Enabling Data Confidentiality with Public Blockchains (2308.03791v6)
Abstract: Blockchain technology is apt to facilitate the automation of multi-party cooperations among various players in a decentralized setting, especially in cases where trust among participants is limited. Transactions are stored in a ledger, a replica of which is retained by every node of the blockchain network. The operations saved thereby are thus publicly accessible. While this aspect enhances transparency, reliability, and persistence, it hinders the utilization of public blockchains for process automation as it violates typical confidentiality requirements in corporate settings. To overcome this issue, we propose our approach named Multi-Authority Approach to Transaction Systems for Interoperating Applications (MARTSIA). Based on Multi-Authority Attribute-Based Encryption (MA-ABE), MARTSIA enables read-access control over shared data at the level of message parts. User-defined policies determine whether an actor can interpret the publicly stored information or not, depending on the actor's attributes declared by a consortium of certifiers. Still, all nodes in the blockchain network can attest to the publication of the (encrypted) data. We provide a formal analysis of the security guarantees of MARTSIA, and illustrate the proof-of-concept implementation over multiple blockchain platforms. To demonstrate its interoperability, we showcase its usage in ensemble with a state-of-the-art blockchain-based engine for multi-party process execution, and three real-world decentralized applications in the context of NFT markets, supply chain, and retail.
- Secure Multiparty Computations on Bitcoin. In SP. IEEE Computer Society, 443–458.
- Smita Athanere and Ramesh Thakur. 2022. Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing. J. King Saud Univ. - Comput. Inf. 34, 4 (2022), 1523–1534.
- Hands-on blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer. Packt Publishing Ltd.
- Enhancing Blockchain-Based Processes with Decentralized Oracles. In BPM Blockchain and RPA Forum. Springer, 102–118.
- Insured MPC: Efficient Secure Computation with Financial Penalties. In Financial Cryptography, Vol. 12059. Springer, 404–420.
- Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications. Future Gener. Comput. Syst. 111 (2020), 899–918.
- Can a Public Blockchain Keep a Secret?. In TCC (1). 260–290.
- Ciphertext-Policy Attribute-Based Encryption. In SP. 321–334.
- Manuel Blum. 1981. Coin Flipping by Telephone. In CRYPTO. ECE, 11–15.
- Shielded Computations in Smart Contracts Overcoming Forks. In Financial Cryptography (1), Vol. 12674. Springer, 73–92.
- Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In FOCS. IEEE Computer Society, 136–145.
- vetKeys: How a Blockchain Can Keep Many Secrets. IACR Cryptol. ePrint Arch. (2023), 616.
- Melissa Chase. 2007. Multi-authority Attribute Based Encryption. In TCC. Springer, 515–534.
- Jing Chen and Silvio Micali. 2019. Algorand: A secure and efficient distributed ledger. Theor. Comput. Sci. 777 (2019), 155–183.
- A blockchain-based preserving and sharing system for medical data privacy. Future Gener. Comput. Syst. 124 (2021), 338–350.
- Andrew Chi and Chih Yao. 1982. Protocols for Secure Computations (Ext. Abstract). In FOCS. IEEE Computer Society, 160–164.
- Andrew Chi and Chih Yao. 1986. How to Generate and Exchange Secrets (Ext. Abstract). In FOCS. IEEE Computer Society, 162–167.
- Engineering Trustable and Auditable Choreography-Based Systems Using Blockchain. ACM Trans. Manage. Inf. Syst. 13, 3, Article 31 (2022), 53 pages.
- Model-driven engineering for multi-party business processes on multiple blockchains. Blockchain: Res Appl. 2, 3 (2021), 100018.
- A Flexible Approach to Multi-party Business Process Execution on Blockchain. Future Gener. Comput. Syst. 147 (2023), 219–234.
- Ronald Cramer and Victor Shoup. 2003. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack. SIAM J. Comput. 33, 1 (2003), 167–226.
