Computer Science ›› 2020, Vol. 47 ›› Issue (3): 298-303.doi: 10.11896/jsjkx.190200298

• Information Security • Previous Articles     Next Articles

Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain

LV Jian-fu1,LAI Ying-xu1,2,LIU Jing1   

  1. (Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China)1;
    (Science and Technology on Information Assurance Laboratory, Beijing 100072, China)2
  • Received:2019-02-15 Online:2020-03-15 Published:2020-03-30
  • About author:LV Jian-fu,born in 1993,postgraduate.His main research interests include cyber security,and blockchain. LAI Ying-xu,born in 1973,Ph.D,professor,Ph.D supervisor.Her main research interests include computer network and cyber security.
  • Supported by:
    This work was supported by Qinghai Provincial Natural Science Foundation (2017-ZJ-912) and Foundation of Science and Technology on Information Assurance Laboratory (614211204031117).

Abstract: There are a large number of security device logs in the information system.These security device logs are very important for system monitoring,query,security auditing and fault diagnosis.Therefore,it is important to securely store and process the security device logs in the information system.This paper proposed a log security storage and retrieval model based on the combination of on-chain and off-chain.This model combines blockchain and distributed storage technology,achieves security log storage which is decentralized,detrusted, andhard to tamper with data,and provides a ciphertext retrieval interface to security administrators externally.At the same time, it can use blockchain technology to realize data integrity check.The security analysis demonstrates that the model can ensure the secure and reliable storage of security device logs,and the performance analysis proves that the model has good retrieval efficiency.

Key words: Blockchain, Ciphertext retrieval, Integrity check, Secure storage, Security device log

CLC Number: 

  • TP309
[1]KUMAR M,SINGH A K,KUMAR T V S.Secure Log Storage Using Blockchain and Cloud Infrastructure[C]∥2018 9th International Conference on Computing,Communication and Networking Technologies (ICCCNT).Washington D C:IEEE,2018:1-4.
[2]CHONG C N,PENG Z,HARTEL P H.Secure audit logging with tamper-resistant hardware[C]∥IFIP International Information Security Conference.Boston:Springer,2003:73-84.
[3]WANG G,WANG Z,SUN J,et al.An Audit Log Protection Mechanism Based on SecurityChip[C]∥InternationalConfe-rence on Trusted Systems.Cham:Springer,2015:226-233.
[4]HOLT J E.Logcrypt:forward security and public verification for secure audit logs[C]∥Proceedings of the 2006 Australasian Workshops on Grid Computing and E-research.New York:ACM,2006,167:203-211.
[5]YAVUZ A A,NING P.Baf:An efficient publicly verifiable secure audit logging scheme for distributed systems[C]∥2009 Annual Computer Security Applications Conference.Washington D C:IEEE,2009:219-228.
[6]NAKAMOTO S.Bitcoin:A peer-to-peer Electronic Cash System[OL].https://bitcoin.org/bitcoin.pdf.
[7]YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta AutomaticaSinica,2016,42(4):481-494.
[8]SHAO Q F,JIN C Q,ZHANG Z,et al,Blockchain:Architecture and Reasearch Progress[J].Chinese Journal of Computer,2018,41(5):969-988.
[9]MINGXIAOD,XIAOFENG M,ZHE Z,et al.Areview on consensus algorithm of blockchain[C]∥2017 IEEE International Conference on Systems,Man,and Cybernetics (SMC).Wa-shington D C:IEEE,2017:2567-2572.
[10]CASTROM,LISKOV B.Practical byzantine fault tolerance and proactive recovery[J].ACM Transactions on Computer Systems,2002,20(4):398-461.
[11]BUTERINV.A next-generation smart contract and decentrali- zed application platform[R].2014.
[12]CACHINC.Architecture of the hyperledger blockchain fabric [C]∥Workshop on Distributed Cryptocurrencies and Consensus Ledgers.2016.
[13]BROWNR G.Introducing r3 cordatm:A distributed ledger designed for financial services[R].R3:Corda,2016.
[14]MCCONAGHYT,MARQUESR,MÖLLERA,et al.Bigchain- DB:A scalable blockchain database[R].GmbH:BigchainDB,2016.
[15]Bigchaindb White Paper.BigchainDB:Ascalableblockchain database[EB/OL].(2017-01-11).https://www.bigchaindb.com/whitepaper/bigchaindb-whitepaper.pdf.
[16]ANDREW M,ARI J,ELAINE S,et al.Permacoin:Repurposing bitcoin work for data preservation [C]∥Proceedings of IEEE Symposium on Security and Privacy.Washington D C:IEEE,2014:475-490.
[17]BINANDA S,SAMIRAN B,SUSHMITA R,et al.Retricoin: Bitcoinbased on compact proofs of retrievability[C]∥Procee-dings of the 17th International Conference on Distributed Computing and Networking.New York:ACM,2016:14:1-10.
[18]RUJ S,RAHMAN M S,BASU A,et al.BlockStore:A Secure Decentralized Storage Framework on Blockchain[C]∥2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).Washington D C:IEEE,2018:1096-1103.
[19]ALI D,SALIL S,RAJA J.Blockchain in Internet of Things:Challenges and solutions[EB/OL].(2015-11-12).httpsarxiv. org/ftp/arxiv/papers/1608/160-8.05187.pdf.
[20]MUNEEB A,JUDE C,RYAN S,et al.Blockstack:A globalnaming and storage system secured by blockchains[C]∥Proceedings of the 2016 USE-NIX Annual Technical Conference.Denver:USENIX Association,2016:181-194.
[21]JUDEN,MUNEEB A.Extending existing blockchains with virtualchain[EB/OL].(2016-12-13).http://www.zurich.ibm.com/dccl/paper-s/nelson_dccl_slides.pdf.
[22]LIU Y,CHEN H,HU F.A blockchain-based verification for sharing data securely[C]∥2017 International Conference on Progress in Informatics and Computing (PIC).Washington D C:IEEE,2017:249-253.
[23]LIU B,YU X L,CHEN S,et al.Blockchain based data integrity service framework for IoT data[C]∥2017 IEEE International Conference on Web Services(ICWS).Washington D C:IEEE,2017:468-475.
[24]THEODOULI A,ARAKLIOTIS S,MOSCHOU K,et al.On the design of a Blockchain-based system to facilitate Healthcare Data Sharing[C]∥2018 17th IEEE International Conference On Trust,Security And Privacy in Computing and Communications.Washington D C:IEEE,2018:1374-1379.
[25]ALOMAR A,BHUIYAN M Z A,BASU A,et al.Privacy- friendly platform for healthcare data in cloud based on blockchain environment[J].Future Generation Computer Systems,2019,95(6):511-521.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[3] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[4] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[5] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[6] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[7] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[8] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[9] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[10] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[11] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[12] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[13] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[14] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
[15] FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!