Abstract
Internet of things (IoT) development tends to reduce the reliance on centralized servers. The zero-trust distributed system combined with blockchain technology has become a hot topic in IoT research. However, distribution data storage services and different blockchain protocols make network interoperability and cross-platform more complex. Relay chain is a promising cross-chain technology that solves the complexity and compatibility issues associated with blockchain cross-chain transactions by utilizing relay blockchains as cross-chain connectors. Yet relay chain cross-chain transactions need to collect asset information and implement asset transactions via two-way peg. Due to the release of user transaction information, there is the issue of privacy leakage. In this article, we propose a cross-chain privacy protection protocol based on the Groth16 zero-knowledge proof algorithm and coin-mixing technology, which changes the authentication mechanism and uses a combination of generating functions to map virtual external addresses in transactions. It allows fast cross-chain anonymous transactions while hiding the genuine user’s address. The experiment shows that, in a zero-trust IoT context, our scheme can effectively protect user privacy information, accomplish controlled transaction traceability operations, and guarantee cross-chain transaction security.
- [1] . 2021. Trustworthy blockchain-empowered collaborative edge computing-as-a-service scheduling and data sharing in the IIoE. IEEE IoT J. 9, 16 (2021), 14752–14766. Google ScholarCross Ref
- [2] Sairath Bhattacharjya and Hossein Saiedian. 2022. Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture. International Journal of Information Security 21, 3 (Jun 2022), 427--436. Google ScholarDigital Library
- [3] . 2021. Evaluation model of cross-chain notary mechanism based on improved pagerank algorithm. Comput. Eng. 47, 2 (2021), 26–31.Google Scholar
- [4] . 2021. Blockchain cross-chain protocol and platform research and development. In Proceedings of the International Conference on Electronics, Circuits and Information Engineering (ECIE’21). IEEE, 264–269. Google ScholarCross Ref
- [5] . 2020. Anonymous scheme for blockchain atomic swap based on zero-knowledge proof. In Proceedings of the IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA’20). IEEE, 371–374. Google ScholarCross Ref
- [6] . 2020. CEPS: A cross-blockchain based electronic health records privacy-preserving scheme. In Proceedings of the IEEE International Conference on Communications (ICC’20). IEEE, 1–6. Google ScholarCross Ref
- [7] . 2021. Blockchain as a CA: A provably secure signcryption scheme leveraging blockchains. Secur. Commun. Netw. (2021). Google ScholarDigital Library
- [8] . 2021. Embedding blockchain technology into IoT for security: A survey. IEEE IoT J. 8, 13 (2021), 10452–10473. Google ScholarCross Ref
- [9] Liping Deng, Huan Chen, Jing Zeng, and Liang-Jie Zhang. 2018. Research on cross-chain technology based on sidechain and hash-locking. In International conference on edge computing, Vol. 10973. Springer, Springer International Publishing, Cham, 144--151.Google Scholar
- [10] Apoorvaa Deshpande and Maurice Herlihy. 2020. Privacy-preserving cross-chain atomic swaps. In International Conference on Financial Cryptography and Data Security, Vol. 12063. Springer, Springer International Publishing, 540--549. Google ScholarDigital Library
- [11] . 2019. Privacy protection for blockchains with account and multi-asset model. Chin. Commun. 16, 6 (2019), 69–79. Google ScholarCross Ref
- [12] Yepeng Ding and Hiroyuki Sato. 2021. Sunspot: A decentralized framework enabling privacy for authorizable data sharing on transparent public blockchains. In International Conference on Algorithms and Architectures for Parallel Processing, Vol. 13155. Springer, Springer International Publishing, Cham, 693--709. Google ScholarDigital Library
- [13] . 2020. Anonymous bitcoin mixing scheme based on semi-trusted supervisor. In Proceedings of the IEEE 3rd International Conference on Electronics Technology (ICET’20). IEEE, 845–850. Google ScholarCross Ref
- [14] . 2018. An Inclusive Cryptofinance Platform Based on Blockchain. Fusion Whitepaper (2018). Retrieved from https://whitepaper.io/document/55/fusion-whitepaper.Google Scholar
- [15] . 2020. ETH relay: A cost-efficient relay for ethereum-based blockchains. In Proceedings of the IEEE International Conference on Blockchain (Blockchain’20). IEEE, 204–213. Google ScholarCross Ref
- [16] Jens Groth. 2016. On the size of pairing-based non-interactive arguments. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vol. 9666. Springer, Berlin, 305--326. Google ScholarCross Ref
- [17] . 2019. Security problems on blockchain: The state of the art and future trends. Acta Autom. Sin. 45, 1 (2019), 206–225.Google Scholar
- [18] Yuanhang He, Daochao Huang, Lei Chen, Yi Ni, and Xiangjie Ma. 2022. A survey on zero trust architecture: challenges and future trends. Wireless Communications and Mobile Computing 2022 (2022), 1--13. Google ScholarDigital Library
- [19] . 2020. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput. Surv. 53, 1 (2020), 1–32. Google ScholarDigital Library
- [20] . 2019. Research on the progress in cross-chain technology of blockchains. J. Softw. 30, 6 (2019), 1649–1660. Google ScholarCross Ref