- Chris Dannen. 2017. Introducing Ethereum and Solidity: Foundations of Cryptocurrency and Blockchain Programming for Beginners. Apress.
- Fully Adaptive Decentralized Multi-Authority ABE. In Advances in Cryptology, Vol. 14006. Springer, 447–478.
- Blockchain Support for Collaborative Business Processes. Inform. Spektrum 42 (2019), 182–190. Issue 3.
- On the adoption of blockchain for business process monitoring. SoSyM 21, 3 (2022), 915–937.
- Fundamentals of Business Process Management, Second Edition. Springer.
- Blockchain technology in supply chain operations: Applications, challenges and research opportunities. Transportation research part E: Logistics and transportation review 142 (2020), 102067.
- A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud. J. Syst. Archit. 102 (2020), 101653.
- A survey on privacy protection in blockchain system. Journal of Network and Computer Applications 126 (2019), 45–58.
- A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing. ACM Trans. Internet Technol. 23, Article 38 (2023), 25 pages.
- The knowledge complexity of interactive proof-systems. In Providing Sound Foundations for Cryptography. 203–225.
- Random-value payment tokens for on-chain privacy-preserving payments. In CoopIS. Springer, 223–241.
- A blockchain-based scheme for privacy-preserving and secure sharing of medical data. Computers & Security 99 (2020), 102010.
- Mining Blockchain Processes: Extracting Process Mining Data from Blockchain Applications. In BPM Blockchain and CEE forum. Springer, 71–86.
- Julius Köpke and Adnan Brdanin. 2022. On Storing Data Objects of Business Processes on Blockchain Channels. In PoEM Workshops. CEUR-WS.org, 1–12.
- Balancing Privity and Enforceability of BPM-Based Smart Contracts on Blockchains. In BPM Blockchain and CEE forum. Springer, 87–102.
- Julius Köpke and Michael Necemer. 2022. Measuring the Effects of Confidants on Privacy in Smart Contracts. In BPM (Blockchain and RPA Forum). Springer, 84–99.
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. In SP. IEEE, 839–858.
- Designing secure business processes for blockchains with SecBPMN2BC. Future Gener. Comput. Syst. 141 (2023), 382–398.
- Bin Li and Yijie Wang. 2018. RZKPB: A Privacy-Preserving Blockchain-Based Fair Transaction Method for Sharing Economy. In TrustCom/BigDataSE. IEEE, 1164–1169.
- Three-Tier Storage Framework Based on TBchain and IPFS for Protecting IoT Security and Privacy. ACM Trans. Internet Technol. 23, 3 (2023), 28 pages.
- Blockchain-Based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Technol. 21, 2 (2021), 21 pages.
- Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices. ISPA/IUCC/BDCloud/SocialCom/SustainCom (2018), 1003–1008.
- Controlled flexibility in blockchain-based collaborative business processes. Inf. Syst. 104 (2022), 101622.
- Caterpillar: A business process execution engine on the Ethereum blockchain. Softw., Pract. Exper. 49, 7 (2019), 1162–1193.
- Data Privacy Based on IoT Device Behavior Control Using Blockchain. ACM Trans. Internet Technol. 21, 1, Article 23 (2021), 20 pages.
- uBaaS: A unified blockchain as a service platform. Future Gener. Comput. Syst. 101 (2019), 564–575.
- Collaboration among Adversaries: Distributed Workflow Execution on a Blockchain. , 8-15 pages.
- MARTSIA: Enabling Data Confidentiality for Blockchain-based Process Execution. In EDOC. Springer, 1–17. https://doi.org/10.48550/arXiv.2303.17977 To appear.
- Fine-Grained Data Access Control for Collaborative Process Execution on Blockchain. In BPM Blockchain and RPA Forum. Springer, 51–67.
