Advertisement

A Novel Fair and Verifiable Data Trading Scheme

  • Haiyong Yu
  • Juntao GaoEmail author
  • Tong Wu
  • Xuelian Li
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1105)

Abstract

With the widespread use of smart devices, a huge volume of data is generated every day, which is helpful for device user and device enterprises. However, the data generated by the smart device contains the user’s privacy, and the data is easy to be modified, forged, which requires a suitable scheme to protect the privacy of the data seller, the authenticity of the data, the fairness during the data trading process. In order to solve the problems, we design a novel fair and verifiable data trading scheme by combining hash function, signature, oblivious transfer, smart contract and private blockchain. The hash function is used for data integrity, the signature is used for the source of the data, the oblivious transfer is used for data verification, the smart contract is used for the encryption key trading, and the private blockchain is used as a ledger for the verification record, trading record and user reputation. The performance analysis shows that our scheme has enough features to help users complete data trading, and our scheme provides an extra function, the reputation record of users to reduce the possibility of user being deceived. The security analysis shows that our scheme provides IND-CCA security, anonymity, and has the capability of resisting collusion attack and data seller fraud. The fairness and practicability of the scheme are verified by simulation.

Keywords

Blockchain Oblivious transfer Smart contract Data trading 

Notes

Acknowledgement

This work is supported in part by the National Key Research and Development Program of China (No. 2016YFB0800601), the Natural Science Foundation of China (No. 61303217, 61502372).

References

  1. 1.
    Juang, W.S., Shue, Y.Y.: A secure and privacy protection digital goods trading scheme in cloud computing. In: 2010 International Computer Symposium (ICS 2010), pp. 288–293. IEEE (2010)Google Scholar
  2. 2.
    Chen, C.L., Liao, J.J.: Fair offline digital content transaction system. IET Inf. Secur. 6(3), 123–130 (2012)CrossRefGoogle Scholar
  3. 3.
    Hwang, R.J., Lai, C.H.: Provable fair document exchange protocol with transaction privacy for e-commerce. Symmetry 7(2), 464–487 (2015)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Delgado-Segura, S., et al.: A fair protocol for data trading based on Bitcoin transactions. Future Gener. Comput. Syst. (2017).  https://doi.org/10.1016/j.future.2017.08.021
  5. 5.
    Kiyomoto, S., Fukushima, K.: Fair-trading protocol for anonymised datasets requirements and solution. In: 2018 4th International Conference on Information Management (ICIM), pp. 13–16. IEEE (2018)Google Scholar
  6. 6.
    Wang, D., Gao, J., Yu, H., Li, X.: A novel digital rights management in P2P networks based on Bitcoin system. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds.) FCS 2018. CCIS, vol. 879, pp. 227–240. Springer, Singapore (2018).  https://doi.org/10.1007/978-981-13-3095-7_18CrossRefGoogle Scholar
  7. 7.
    Zhao, Y., Yu, Y., Li, Y.: Machine learning based privacy-preserving fair data trading in big data marke. Inf. Sci. 478, 449–460 (2019)CrossRefGoogle Scholar
  8. 8.
    Missier, P., Bajoudah, S., Capossele, A., et al.: Mind My Value: a decentralized infrastructure for fair and trusted IoT data trading. In: Proceedings of the Seventh International Conference on the Internet of Things, p. 15. ACM (2017)Google Scholar
  9. 9.
    Alrawahi, A.S., Lee, K., Lotfi, A.: Trading of cloud of things resources. In: Proceedings of the Second International Conference on Internet of things and Cloud Computing, p. 163. ACM (2017)Google Scholar
  10. 10.
    Perera, C.: Sensing as a service (S2aaS): Buying and selling IoT data. arXiv preprint arXiv:1702.02380 (2017)
  11. 11.
    Huang, Z., Su, X., Zhang, Y., et al.: A decentralized solution for IoT data trusted exchange based-on blockchain. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 1180–1184. IEEE (2017)Google Scholar
  12. 12.
    Juang, W.S., Shue, Y.Y.: A secure and privacy protection digital goods trading scheme in cloud computing. In: 2010 International Computer Symposium (ICS 2010), pp. 288–293. IEEE (2010)Google Scholar
  13. 13.
    Lin, S.J., Liu, D.C.: An incentive-based electronic payment scheme for digital content transactions over the Internet. J. Netw. Comput. Appl. 32(3), 589–598 (2009)CrossRefGoogle Scholar
  14. 14.
    Lin, S.-J., Liu, D.-C.: A fair-exchange and customer-anonymity electronic commerce protocol for digital content transactions. In: Janowski, T., Mohanty, H. (eds.) ICDCIT 2007. LNCS, vol. 4882, pp. 321–326. Springer, Heidelberg (2007).  https://doi.org/10.1007/978-3-540-77115-9_34CrossRefGoogle Scholar
  15. 15.
    Cattelan, R.G., He, S., Kirovski, D.: Prototyping a novel platform for free-trade of digital content. In: Proceedings of the 12th Brazilian Symposium on Multimedia and the Web, pp. 79–88. ACM (2006)Google Scholar
  16. 16.
    Fan, C.I., Juang, W.S., Chen, M.T.: Efficient fair content exchange in cloud computing. In: 2010 International Computer Symposium (ICS 2010), pp. 294–299. IEEE (2010)Google Scholar
  17. 17.
    Qian, W., Qi, S.: A fair transaction protocol with an offline semi-trusted third party. In: Phillips-Wren, G., Jain, L.C., Nakamatsu, K., Howlett, R.J. (eds.) Advances in Intelligent Decision Technologies, pp. 249–257. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-14616-9_24CrossRefGoogle Scholar
  18. 18.
    Rabin, M.O.: How to exchange secrets by oblivious transfer. Report no[R], TR-81, Harvard Aiken Computation Laboratory (1981)Google Scholar
  19. 19.
    Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637–647 (1985)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  21. 21.
    Yang, B.: Provable Security in Cryptography. Tsinghua University Press, Beijing (2017). (In Chinese)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.ISN State Key Laboratory ChinaXi’anP. R. China
  2. 2.School of Mathematics and StatisticsXidian UniversityXi’anChina

Personalised recommendations