Computer Science ›› 2020, Vol. 47 ›› Issue (3): 298-303.doi: 10.11896/jsjkx.190200298

• Information Security • Previous Articles     Next Articles

Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain

LV Jian-fu1,LAI Ying-xu1,2,LIU Jing1   

  1. (Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China)1;
    (Science and Technology on Information Assurance Laboratory, Beijing 100072, China)2
  • Received:2019-02-15 Online:2020-03-15 Published:2020-03-30
  • About author:LV Jian-fu,born in 1993,postgraduate.His main research interests include cyber security,and blockchain. LAI Ying-xu,born in 1973,Ph.D,professor,Ph.D supervisor.Her main research interests include computer network and cyber security.
  • Supported by:
    This work was supported by Qinghai Provincial Natural Science Foundation (2017-ZJ-912) and Foundation of Science and Technology on Information Assurance Laboratory (614211204031117).

Abstract: There are a large number of security device logs in the information system.These security device logs are very important for system monitoring,query,security auditing and fault diagnosis.Therefore,it is important to securely store and process the security device logs in the information system.This paper proposed a log security storage and retrieval model based on the combination of on-chain and off-chain.This model combines blockchain and distributed storage technology,achieves security log storage which is decentralized,detrusted, andhard to tamper with data,and provides a ciphertext retrieval interface to security administrators externally.At the same time, it can use blockchain technology to realize data integrity check.The security analysis demonstrates that the model can ensure the secure and reliable storage of security device logs,and the performance analysis proves that the model has good retrieval efficiency.

Key words: Security device log, Blockchain, Secure storage, Ciphertext retrieval, Integrity check

CLC Number: 

  • TP309
[1]KUMAR M,SINGH A K,KUMAR T V S.Secure Log Storage Using Blockchain and Cloud Infrastructure[C]∥2018 9th International Conference on Computing,Communication and Networking Technologies (ICCCNT).Washington D C:IEEE,2018:1-4.
[2]CHONG C N,PENG Z,HARTEL P H.Secure audit logging with tamper-resistant hardware[C]∥IFIP International Information Security Conference.Boston:Springer,2003:73-84.
[3]WANG G,WANG Z,SUN J,et al.An Audit Log Protection Mechanism Based on SecurityChip[C]∥InternationalConfe-rence on Trusted Systems.Cham:Springer,2015:226-233.
[4]HOLT J E.Logcrypt:forward security and public verification for secure audit logs[C]∥Proceedings of the 2006 Australasian Workshops on Grid Computing and E-research.New York:ACM,2006,167:203-211.
[5]YAVUZ A A,NING P.Baf:An efficient publicly verifiable secure audit logging scheme for distributed systems[C]∥2009 Annual Computer Security Applications Conference.Washington D C:IEEE,2009:219-228.
[6]NAKAMOTO S.Bitcoin:A peer-to-peer Electronic Cash System[OL].https://bitcoin.org/bitcoin.pdf.
[7]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta AutomaticaSinica,2016,42(4):481-494.
[8]SHAO Q F,JIN C Q,ZHANG Z,et al,Blockchain:Architecture and Reasearch Progress[J].Chinese Journal of Computer,2018,41(5):969-988.
[9]MINGXIAOD,XIAOFENG M,ZHE Z,et al.Areview on consensus algorithm of blockchain[C]∥2017 IEEE International Conference on Systems,Man,and Cybernetics (SMC).Wa-shington D C:IEEE,2017:2567-2572.
[10]CASTROM,LISKOV B.Practical byzantine fault tolerance and proactive recovery[J].ACM Transactions on Computer Systems,2002,20(4):398-461.
[11]BUTERINV.A next-generation smart contract and decentrali- zed application platform[R].2014.
[12]CACHINC.Architecture of the hyperledger blockchain fabric [C]∥Workshop on Distributed Cryptocurrencies and Consensus Ledgers.2016.
[13]BROWNR G.Introducing r3 cordatm:A distributed ledger designed for financial services[R].R3:Corda,2016.
[14]MCCONAGHYT,MARQUESR,MÖLLERA,et al.Bigchain- DB:A scalable blockchain database[R].GmbH:BigchainDB,2016.
[15]Bigchaindb White Paper.BigchainDB:Ascalableblockchain database[EB/OL].(2017-01-11).https://www.bigchaindb.com/whitepaper/bigchaindb-whitepaper.pdf.
[16]ANDREW M,ARI J,ELAINE S,et al.Permacoin:Repurposing bitcoin work for data preservation [C]∥Proceedings of IEEE Symposium on Security and Privacy.Washington D C:IEEE,2014:475-490.
[17]BINANDA S,SAMIRAN B,SUSHMITA R,et al.Retricoin: Bitcoinbased on compact proofs of retrievability[C]∥Procee-dings of the 17th International Conference on Distributed Computing and Networking.New York:ACM,2016:14:1-10.
[18]RUJ S,RAHMAN M S,BASU A,et al.BlockStore:A Secure Decentralized Storage Framework on Blockchain[C]∥2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).Washington D C:IEEE,2018:1096-1103.
[19]ALI D,SALIL S,RAJA J.Blockchain in Internet of Things:Challenges and solutions[EB/OL].(2015-11-12).httpsarxiv. org/ftp/arxiv/papers/1608/160-8.05187.pdf.
[20]MUNEEB A,JUDE C,RYAN S,et al.Blockstack:A globalnaming and storage system secured by blockchains[C]∥Proceedings of the 2016 USE-NIX Annual Technical Conference.Denver:USENIX Association,2016:181-194.
[21]JUDEN,MUNEEB A.Extending existing blockchains with virtualchain[EB/OL].(2016-12-13).http://www.zurich.ibm.com/dccl/paper-s/nelson_dccl_slides.pdf.
[22]LIU Y,CHEN H,HU F.A blockchain-based verification for sharing data securely[C]∥2017 International Conference on Progress in Informatics and Computing (PIC).Washington D C:IEEE,2017:249-253.
[23]LIU B,YU X L,CHEN S,et al.Blockchain based data integrity service framework for IoT data[C]∥2017 IEEE International Conference on Web Services(ICWS).Washington D C:IEEE,2017:468-475.
[24]THEODOULI A,ARAKLIOTIS S,MOSCHOU K,et al.On the design of a Blockchain-based system to facilitate Healthcare Data Sharing[C]∥2018 17th IEEE International Conference On Trust,Security And Privacy in Computing and Communications.Washington D C:IEEE,2018:1374-1379.
[25]ALOMAR A,BHUIYAN M Z A,BASU A,et al.Privacy- friendly platform for healthcare data in cloud based on blockchain environment[J].Future Generation Computer Systems,2019,95(6):511-521.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[4] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[5] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[6] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[7] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[8] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[9] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[10] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[11] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
[12] PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280.
[13] ZHOU Chang,LU Hui-mei,XIANG Yong,WU Jing-bang. Survey on Application of Blockchain in VANET [J]. Computer Science, 2020, 47(2): 213-220.
[14] CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275.
[15] ZHANG Peng-yi, SONG Jie. Research Advance on Efficiency Optimization of Blockchain Consensus Algorithms [J]. Computer Science, 2020, 47(12): 296-303.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .