A blockchain-based traceability system with efficient search and query (original) (raw)

References

  1. Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Information Sciences: An International Journal
  2. Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2018) Applications of blockchains in the internet of things: A comprehensive survey. Communications Surveys & Tutorials, IEEE
    Google Scholar
  3. Belotti M, Bozic N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: When, which and how. IEEE Commun Surv Tutorials PP(99):1–1
  4. Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p. 21260
  5. Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun Surv Tutorials pp. 2084–2123
  6. Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Dong IK (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access
  7. Xie J, Yu FR, Huang T, Xie R, Liu J, Liu Y (2019) A survey on the scalability of blockchain systems. IEEE Netw 33(5):166–173
    Article Google Scholar
  8. Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, DeCaro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15
  9. Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32
    Google Scholar
  10. Cao Y, Jia F, Manogaran G (2020) Efficient traceability systems of steel products using blockchain-based industrial internet of things. IEEE Trans Industr Inf 16(9):6004–6012
    Article Google Scholar
  11. Liu H, Zhang P, Pu G, Yang T, Zhang Y (2020) Blockchain empowered cooperative authentication with data traceability in vehicular edge computing. IEEE Trans Veh Technol PP(99):1–1
  12. Zhuang C, Dai Q, Zhang Y (2022) Bcppt: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Networking and Applications pp. 1–15
  13. Zhang X, Sun Y, Sun Y (2022) Research on cold chain logistics traceability system of fresh agricultural products based on blockchain. Comput Intell Neurosci 2022
  14. Sunny J, Undralla N, Pillai VM (2020) Supply chain transparency through blockchain-based traceability: An overview with demonstration. Comput Ind Eng 150(3):106895
    Article Google Scholar
  15. Pal A, Kant K (2019) Using blockchain for provenance and traceability in internet of things-integrated food logistics. Computer 52(12):94–98
    Article Google Scholar
  16. Agrawal TK, Kumar V, Pal R, Wang L, Chen Y (2021) Blockchain-based framework for supply chain traceability: A case example of textile and clothing industry. Comput Ind Eng 154:107130
    Article Google Scholar
  17. Xu X, Lu Q, Liu Y, Zhu L, Yao H, Vasilakos AV (2019) Designing blockchain-based applications a case study for imported product traceability. Futur Gener Comput Syst 92(MAR.):399–406
  18. Maity M, Tolooie A, Sinha AK, Tiwari MK (2021) Stochastic batch dispersion model to optimize traceability and enhance transparency using blockchain. Comput Ind Eng p. 107134
  19. Leveldb. https://github.com/google/leveldb. Accessed 2018
  20. Couchdb. https://couchdb.apache.org. Accessed 2015
  21. Mangodb. https://mongodb.org. Accessed 2019
  22. Ruan P, Dinh T, Lin Q, Zhang M, Chen G, Ooi BC (2021) Lineagechain : a fine-grained, secure and efficient data provenance system for blockchains. VLDB J 30(1):3–24
    Article Google Scholar
  23. Yang L, Kai Z, Ying Y, Qi L, Zhou X (2017) Etherql: A query layer for blockchain system. Springer International Publishing AG 2017
  24. Xu C, Zhang C, Xu J (2018) vchain: Enabling verifiable boolean range queries over blockchain databases. SIGMOD/PODS ’19: International Conference on Management of Data
  25. Zhang C, Xu C, Xu J, Tang Y, Choi B (2021) Gem2-tree: A gas-efficient structure for authenticated range queries in blockchain. In: 35th IEEE International Conference on Data Engineering (ICDE ?19)
  26. Gmbh A (2016) Bigchaindb: A scalable blockchain database
  27. Peng Z, Wu H, Xiao B, Guo S (2019) Vql: Providing query efficiency and data authenticity in blockchain systems. In: 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), pp. 1–6. IEEE
  28. Wang S, Dinh TTA, Lin Q, Xie Z, Zhang M, Cai Q, Chen G, Fu W, Ooi BC, Ruan P (2018) Forkbase: An efficient storage engine for blockchain and forkable applications. arXiv preprint arXiv:1802.04949
  29. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp. 44–55. IEEE
  30. Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934
    Article Google Scholar
  31. Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770
    Article Google Scholar
  32. Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172
    Article Google Scholar
  33. Premasathian N, Choto S (2013) Searchable encryption schemes: With multiplication and simultaneous congruences. In: 2012 9th International ISC Conference on Information Security and Cryptology
  34. Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
    Article Google Scholar
  35. Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp. 535–554. Springer
  36. Dan B, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. EUROCRYPT 2004
  37. Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-based Cryptography
  38. Miao Y, Ma J, Liu X, Liu Z, Wei F (2018) Vmkdo: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications 11(1):1–11
    Google Scholar
  39. Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer
  40. Yin H, Zhang J, Xiong Y, Ou L, Li F, Liao S, Li K (2019) Cp-abse: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access
  41. Sahai A, Waters BR (2004) Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
  42. Attrapadung N, Libert B, Panafieu ED (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International Workshop on Public Key Cryptography
  43. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACM
    Book Google Scholar
  44. Hohenberger S, Waters B (2013) Attribute-Based Encryption with Fast Decryption. Attribute-Based Encryption with Fast Decryption
  45. Lai J, Deng RH, Li Y, Weng J (2014) Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. ACM
    Book Google Scholar
  46. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security & Privacy
  47. Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: International Conference on Information Security Practice and Experience
  48. Rao YS, Dutta R (2013) Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: IFIP International Conference on Communications and Multimedia Security
  49. Zhang Y, Dong Z, Chen X, Jin L, Hui L (2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: International Conference on Provable Security
  50. Green M, Hohenberger S, Waters B et al (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX security symposium 2011
  51. Liu S, Yu J, Xiao Y, Wan Z, Yan B (2020) Bc-sabe: Blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J PP(99):1–1
  52. Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Networking and Applications 13(5):1643–1655
    Article Google Scholar
  53. Tang X, Guo C, Choo KKR, Liu Y, Li L (2021) A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Comput Netw 200:108540
    Article Google Scholar
  54. Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58
  55. Niu J, Li X, Gao J, Han Y (2019) Blockchain-based anti-key-leakage key aggregation searchable encryption for iot. IEEE Internet Things J PP(99):1–1
  56. Chen B, Wu L, Wang H, Zhou L, He D (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6):5813–5825
    Article Google Scholar
  57. Xu C, Yu L, Zhu L, Zhang C (2021) A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. Peer-to-Peer Networking and Applications

Download references