- [21] G. Li, D. He, B. Guo, and S. Lu. 2020. Blockchain privacy protection algorithms based on zero knowledge proof. J. Huazhong Univ. Sci. Technol. (Natural Science Edition) 48, 7 (2020), 112--116.Google Scholar
- [22] . 2022. Future industry internet of things with zero-trust security. Inf. Syst. Front. (2022), 1–14. Google ScholarCross Ref
- [23] . 2021. Overview of block chain cross chain technology. In Proceedings of the 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA’21). IEEE, 357–360. Google ScholarCross Ref
- [24] . 2020. Implementation of high-performance blockchain network based on cross-chain technology for IoT applications. Sensors 20, 11 (2020), 3268. Google ScholarCross Ref
- [25] Yizhi Liu, Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo, and Geyong Min. 2023. A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things. IEEE Trans. Comput. 72, 2 (Feb 2023), 501--512. Google ScholarCross Ref
- [26] . 2021. Appxchain: Application-level interoperability for blockchain networks. IEEE Access 9 (2021), 87777–87791. Google ScholarCross Ref
- [27] Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2014. Coinshuffle: Practical decentralized coin mixing for bitcoin. In 19th European Symposium on Research in Computer Security (ESORICS), Vol. 8713. Springer, Springer International Publishing, and Wroclaw Univ Technol, Wroclaw, 345--364. Google ScholarDigital Library
- [28] . 2018. Zero-trust hierarchical management in IoT. In Proceedings of the IEEE International Congress on Internet of Things (ICIOT’18). IEEE, 88–95. Google ScholarCross Ref
- [29] . 2021. IBE-BCIOT: An IBE based cross-chain communication mechanism of blockchain in IoT. World Wide Web 24, 5 (2021), 1665–1690. Google ScholarDigital Library
- [30] . 2020. BitXHub: Side-relay chain based heterogeneous blockchain interoperable platform. Comput. Sci. 47, 06 (2020), 300–308.Google Scholar
- [31] . 2020. Smart collaborative balancing for dependable network components in cyber-physical systems. IEEE Trans. Industr. Inf. 17, 10 (2020), 6916–6924. Google ScholarCross Ref
- [32] . 2022. Optimizing high-speed mobile networks with smart collaborative theory. IEEE Wireless Commun. 29, 3 (2022), 48–54. Google ScholarDigital Library
- [33] . 2019. Smart collaborative distribution for privacy enhancement in moving target defense. Inf. Sci. 479 (2019), 593–606. Google ScholarCross Ref
- [34] . 2019. Smart collaborative tracking for ubiquitous power IoT in edge-cloud interplay domain. IEEE IoT J. 7, 7 (2019), 6046–6055. Google ScholarCross Ref
- [35] . 2022. LSTM-TC: Bitcoin coin mixing detection method with a high recall. Appl. Intell. 52, 1 (2022), 780–793. Google ScholarDigital Library
- [36] . 2021. A 2 l: Anonymous atomic locks for scalability in payment channel hubs. In Proceedings of the IEEE Symposium on Security and Privacy (SP’21). IEEE, 1834–1851. Google ScholarCross Ref
- [37] . 2020. Blockchain for the IoT and industrial IoT: A review. IoT 10 (2020), 100081. Google ScholarCross Ref
- [38] . 2022. Cross-chain mechanism based on spark blockchain. J. Comput. Appl.ions 42, 2 (2022), 519. Google ScholarCross Ref
- [39] Anping Xiong, Guihua Liu, Qingyi Zhu, Ankui Jing, and Seng W. Loke. 2022. A notary group-based cross-chain mechanism. Digital Communications and Networks 8, 6 (2022), 1059--1067. Google ScholarCross Ref
- [40] . 2021. A game-theoretic analysis of cross-chain atomic swaps with HTLCs. In Proceedings of the IEEE 41st International Conference on Distributed Computing Systems (ICDCS’21). IEEE, 584–594. Google ScholarCross Ref
- [41] . 2022. A decentralized lightweight authentication protocol under blockchain. Concurr. Comput.: Pract. Exp. 34, 13 (2022), e6920. Google ScholarCross Ref
- [42] . 2021. An distributed CA system: Identity authentication system in transnational railway transportation based on blockchain. In Proceedings of the International Conference on Computer Information Science and Artificial Intelligence (CISAI’21). IEEE, 989–994. Google ScholarCross Ref
- [43] . 2022. Research on cross-chain technology of blockchain: Challenges and prospects. In Proceedings of the IEEE 2nd International Conference on Power, Electronics and Computer Applications (ICPECA’22). IEEE, 422–428. Google ScholarCross Ref
Index Terms
- An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application
Recommendations
A Privacy Protection Scheme for Cross-Chain Transactions Based on Group Signature and Relay Chain
Recently, with the rapid development of blockchain technology, the information interaction and value transfer problems between different blockchains have become the focus of research. The cross-chain technology is to solve the cross-chain operation ...
IoT Security & Privacy: Threats and Challenges
IoTPTS '15: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and SecurityThe era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent ...
Privacy protection for low-cost RFID tags in IoT systems
CFI '12: Proceedings of the 7th International Conference on Future Internet TechnologiesRFID technologies in IoT systems enable to recognize animate or inanimate objects via radio frequency signals. However, RFID has several privacy problems such as object tracking by reading and tracking the ID transmitted from the RFID-tag. To solve such ...
Comments