Computer Science ›› 2025, Vol. 52 ›› Issue (10): 348-356.doi: 10.11896/jsjkx.250200001

• Information Security • Previous Articles     Next Articles

Approach for Lightweight Verifiable Data Management Based on Blockchains

WU Moxun1, PENG Zeshun1, YU Minghe2, LI Xiaohua1, DONG Xiaomei1, NIE Tiezheng1, YU Ge1   

  1. 1 School of Computer Science and Engineering,Northeastern University,Shenyang 110000,China
    2 Software College of Northeastern University,Shenyang 110000,China
  • Received:2025-02-05 Revised:2025-06-15 Online:2025-10-15 Published:2025-10-14
  • About author:WU Moxun,born in 2000,postgra-duate,is a student member of CCF(No.N5671G).His main research interests include query processing and blockchain technology.
    YU Ge,born in 1962,professor,Ph.D supervisor,is a member of CCF(No.05408F).His main research interests include distri-buted system and big data management.
  • Supported by:
    General Program of National Natural Science Foundation of China(62372097,62072086),Major Program of National Social Science Foundation of China(21&ZD124) and Fundamental Research Funds for the Central Universities of Ministry of Education of China(N2416003).

Abstract: Combining the advantages of both blockchain and database technologies,this paper proposes a blockchain-based verifiable data management approach.Unlike existing works,this approach does not require changes to the existing database storage mode,allowing for verifiable queries and data traceability without changing the performance and structure of the original database,thus better suiting various application scenarios.Firstly,a two-phase commit protocol is adopted to design an interaction model among users,the database,and the blockchain,along with an efficient data synchronization mechanism to ensure the atomicity of transactions between the blockchain and the database.Secondly,an index tree structure based on data attribute encoding is introduced to support accurate,complete,and efficient verifiable queries on the blockchain.Finally,comprehensive theoretical analysis and performance evaluations are conducted.In terms of security,it achieves data tamper-resistance and user privacy protection.In terms of system effectiveness,it ensures consistency between blockchain and database data.In terms of system efficiency,it reduces storage space by about 90% and improves query verification efficiency by approximately 77% compared to other typical works.

Key words: Blockchain,Verifiable queries,Data traceability,Distributed database

CLC Number: 

