A blockchain-based traceability system with efficient search and query (original) (raw)
References
Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Information Sciences: An International Journal
Ali MS, Vecchio M, Pincheira M, Dolui K, Antonelli F, Rehmani MH (2018) Applications of blockchains in the internet of things: A comprehensive survey. Communications Surveys & Tutorials, IEEE Google Scholar
Belotti M, Bozic N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: When, which and how. IEEE Commun Surv Tutorials PP(99):1–1
Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p. 21260
Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Commun Surv Tutorials pp. 2084–2123
Wang W, Hoang DT, Hu P, Xiong Z, Niyato D, Wang P, Wen Y, Dong IK (2019) A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access
Xie J, Yu FR, Huang T, Xie R, Liu J, Liu Y (2019) A survey on the scalability of blockchain systems. IEEE Netw 33(5):166–173 Article Google Scholar
Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, DeCaro A, Enyeart D, Ferris C, Laventman G, Manevich Y et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the thirteenth EuroSys conference, pp. 1–15
Wood G et al (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014):1–32 Google Scholar
Cao Y, Jia F, Manogaran G (2020) Efficient traceability systems of steel products using blockchain-based industrial internet of things. IEEE Trans Industr Inf 16(9):6004–6012 Article Google Scholar
Liu H, Zhang P, Pu G, Yang T, Zhang Y (2020) Blockchain empowered cooperative authentication with data traceability in vehicular edge computing. IEEE Trans Veh Technol PP(99):1–1
Zhuang C, Dai Q, Zhang Y (2022) Bcppt: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Networking and Applications pp. 1–15
Zhang X, Sun Y, Sun Y (2022) Research on cold chain logistics traceability system of fresh agricultural products based on blockchain. Comput Intell Neurosci 2022
Sunny J, Undralla N, Pillai VM (2020) Supply chain transparency through blockchain-based traceability: An overview with demonstration. Comput Ind Eng 150(3):106895 Article Google Scholar
Pal A, Kant K (2019) Using blockchain for provenance and traceability in internet of things-integrated food logistics. Computer 52(12):94–98 Article Google Scholar
Agrawal TK, Kumar V, Pal R, Wang L, Chen Y (2021) Blockchain-based framework for supply chain traceability: A case example of textile and clothing industry. Comput Ind Eng 154:107130 Article Google Scholar
Xu X, Lu Q, Liu Y, Zhu L, Yao H, Vasilakos AV (2019) Designing blockchain-based applications a case study for imported product traceability. Futur Gener Comput Syst 92(MAR.):399–406
Maity M, Tolooie A, Sinha AK, Tiwari MK (2021) Stochastic batch dispersion model to optimize traceability and enhance transparency using blockchain. Comput Ind Eng p. 107134
Ruan P, Dinh T, Lin Q, Zhang M, Chen G, Ooi BC (2021) Lineagechain : a fine-grained, secure and efficient data provenance system for blockchains. VLDB J 30(1):3–24 Article Google Scholar
Yang L, Kai Z, Ying Y, Qi L, Zhou X (2017) Etherql: A query layer for blockchain system. Springer International Publishing AG 2017
Xu C, Zhang C, Xu J (2018) vchain: Enabling verifiable boolean range queries over blockchain databases. SIGMOD/PODS ’19: International Conference on Management of Data
Zhang C, Xu C, Xu J, Tang Y, Choi B (2021) Gem2-tree: A gas-efficient structure for authenticated range queries in blockchain. In: 35th IEEE International Conference on Data Engineering (ICDE ?19)
Gmbh A (2016) Bigchaindb: A scalable blockchain database
Peng Z, Wu H, Xiao B, Guo S (2019) Vql: Providing query efficiency and data authenticity in blockchain systems. In: 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW), pp. 1–6. IEEE
Wang S, Dinh TTA, Lin Q, Xie Z, Zhang M, Cai Q, Chen G, Fu W, Ooi BC, Ruan P (2018) Forkbase: An efficient storage engine for blockchain and forkable applications. arXiv preprint arXiv:1802.04949
Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S&P 2000, pp. 44–55. IEEE
Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934 Article Google Scholar
Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770 Article Google Scholar
Fu Z, Sun X, Linge N, Zhou L (2014) Achieving effective cloud search services: multi-keyword ranked search over encrypted cloud data supporting synonym query. IEEE Trans Consum Electron 60(1):164–172 Article Google Scholar
Premasathian N, Choto S (2013) Searchable encryption schemes: With multiplication and simultaneous congruences. In: 2012 9th International ISC Conference on Information Security and Cryptology
Xia Z, Wang X, Sun X, Wang Q (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352 Article Google Scholar
Boneh D, Waters B (2007) Conjunctive, subset, and range queries on encrypted data. In: Theory of cryptography conference, pp. 535–554. Springer
Dan B, Crescenzo GD, Ostrovsky R, Persiano G (2004) Public key encryption with keyword search. EUROCRYPT 2004
Hwang YH, Lee PJ (2007) Public key encryption with conjunctive keyword search and its extension to a multi-user system. In: International Conference on Pairing-based Cryptography
Miao Y, Ma J, Liu X, Liu Z, Wei F (2018) Vmkdo: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications 11(1):1–11 Google Scholar
Park DJ, Kim K, Lee PJ (2004) Public key encryption with conjunctive field keyword search. In: International Workshop on Information Security Applications, pp. 73–86. Springer
Yin H, Zhang J, Xiong Y, Ou L, Li F, Liao S, Li K (2019) Cp-abse: A ciphertext-policy attribute-based searchable encryption scheme. IEEE Access
Sahai A, Waters BR (2004) Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Attrapadung N, Libert B, Panafieu ED (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: International Workshop on Public Key Cryptography
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. ACM Book Google Scholar
Hohenberger S, Waters B (2013) Attribute-Based Encryption with Fast Decryption. Attribute-Based Encryption with Fast Decryption
Lai J, Deng RH, Li Y, Weng J (2014) Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. ACM Book Google Scholar
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. IEEE Symposium on Security & Privacy
Emura K, Miyaji A, Nomura A, Omote K, Soshi M (2009) A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: International Conference on Information Security Practice and Experience
Rao YS, Dutta R (2013) Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: IFIP International Conference on Communications and Multimedia Security
Zhang Y, Dong Z, Chen X, Jin L, Hui L (2014) Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts. In: International Conference on Provable Security
Green M, Hohenberger S, Waters B et al (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX security symposium 2011
Liu S, Yu J, Xiao Y, Wan Z, Yan B (2020) Bc-sabe: Blockchain-aided searchable attribute-based encryption for cloud-iot. IEEE Internet Things J PP(99):1–1
Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Networking and Applications 13(5):1643–1655 Article Google Scholar
Tang X, Guo C, Choo KKR, Liu Y, Li L (2021) A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain. Comput Netw 200:108540 Article Google Scholar
Li H, Wang T, Qiao Z, Yang B, Gong Y, Wang J, Qiu G (2021) Blockchain-based searchable encryption with efficient result verification and fair payment. Journal of Information Security and Applications 58
Niu J, Li X, Gao J, Han Y (2019) Blockchain-based anti-key-leakage key aggregation searchable encryption for iot. IEEE Internet Things J PP(99):1–1
Chen B, Wu L, Wang H, Zhou L, He D (2020) A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks. IEEE Trans Veh Technol 69(6):5813–5825 Article Google Scholar
Xu C, Yu L, Zhu L, Zhang C (2021) A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. Peer-to-Peer Networking and Applications