.2019.23272
– ident: ref_16
  doi: 10.1109/PERCOMW.2017.7917634
– ident: ref_10
  doi: 10.1109/ICWS.2017.54
– volume: 6
  start-page: 43472
  year: 2018
  ident: ref_20
  article-title: BeeKeeper: A Blockchain-based IoT System with Secure Storage and Homomorphic Computation
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2847632
– ident: ref_28
  doi: 10.1007/3-540-45325-3_8
– ident: ref_12
  doi: 10.1007/978-3-319-46568-5_53
– ident: ref_11
  doi: 10.1109/ICCNC.2018.8390280
– ident: ref_17
  doi: 10.1145/3205977.3205993
– reference: 25007320 - PLoS One. 2014 Jul 09;9(7):e98790
SSID ssj0023338
Score 2.3943233
Snippet Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of...
SourceID doaj
pubmedcentral
proquest
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 3785
SubjectTerms blockchain
full homomorphism
IoT
outsourcing computation
publicly verifiable secret sharing
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA7iSQ_ib-svonjwUm3TNEm9OdmYip4m7CCUJnnFoXbitoP_vS9pNzYRvEgPhTal4b3Xvu9r875HyJmwMnMy6qEV0oQcMggVMxKBHBhEHCZN_WLMh0fRfeJ3_bQ_1-rLrQmr5YFrw11yZrKkyYxcqEjHOolsKbOYawtKu7dvlEVTMtVQrQSZV60jlCCpvxxhHosT6Romz2UfL9L_G7L8uUByLuN01slaAxXpdT3FDbIE1SZZnRMQ3CLPLYB7gA_4pOwiuqKufm_gS2_xwhbmqVfzgtQ_bPsKKUtvhz1aa5RT9wGWOgL6RbvDd9zQ4AND6y4P3l3b5KnT7t10w6ZfQmgQ1IzDAmycFsxgStaKxZaBYLrUTFpWpCrTGiy3hmVxCRxhC7dC4z6SWVp43pbskOVqWMEeoU4lEZmQcfSIl4VUwmgEAyUYpE-lMgE5n9oxN42YuOtp8ZYjqXAmz2cmD8jpbOhHraDx26CWc8ZsgBO99gcwFPImFPK_QiEgJ1NX5viQuD8fRQXDyShnmKkVEnARBWS3du3sVol7jQmZBEQuOH1hLotnqsGLF-J2Sj5Cif3_mPwBWUEspnyZY3pIlsefEzhCvDPWxz60vwGgpPw1
  priority: 102
  providerName: Directory of Open Access Journals
Title BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation
URI https://www.ncbi.nlm.nih.gov/pubmed/30400673
https://www.proquest.com/docview/2130802760
https://pubmed.ncbi.nlm.nih.gov/PMC6263686
https://doaj.org/article/42c9300066354680b1b30df7914bde8b
Volume 18
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1ba9swFD708rI9lG3dxVsXtNGHvbizZVmSC2MsI1nW0jJGA3kYGOviNbSzuySF9d_vSHZMPfIwDDbYMpZ1LJ_vk3S-A3DIjcicjHpouNAhs5kNJdUCgZzViDh0mvrFmGfnfDJlJ7N0tgXrHJttAy43UjuXT2q6uD768_vuI3b4D45xImV_v0QvFSdCptuwiw6JOw52xrrJBJokPqG1i-nCitCoERjq39pzS169fxPk_Hfl5D1XNH4Eey2GJJ8aoz-GLVs9gYf3lAX34cfQ2lNrb-yC0KPomLjAvrmPycUbh-jArvRlMa_CkQ-dMuRrfUEa8XLiRmaJY6Z3ZFL_wg0tMdekSf_g7fgUpuPRxedJ2CZSCDWinVVYWBOnBdXoq5WksaGWU1UqKgwtUpkpZQ0zmmZxaRniGWa4wmMksrTwhC55BjtVXdkXQJx8IlIk7XgTKwshuVaIEkqrkVeVUgfwbt2OuW5Vxl2yi-sc2YZr8rxr8gDedkVvGmmNTYWGzhhdAaeG7U_Ui59527lyRnWWtOiJcRmpWCWRKUUWM2WsVAG8WZsyx97jpkSKyta3y5yiC5fIzHkUwPPGtN2jEvd_4yIJQPSM3qtL_0o1v_QK3U7ih0v-8n_e8BU8QBAmfXxjegA7q8WtfY1AZ6UGsC1mAvdy_GUAu8PR-bfvAz9oMPAf-F_4Nf3v
linkProvider Scholars Portal
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=BeeKeeper+2.0%3A+Confidential+Blockchain-Enabled+IoT+System+with+Fully+Homomorphic+Computation&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Zhou%2C+Lijing&rft.au=Wang%2C+Licheng&rft.au=Ai%2C+Tianyi&rft.au=Sun%2C+Yiru&rft.date=2018-11-05&rft.issn=1424-8220&rft.eissn=1424-8220&rft.volume=18&rft.issue=11&rft.spage=3785&rft_id=info:doi/10.3390%2Fs18113785&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_s18113785
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon