使用区块链的安全服务:现状调查2018年(23页)(1)

ID:23246

大小:1.32 MB

页数:23页

时间:2022-11-29

金币:20

上传者:战必胜
1553-877X (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2018.2863956, IEEE
Communications Surveys & Tutorials
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
1
Abstract—This article surveys blockchain-based approaches for
several security services. These services include authentication,
confidentiality, privacy and access control list (ACL), data and
resource provenance, and integrity assurance. All these services
are critical for the current distributed applications, especially due
to the large amount of data being processed over the networks and
the use of cloud computing. Authentication ensures that the user
is who he/she claims to be. Confidentiality guarantees that data
cannot be read by unauthorized users. Privacy provides the users
the ability to control who can access their data. Provenance allows
an efficient tracking of the data and resources along with their
ownership and utilization over the network. Integrity helps in
verifying that the data has not been modified or altered. These
services are currently managed by centralized controllers, for
example, a certificate authority. Therefore, the services are prone
to attacks on the centralized controller. On the other hand,
blockchain is a secured and distributed ledger that can help
resolve many of the problems with centralization. The objectives
of this paper are to give insights on the use of security services for
current applications, to highlight the state of the art techniques
that are currently used to provide these services, to describe their
challenges, and to discuss how the blockchain technology can
resolve these challenges. Further, several blockchain-based
approaches providing such security services are compared
thoroughly. Challenges associated with using blockchain-based
security services are also discussed to spur further research in this
area.
Index Termsblockchains, public key cryptography,
provenance, data privacy, access control list, integrity assurance,
blockchain challenges.
I. INTRODUCTION
A blockchain is a secured, shared and distributed ledger that
facilitates the process of recording and tracking resources
without the need of a centralized trusted authority. It allows two
parties to communicate and exchange resources in a peer-to-
peer network where distributed decisions are made by the
majority rather than by a single centralized authority. It is
provably secure against attackers who try to control the system
by compromising the centralized controller. Resources can be
tangible (e.g., money, houses, cars, lands) or intangible (e.g.
copyrights, digital documents, and intellectual property rights).
In general, anything that has a value can be tracked on a
blockchain network to reduce its security risks and save the cost
of security monitoring for all involved [1].
This publication was made possible by the NPRP award [NPRP 8-634-1-131]
from the Qatar National Research Fund (a member of The Qatar Foundation)
and NSF grant CNS-1547380. The statements made herein are solely the
responsibility of the author[s].
Tara Salman is with Washington University in Saint Louis, St. Louis, MO
63130 USA (email: tara.salman@wustl.edu)
Maeda Zolanvari is with Washington University in Saint Louis, St. Louis, MO
63130 USA (email: maede.zolanvari@wustl.edu)
Recently, the blockchain technology has attracted
tremendous interest from both academia and industry. The
technology started with Bitcoin, a cryptocurrency that has
reached a capitalization of 180 billion dollars as of January
2018 [2] [3]. According to the Gartner report in 2016, the
blockchain technology is receiving billions of dollars in
research and enterprise investments and much more is expected
to come in the near future [4]. The technology currently spans
several applications that are popular and driving the networking
research. Such applications include healthcare [5], Internet of
Things (IoT) [6] [7], and cloud storage [8]. Generally, the
blockchain technology has proven its potential in any
application that currently requires a centralized ledger. A
practical example that employs blockchains is the Interbank
Information Network provided by JP Morgan which provides
fast, secured, and cheap international payments [9]. In addition,
supply chain systems by IBM is exploring the potential of using
blockchains in their services [10].
Among the blockchains’ promising applications are network
monitoring and security services including authentication,
confidentiality, privacy, integrity, and provenance. Currently,
these services are provided by trusted third-party brokers or
using inefficient distributed approaches. As a result, security is
a major challenge for current applications. On the other hand,
the blockchain technology can provide security guarantees that
resolve many traditional challenges in addition to providing a
fully distributed, provably secure, and consensus solution.
Fig. 1 illustrates the differences between the traditional and the
blockchain-based access control. The same concept can be
applied to the other security guarantees.
This survey focuses on the use of the blockchain technology
to provide network security services and applications. We
present the use of these services in the current applications,
discuss the conventional techniques that provide these security
services, and illustrate their challenges and problems. Then, we
present how the blockchain technology can be used to resolve
the associated challenges and highlight several proposed
blockchain-based approaches that provide the desired security
services. Finally, we discuss the current challenges faced with
blockchain and some of the potential future research directions
Aiman Erbad is with Qatar University, Doha, Qatar (email:
aerbad@qu.edu.qa)
Raj Jain is with Washington University in Saint Louis, St. Louis, MO 63130
USA (email: jain@wustl.edu)
Mohammed Samaka is with Qatar University, Doha, Qatar (email:
samaka.m@qu.edu.qa)
Security Services Using Blockchains:
A State of the Art Survey
1
Tara Salman, Student Member, IEEE, Maede Zolanvari, Student Member, IEEE, Aiman Erbad, Member, IEEE, Raj
Jain, Fellow, IEEE, and Mohammed Samaka, Member, IEEE
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