- Open-TEE – An Open Virtual Trusted Execution Environment. In 2015 IEEE Trustcom/BigDataSE/ISPA, Vol. 1. 400–407.
- Blockchains for Business Process Management - Challenges and Opportunities. ACM Trans. Manage. Inf. Syst. 9, 1, Article 4 (2018), 16 pages.
- Victor S Miller. 1986. Use of elliptic curves in cryptography. Springer.
- Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System.
- National Institute of Standards and Technology. 2001. Announcing the Advanced Encryption Standard (AES). Technical Report. Federal Information Processing Standards Publication 197.
- Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns. Comput. Secur. 86 (2019), 253–269.
- A peer-to-peer file storage and sharing system based on consortium blockchain. Future Gener. Comput. Syst. 141 (2023), 197–204.
- B-Box - A Decentralized Storage System Using IPFS, Attributed-based Encryption, and Blockchain. In RIVF. 1–6.
- Andrei-Dragos Popescu. 2021. Non-fungible tokens (NFT) – Innovation beyond the craze. In IBEM, Vol. 32. 26–30.
- BPMS-RA: A Novel Reference Architecture for Business Process Management Systems. ACM Trans. Internet Techn. 19, 1, Article 13 (2019), 23 pages.
- MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. JAIHC 11 (11 2020).
- Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In ANTS. 1–6.
- A Method for Obtaining Digital Signatures and Public-Key Cryptosystems (Reprint). Commun. ACM 26, 1 (1983), 96–99.
- Yannis Rouselakis and Brent Waters. 2015. Efficient statically-secure large-universe multi-authority attribute-based encryption. In Financial Cryptography and Data Security. 315–332.
- J. M. Rushby. 1981. Design and Verification of Secure Systems. SIGOPS Oper. Syst. Rev. 15 (1981), 12–21.
- Amit Sahai and Brent Waters. 2005. Fuzzy Identity-Based Encryption. In EUROCRYPT (Aarhus, Denmark). Springer-Verlag, 457–473.
- Luisa Schaar and Stylianos Kampakis. 2022. Non-fungible tokens as an alternative investment: Evidence from cryptopunks. JBBA (2022).
- Fabian Stiehle and Ingo Weber. 2022. Blockchain for Business Process Enactment: A Taxonomy and Systematic Literature Review. In BPM Blockchain and RPA Forum. Springer, 5–20.
- Blockchain technology implementation in logistics. Sustainability 11, 4 (2019), 1185.
- Lorikeet: A Model-Driven Engineering Tool for Blockchain-Based Business Process Execution and Asset Management. In BPM Demos. Springer, 56–60.
- A Novel Approach for Developing Decentralized Storage and Sharing Systems. In BSCI. ACM, 85–90.
- Hao Wang and Yujiao Song. 2018. Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain. J. Med. Syst. 42, 8 (2018), 152.
- Mohammad Wazid and Prosanta Gope. 2023. BACKM-EHA: A Novel Blockchain-Enabled Security Solution for IoMT-Based E-Healthcare Applications. ACM Trans. Internet Technol. 23 (2023), 28 pages.
- Untrusted Business Process Monitoring and Execution Using Blockchain. In BPM. Springer, 329–347.
- Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. , 18 pages.
- A blockchain based access control scheme with hidden policy and attribute. Future Gener. Comput. Syst. 141 (April 2023), 186–196.
- TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system. Future Gener. Comput. Syst. 140 (2023), 321–330.
- Architecture for Blockchain Applications. Springer.
- Aiqing Zhang and Xiaodong Lin. 2018. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J. Med. Syst. 42, 8 (2018), 140.
- FHIRChain: Applying blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16 (2018), 267–278.
- Security and Privacy on Blockchain. ACM Comput. Surv. 52, 3, Article 51 (2019), 34 pages.
- An overview on smart contracts: Challenges, advances and platforms. Future Gener. Comput. Syst. 105 (2020), 475–491.
- Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops. IEEE, 180–184.