Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Securing blockchain-based timed data release against adversarial attacks

Published: 01 January 2023 Publication History

Abstract

Timed data release refers to protecting sensitive data that can be accessed only after a pre-determined amount of time has passed. While blockchain-based solutions for timed data release provide a promising approach for decentralizing the process, designing an attack-resilient timed-release service that is resilient to malicious adversaries in a blockchain network is inherently challenging. A timed-release service on a blockchain network is inevitably exposed to the risk of post-facto attacks where adversaries may launch attacks after the data is released in the blockchain network. Existing incentive-based solutions for timed data release in Ethereum blockchains guarantee protection under the assumption of a fully rational adversarial environment in which every peer acts rationally. However, these schemes fail invariably when even a single participating peer node in the protocol starts acting maliciously and deviates from the rational behavior.
In this paper, we propose a systematic solution for attack-resilient and practical blockchain-based timed data release in a mixed adversarial environment, where both malicious adversaries and rational adversaries exist. We first propose an effective uncertainty-aware reputation measure to capture the behaviors of the peer involved in timed data release activities in the network. In light of such a measure, we present the design of a basic protocol that consists of two critical ingredients, namely reputation-aware peer recruitment and verifiable enforcement protocols. The former, prior to the start of the enforcement protocols, performs peer recruitment based on the reputation measure to make the design probabilistically attack-resilient to the post-facto attacks. The latter is responsible for contractually guarding the recruited peers at runtime by transparently reporting observed adversarial behaviors. However, the basic recruitment design is only aware of the reputation of the peers and it does not consider the working time schedule of the participating peers and as a result, it results in lower attack-resilience. To enhance the attack resilience further without impacting the verifiable enforcement protocols, we propose a temporal graph-based reputation-aware peer recruitment algorithm that carefully determines the peer recruitment plan to make the service more attack-resilient. In our proposed approach, we formally capture the timed data release service as a temporal graph and we develop a novel maximal attack-resilient path-finding algorithm on the temporal graph for the participating peers.
We implement a prototype of the proposed approach using Smart Contracts and deploy it on the Ethereum official test network, Rinkeby. For extensively evaluating the proposed techniques, we perform simulation experiments to validate the effectiveness of the reputation-aware timed data release protocols as well as our proposed temporal-graph-based improvements. The results demonstrate the effectiveness and strong attack resilience of the proposed mechanisms and our approach incurs only a modest gas cost.

References

[1]
E. Bacis, D. Facchinetti, M. Guarnieri, M. Rosa, M. Rossi and S. Paraboschi, I told you tomorrow: Practical time-locked secrets using smart contracts, in: The 16th International Conference on Availability, Reliability and Security, ARES 2021, Association for Computing Machinery, New York, NY, USA, 2021.
[2]
L. Baird, P. Mukherjee and R. Sinha, i-TiRE: Incremental timed-release encryption or how to use timed-release encryption on blockchains? in: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022, pp. 235–248.
[3]
P. Balaji and C. Li, Self-emerging data infrastructures, in: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), 2019, pp. 256–265.
[4]
N. Bitansky, S. Goldwasser, A. Jain, O. Paneth, V. Vaikuntanathan and B. Waters, Time-lock puzzles from randomized encodings, in: Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016, pp. 345–356.
[5]
D. Boneh and M. Naor, Timed commitments, in: Annual International Cryptology Conference, Springer, 2000, pp. 236–254.
[6]
T.H. Cormen, C.E. Leiserson, R.L. Rivest and C. Stein, Introduction to Algorithms, MIT Press, 2022.
[7]
R. Cramer, I.B. Damgård et al., Secure Multiparty Computation, Cambridge University Press, 2015.
[8]
P.J. Davis, Leonhard Euler’s integral: A historical profile of the gamma function: In memoriam: Milton Abramowitz, The American Mathematical Monthly 66(10) (1959), 849–869.
[11]
S. Garg, C. Gentry, A. Sahai and B. Waters, Witness encryption and its applications, in: Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing, 2013, pp. 467–476.
[12]
D. Goldschlag, M. Reed and P. Syverson, Onion routing, Communications of the ACM 42(2) (1999), 39–41.
[13]
P. Holme and J. Saramäki, Temporal networks, Physics Reports 519(3) (2012), 97–125.
[16]
A. Josang and R. Ismail, The beta reputation system, in: Proceedings of the 15th Bled Electronic Commerce Conference, Vol. 5, 2002, pp. 2502–2511.
[17]
K. Kasamatsu, T. Matsuda, K. Emura, N. Attrapadung, G. Hanaoka and H. Imai, Time-specific encryption from forward-secure encryption, in: International Conference on Security and Cryptography for Networks, Springer, 2012, pp. 184–204.
[18]
R. Kikuchi, A. Fujioka, Y. Okamoto and T. Saito, Strong security notions for timed-release public-key encryption revisited, in: International Conference on Information Security and Cryptology, Springer, 2011, pp. 88–108.
[19]
K. Leyton-Brown and Y. Shoham, Essentials of game theory: A concise multidisciplinary introduction, Synthesis Lectures on Artificial Intelligence and Machine Learning 2(1) (2008), 1–88.
[20]
C. Li and B. Palanisamy, Emerge: Self-emerging data release using cloud data storage, in: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), IEEE, 2017, pp. 26–33.
[21]
C. Li and B. Palanisamy, Timed-release of self-emerging data using distributed hash tables, in: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), IEEE, 2017, pp. 2344–2351.
[22]
C. Li and B. Palanisamy, Decentralized privacy-preserving timed execution in blockchain-based smart contract platforms, in: 2018 IEEE 25th International Conference on High Performance Computing (HiPC), IEEE, 2018, pp. 265–274.
[23]
C. Li and B. Palanisamy, Decentralized release of self-emerging data using smart contracts, in: 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), IEEE, 2018, pp. 213–220.
[24]
C. Li and B. Palanisamy, SilentDelivery: Practical timed-delivery of private information using smart contracts, IEEE Transactions on Services Computing 15(6) (2022), 3528–3540.
[25]
M. Li, J. Weng, A. Yang, W. Lu, Y. Zhang, L. Hou, J.-N. Liu, Y. Xiang and R.H. Deng, Crowdbc: A blockchain-based decentralized framework for crowdsourcing, IEEE Transactions on Parallel and Distributed Systems 30(6) (2018), 1251–1266.
[26]
J. Liu, F. Garcia and M. Ryan, Time-release protocol from bitcoin and witness encryption for sat, Korean Circulation Journal 40(10) (2015), 530–535.
[27]
J. Liu, T. Jager, S.A. Kakvi and B. Warinschi, How to build time-lock encryption, Designs, Codes and Cryptography 86(11) (2018), 2549–2586.
[28]
J. Liu, S.A. Kakvi and B. Warinschi, Extractable witness encryption and timed-release encryption from bitcoin, IACR Cryptol. ePrint Arch. 2015 (2015), 482.
[29]
T.C. May, Timed-release crypto, 1993. http://www.hks.net/cpunks/cpunks-0/1460.html.
[30]
J.F. Nash Jr., Equilibrium points in n-person games, Proceedings of the National Academy of Sciences 36(1) (1950), 48–49.
[31]
J. Ning, H. Dang, R. Hou and E.-C. Chang, Keeping time-release secrets through smart contracts, IACR Cryptol. ePrint Arch. (2018), 1166.
[32]
M.G. Reed, P.F. Syverson and D.M. Goldschlag, Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications 16(4) (1998), 482–494.
[34]
R.L. Rivest, A. Shamir and D.A. Wagner, Time-lock puzzles and timed-release crypto.
[35]
A. Shamir, How to share a secret, Communications of the ACM 22(11) (1979), 612–613.
[37]
Y. Sun, R. Xue, R. Zhang, Q. Su and S. Gao, Rtchain: A reputation system with transaction and consensus incentives for e-commerce blockchain, ACM Transactions on Internet Technology (TOIT) 21(1) (2020), 1–24.
[38]
N. Szabo, Formalizing and securing relationships on public networks, First Monday (1997).
[39]
J. Wang and B. Palanisamy, Attack-resilient blockchain-based decentralized timed data release, in: 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec2022), 2022, pp. 123–140.
[40]
J. Wang and B. Palanisamy, Protecting blockchain-based decentralized timed release of data from malicious adversaries, in: 2022 IEEE International Conference on Blockchain and Cryptocurrency, 2022.
[41]
J. Wang and B. Palanisamy, CTDRB: Controllable timed data release using blockchains, in: SecureComm 2022, 2023, pp. 231–249.
[42]
H. Wu, J. Cheng, S. Huang, Y. Ke, Y. Lu and Y. Xu, Path problems in temporal graphs, Proceedings of the VLDB Endowment 7(9) (2014), 721–732.
[43]
B.B. Xuan, A. Ferreira and A. Jarry, Computing shortest, fastest, and foremost journeys in dynamic networks, International Journal of Foundations of Computer Science 14(02) (2003), 267–285.
[44]
J. Yu, D. Kozhaya, J. Decouchant and P. Esteves-Verissimo, Repucoin: Your reputation is your power, IEEE Transactions on Computers 68(8) (2019), 1225–1237.
[45]
H. Zhou, X. Ouyang, Z. Ren, J. Su, C. de Laat and Z. Zhao, A blockchain based witness model for trustworthy cloud service level agreement enforcement, in: IEEE INFOCOM 2019 – IEEE Conference on Computer Communications, IEEE, 2019, pp. 1567–1575.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Journal of Computer Security
Journal of Computer Security  Volume 31, Issue 6
Selected papers from the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy – DBSEC 2022
2023
112 pages
This is an open access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0) License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

IOS Press

Netherlands

Publication History

Published: 01 January 2023

Author Tags

  1. Timed data release
  2. blockchain
  3. smart contract
  4. temporal graph

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media