  • TP393
[1]YU G,NIE T Z,LI X H,et al.The challenge and prospect of distributed data management techniques in blockchain systems[J].Chinese Journal of Computers,2021,44(1):28-54.
[2]HE P,YU G,ZHANG Y F,et al.Survey on blockchain technolo-gy and tts application prospect[J].Chinese Journal of Compu-ters,2017,44(4):1-7,15.
[3]CHEN J,YAO S,YUAN Q,et al.Certchain:public and efficient certificate audit based on blockchain for TLS connections[C]//Proceedings of IEEE INFOCOM.2018:2060-2068.
[4]KUBILAY M Y,KIRAZ M S,MANTAR H A.CertLedger:A new PKI model with certificate transparency based on blockchain[J].Computers & Security,2019,85:333-352.
[5]SHEN M,LIU H,ZHU L,et al.Blockchain-assisted secure device authentication for cross-domain industrial IoT[J].IEEE Journal on Selected Areas in Communications,2020,38(5):942-954.
[6]ADJA Y C E,HAMMI B,SERHROUCHNI A,et al.A blockchain-based certificate revocation management and status verification system[J].Computers & Security,2021,104:102209.
[7]TRUONG N B,SUN K,LEE G M,et al.GDPR-compliant personal data management:a blockchain-based solution[J].IEEE Transactions on Information Forensics and Security,2019,15:1746-1761.
[8]XIONG Z,ZHANG Y,LUONG N C,et al.The best of bothworlds:A general architecture for data management in blockchain-enabled Internet-of-Things[J].IEEE Network,2020,34(1):166-173.
[9]SHAFAGH H,BURKHALTER L,HITHNAWI A,et al.Towards blockchain-based auditable storage and sharing of IoT data[C]//Proceedings of the 2017 on Cloud Computing Security Workshop.2017:45-50.
[10]HARI A,LAKSHMAN T V.The internet blockchain:A distributed,tamper-resistant transaction framework for the internet[C]//Proceedings of the 15th ACM Workshop on Hot To-pics in Networks.2016:204-210.
[11]XING Q,WANG B,WANG X.POSTER:BGPCoin:A trust-worthy blockchain-based resource management solution for BGP security[C]//Proceedings of the 2017 ACM SIGSAC Confe-rence on Computer and Communications Security.2017:2591-2593.
[12]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain:architecture and research progress[J].Chinese Journal of Computers,2018,41(5):969-88.
[13]LI Y,ZHENG K,YAN Y,et al.EtherQL:A query layer for blockchain system[C]//Proceedings of DASFAA.2017:556-567.
[14]WU H,PENG Z,GUO S,et al.VQL:Efficient and verifiable cloud query services for blockchain systems[J].IEEE Transactions on Parallel and Distributed Systems,2021,33(6):1393-1406.
[15]MCCONAGHY T,MARQUES R,MÜLLER A,et al.Bigchaindb:a scalable blockchain database[R].Berlin:White Paper,BigChainDB,2016:53-72.
[16]TSANG Y P,LEE C K M,ZHANG K,et al.On-chain and off-chain data management for blockchain-internet of things:a multi-agent deep reinforcement learning approach[J].Journal of Grid Computing,2024,22(1):16.
[17]ZHU Y,ZHANG Z,JIN C,et al.SEBDB:Semantics empowered blockchain database[C]//Proceedings of ICDE.2019:1820-1831.
[18]XU C,ZHANG C,XU J.Vchain:Enabling verifiable booleanrange queries over blockchain databases[C]//Proceedings of SIGMOD.2019:141-158.
[19]CHENG J,QI S,AN B,et al.Lightweight verifiable blockchain top-k queries[J].Future Generation Computer Systems,2024,156:105-115.
[20]LI W,FENG Y,LIU N,et al.A secure and efficient log storage and query framework based on blockchain[J].Computer Networks,2024,252:110683.
[21]LIU Q,PENG Y,XU M,et al.MPV:Enabling fine-grained query authentication in hybrid-storage blockchain[J].IEEE TKDE,2024,36(7):3297-3311.
[22]ZHOU F,JIAO Z,WANG Q,et al.BCVSE:Verifiable searchable encryption scheme with blockchain supporting fuzzy query[J].Arabian Journal for Science and Engineering,2024,49(3):4401-4418.
[23]PENG Y,DU M,LI F,et al.FalconDB:Blockchain-based collaborative database[C]//Proceedings of SIGMOD.2020:637-652.
