Hybrid concurrency control protocol for data sharing among heterogeneous blockchains

Tiezheng GUO , Zhiwei ZHANG , Ye YUAN , Xiaochun YANG , Guoren WANG

Front. Comput. Sci. ›› 2024, Vol. 18 ›› Issue (3) : 183104

PDF (4494KB)
Front. Comput. Sci. ›› 2024, Vol. 18 ›› Issue (3) : 183104 DOI: 10.1007/s11704-022-2327-7
Architecture
RESEARCH ARTICLE

Hybrid concurrency control protocol for data sharing among heterogeneous blockchains

Author information +
History +
PDF (4494KB)

Abstract

With the development of information technology and cloud computing, data sharing has become an important part of scientific research. In traditional data sharing, data is stored on a third-party storage platform, which causes the owner to lose control of the data. As a result, there are issues of intentional data leakage and tampering by third parties, and the private information contained in the data may lead to more significant issues. Furthermore, data is frequently maintained on multiple storage platforms, posing significant hurdles in terms of enlisting multiple parties to engage in data sharing while maintaining consistency. In this work, we propose a new architecture for applying blockchains to data sharing and achieve efficient and reliable data sharing among heterogeneous blockchains. We design a new data sharing transaction mechanism based on the system architecture to protect the security of the raw data and the processing process. We also design and implement a hybrid concurrency control protocol to overcome issues caused by the large differences in blockchain performance in our system and to improve the success rate of data sharing transactions. We took Ethereum and Hyperledger Fabric as examples to conduct cross-blockchain data sharing experiments. The results show that our system achieves data sharing across heterogeneous blockchains with reasonable performance and has high scalability.

Graphical abstract

Keywords

data sharing / blockchain / concurrency control protocol / crosschain

Cite this article

Download citation ▾
Tiezheng GUO, Zhiwei ZHANG, Ye YUAN, Xiaochun YANG, Guoren WANG. Hybrid concurrency control protocol for data sharing among heterogeneous blockchains. Front. Comput. Sci., 2024, 18(3): 183104 DOI:10.1007/s11704-022-2327-7

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Chen M S, Han J, Yu P S . Data mining: an overview from a database perspective. IEEE Transactions on Knowledge and data Engineering, 1996, 8( 6): 866–883

[2]

Dunning L A, Kresman R . Privacy preserving data sharing with anonymous ID assignment. IEEE Transactions on Information Forensics and Security, 2013, 8( 2): 402–413

[3]

Kandukuri B R, Paturi V R, Rakshit A. Cloud security issues. In: Proceedings of 2009 IEEE International Conference on Services Computing. 2009, 517–520

[4]

Papadimitriou P, Garcia-Molina H . Data leakage detection. IEEE Transactions on Knowledge and Data Engineering, 2011, 23( 1): 51–63

[5]

Yang J J, Li J Q, Niu Y . A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 2015, 43–44: 74–86

[6]

Wei J, Wulan B, Yan J, Sun M, Jing H. The adoption of blockchain technologies in data sharing: a state of the art survey. In: Proceedings of the WHICEB 2019. 2019

[7]

Zheng Z, Xie S, Dai H N, Chen X, Wang H . Blockchain challenges and opportunities: a survey. International Journal of Web and Grid Services, 2018, 14( 4): 352–375

[8]

Piao C, Hao Y, Yan J, Jiang X . Privacy preserving in blockchain-based government data sharing: a Service-On-Chain (SOC) approach. Information Processing & Management, 2021, 58( 5): 102651

[9]

Wang S, Liu J. Blockchain based secure data sharing model. In: Proceedings of the 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 2021, 464–469

[10]

Johnson S, Robinson P, Brainard J. Sidechains and interoperability. 2019, arXiv preprint arXiv: 1903.04077

[11]

Tenopir C, Rice N M, Allard S, Baird L, Borycz J, Christian L, Grant B, Olendorf R, Sandusky R J . Data sharing, management, use, and reuse: practices and perceptions of scientists worldwide. PLoS One, 2020, 15( 3): e0229003

[12]

Poldrack R A, Gorgolewski K J . Making big data open: data sharing in neuroimaging. Nature Neuroscience, 2014, 17( 11): 1510–1517

[13]

Underwood S. Blockchain beyond bitcoin. Communications of the ACM, 2016, 59(11): 15−17

[14]

Wang S, Zhang Y, Zhang Y . A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access, 2018, 6: 38437–38450

[15]

Dubovitskaya A, Xu Z, Ryu S, Schumacher M, Wang F . Secure and trustable electronic medical records sharing using blockchain. AMIA Annual Symposium Proceedings, 2017, 2017: 650–659

[16]

Guo Y, Wang S, Huang J . A blockchain-assisted framework for secure and reliable data sharing in distributed systems. EURASIP Journal on Wireless Communications and Networking, 2021, 2021( 1): 169

[17]

Zheng B K, Zhu L H, Shen M, Gao F, Zhang C, Li Y D, Yang J . Scalable and privacy-preserving data sharing based on blockchain. Journal of Computer Science and Technology, 2018, 33( 3): 557–567

[18]

Garfinkel T, Pfaff B, Chow J, Rosenblum M, Boneh D. Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles. 2003, 193–206

[19]

Sabt M, Achemlal M, Bouabdallah A. Trusted execution environment: what it is, and what it is not. In: Proceedings of 2015 IEEE Trustcom/BigDataSE/ISPA. 2015, 57–64

[20]

Chakrabarti S, Leslie-Hurd R, Vij M, Mckeen F, Rozas C, Caspi D, Alexandrovich I, Anati I. Intel® software guard extensions (Intel® SGX) architecture for oversubscription of secure memory in a virtualized environment. In: Proceedings of the Hardware and Architectural Support for Security and Privacy. 2017, 1−8

[21]

McKeen F, Alexandrovich I, Anati I, Caspi D, Johnson S, Leslie-Hurd R, Rozas C. Intel® software guard extensions (Intel® SGX) support for dynamic memory management inside an enclave. In: Proceedings of the Hardware and Architectural Support for Security and Privacy 2016. 2016, 10

[22]

Johnson S, Scarlata V, Rozas C, Brickell E, Mckeen F, Corporation I. Intel® Software Guard Extensions: EPID Provisioning and Attestation Services. White Paper, 2016, 1(1–10): 119

[23]

Yang R, Wakefield R, Lyu S, Jayasuriya S, Han F, Yi X, Yang X, Amarasinghe G, Chen S . Public and private blockchain in construction business process and information integration. Automation in Construction, 2020, 118: 103276

[24]

Fischer M J, Lynch N A, Paterson M S . Impossibility of distributed consensus with one faulty process. Journal of the ACM, 1985, 32( 2): 374–382

[25]

Tikhomirov S. Ethereum: state of knowledge and research perspectives. In: Proceedings of International Symposium on Foundations and Practice of Security. 2017, 206−221

[26]

Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro D, Enyeart D, Ferris C, Laventman G, Manevich Y, Muralidharan S, Murthy C, Nguyen B, Sethi M, Singh G, Smith K, Soriniotti A, Stathakopoulou C, Vukolić M, Cocco S W, Yellick J. Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. 2018, 30

[27]

Eswaran K P, Gray J N, Lorie R A, Traiger I L . The notions of consistency and predicate locks in a database system. Communications of the ACM, 1976, 19( 11): 624–633

[28]

Chen Y, Yu X, Koutris P, Arpaci-Dusseau A C, Arpaci-Dusseau R H, Shu J. Plor: general transactions with predictable, low tail latency. In: Proceedings of the 2022 International Conference on Management of Data. 2022, 19–33

[29]

Rescorla E. Diffie-Hellman Key Agreement Method. RFC, 1999, 2631: 1–13

[30]

Sharma A, Schuhknecht F M, Agrawal D, Dittrich J. Blurring the lines between blockchains and database systems: the case of hyperledger fabric. In: Proceedings of 2019 International Conference on Management of Data. 2019, 105–122

[31]

Ruan P, Loghin D, Ta Q T, Zhang M, Chen G, Ooi B C. A transactional perspective on execute-order-validate blockchains. In: Proceedings of 2020 ACM SIGMOD International Conference on Management of Data. 2020, 543–557

RIGHTS & PERMISSIONS

Higher Education Press

AI Summary AI Mindmap
PDF (4494KB)

Supplementary files

FCS-22327-OF-TG_suppl_1

2042

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/