[24]XU C,ZHANG C,XU J,et al.SlimChain:Scaling blockchain transactions through off-chain storage and parallel processing[J].PVLDB Endowment,2021,14(11):2314-2326.
[25]SHEN D,DUMAS C,SARDINA C,et al.Cholula:Fast,fault-tolerant,and stronglyconsistent off-chain object storage[C]//Proceedings of 4th International Conference on Blockchain Computing and Applications.IEEE,2022:189-194.
[26]ZHOU J,WANG N,LIU A,et al.Cbcs:A scalable consortium blockchain architecture based on world state collaborative storage[J].Electronics,2023,12(3):735.
[27]KRAFT P,LI Q,ZHOU X,et al.Epoxy:ACID transactionsacross diverse data stores[J].PVLDB Endowment,2023,16(11):2742-2754.
[28]JIAO T,SHEN D,NIE T.BlockchainDB:Querable and immutable database[J].Journal of Software,2019,30(9):2671-2685.
[29]SUN Y M,FAN H B,PENG M Y,et al.A method of off-chain data verifiable query for consortium blockchain [J].Modern Electronics Technique,2023,46(19):70-74.
[30]PENG Z,ZHANG Y,XU Q,et al.NeuChain:a fast permis-sioned blockchain system with deterministic ordering [J].PVLDB Endowment,2022,15(11):2585-2598.
[1] HU Yongqing, YANG Han, LIU Ziyuan, QING Guangjun, DAI Qinglong. ACCF:Time Prediction Mechanism-driven Top-k Flow Measurement [J]. Computer Science, 2025, 52(10): 98-105.
[2] DUAN Pengsong, ZHANG Yihang, FANG Tao, CAO Yangjie, WANG Chao. WiLCount:A Lightweight Crowd Counting Model for Wireless Perception Scenarios [J]. Computer Science, 2025, 52(10): 317-327.
[3] WANG Pengrui, HU Yuxiang, CUI Pengshuai, DONG Yongji, XIA Jiqiang. SRv6 Functional Conformance Verification Mechanism Based on the Programmable Data Plane [J]. Computer Science, 2025, 52(10): 328-335.
[4] XU Jia, LIU Jingyi, XU Lijie, LIU Linfeng. Wireless Charging Scheduling with Minimized Maximum Return-to-Work Time for Heterogeneous Mobile Rechargeable Devices [J]. Computer Science, 2025, 52(10): 336-347.
[5] HE Hao, ZHANG Hui. Intrusion Detection Method Based on Improved Active Learning [J]. Computer Science, 2025, 52(10): 357-365.
[6] ZHU Ziyi, ZHANG Jianhui, ZENG Junjieand ZHANG Hongyuan. Security-aware Service Function Chain Deployment Method Based on Deep ReinforcementLearning [J]. Computer Science, 2025, 52(10): 404-411.
[7] WU Jiagao, YI Jing, ZHOU Zehui, LIU Linfeng. Personalized Federated Learning Framework for Long-tailed Heterogeneous Data [J]. Computer Science, 2025, 52(9): 232-240.
[8] SHEN Tao, ZHANG Xiuzai, XU Dai. Improved RT-DETR Algorithm for Small Object Detection in Remote Sensing Images [J]. Computer Science, 2025, 52(8): 214-221.
[9] LONG Tie, XIAO Fu, FAN Weibei, HE Xin, WANG Junchang. Cubic+:Enhanced Cubic Congestion Control for Cross-datacenter Networks [J]. Computer Science, 2025, 52(8): 335-342.
[10] YE Miao, WANG Jue, JIANG Qiuxiang, WANG Yong. SDN-based Integrated Communication and Storage Edge In-network Storage Node Selection Method [J]. Computer Science, 2025, 52(8): 343-353.
[11] FAN Xinggang, JIANG Xinyang, GU Wenting, XU Juntao, YANG Youdong, LI Qiang. Effective Task Offloading Strategy Based on Heterogeneous Nodes [J]. Computer Science, 2025, 52(8): 354-362.
[12] ZHAO Jihong, MA Jian, LI Qianwen, NING Lijuan. Service Function Chain Deployment Method Based on VNF Divided Backup Mechanisms [J]. Computer Science, 2025, 52(7): 287-294.
[13] LIU Wenfei, LIU Jiafei, WANG Qi, WU Jingli, LI Gaoshi. Component Reliability Analysis of Interconnected Networks Based on Star Graph [J]. Computer Science, 2025, 52(7): 295-306.
[14] CHEN Shangyu, HU Hongchao, ZHANG Shuai, ZHOU Dacheng, YANG Xiaohan. Tor Multipath Selection Based on Threaten Awareness [J]. Computer Science, 2025, 52(7): 363-371.
[15] ZHOU Lei, SHI Huaifeng, YANG Kai, WANG Rui, LIU Chaofan. Intelligent Prediction of Network Traffic Based on Large Language Model [J]. Computer Science, 2025, 52(6A): 241100058-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!