Abstract
Solid (Social Linked Data) aims to radically change the way web applications work today, giving users true data ownership and improved privacy. However, it is facing two challenges, one is that data in centralized repositories needs to be separated from social web applications that force users to share their information. In addition, a decentralized authentication that guarantees who can operate on user’s data with a secure privacy protection is another significant issue. In this paper, we address these challenges by proposing a blockchain-based decentralized data storage and authentication scheme for Solid, termed BCSolid, in which a user’s data can be independent of multiple web applications and can switch data storage service easily without relying on a trusted third party. Meanwhile, our scheme gurantees data ownership and user’s privacy by leveraging the blockchain miners to perform authentication with the help of certificateless cryptography. Additionally, we present a possible instantiation to illustrate how “transactions” in BCSolid are processed. To our knowledge this is the first work to promote the Solid project using blockchain. The evaluation results show that our scheme can gurantee a low latency network and is a promising solution to Solid.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sambra, A., Guy, A., Capadisli, S., Greco, N.: Building decentralized applications for the social Web. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 1033–1034. International World Wide Web Conferences Steering Committee. ACM (2016)
Mansour, E., et al.: A demonstration of the solid platform for social web applications. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 223–226. International World Wide Web Conferences Steering Committee. ACM (2016)
Zheng, Z., Xie, S., Dai, H.N., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)
Thompson, M.R., Essiari, A., Mudumbai, S.: Certificate-based authorization policy in a PKI environment. ACM Trans. Inf. Syst. Secur. (TISSEC) 6(4), 566–588 (2003)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)
Chen, W., et al.: Cooperative and distributed computation offloading for blockchain-empowered industrial internet of things. IEEE Internet Things J. 6(5), 8433–8446 (2019)
Qiu, X., Liu, L., Chen, W., Hong, Z., Zheng, Z.: Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing. IEEE Trans. Veh. Technol. 68(8), 8050–8062 (2019)
Zhang, Y., Deng, R., Zheng, D., Li, J., Wu, P., Cao, J.: Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Trans. Ind. Inform. 15(9), 5099–5108 (2019)
Rafiq, Y., Dickens, L., Russo, A., Bandara, A.K., Yang, M., Stuart, A.: Learning to share: engineering adaptive decision-support for online social networks. In: Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pp. 280–285. IEEE (2017)
Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secur. Comput. 15(5), 840–852 (2018)
Gayathri, N.B., Thumbur, G., Kumar, P.R., Rahman, M.Z.U., Reddy, P.V.: Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J. 6(5), 9064–9075 (2019)
Zhang, F., Eyal, I., Escriva, R., Juels, A., Van Renesse, R.: \(\{\)REM\(\}\): resource-efficient mining for blockchains. In: 26th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 2017), pp. 1427–1444. ACM (2017)
Halevi, S., Hazay, C., Polychroniadou, A., Venkitasubramaniam, M.: Round-optimal secure multi-party computation. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10992, pp. 488–520. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96881-0_17
Zou, S., Liang, Y., Lai, L., Shamai, S.: An information theoretic approach to secret sharing. IEEE Trans. Inf. Theory 61(6), 3121–3136 (2015)
Chen, W.H., Fan, C.I., Tseng, Y.F.: Efficient key-aggregate proxy re-encryption for secure data sharing in clouds. In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1–4. IEEE (2018)
Acknowledgments
The work described in this paper was supported by the National Key Research and Development Plan (2018YFB1003800), the National Natural Science Foundation of China (61802450), the Natural Science Foundation of Guangdong (2018A030313005), the Program for Guangdong Introducing Innovative and Entrepreneurial Teams (2017ZT07X355) and the Science and Technology Research Program of Chongqing Municipal Education Commission (KJZD-K201802401).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Cai, T., Chen, W., Yu, Y. (2020). BCSolid: A Blockchain-Based Decentralized Data Storage and Authentication Scheme for Solid. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_55
Download citation
DOI: https://doi.org/10.1007/978-981-15-2777-7_55
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2776-0
Online ISBN: 978-981-15-2777-7
eBook Packages: Computer ScienceComputer Science (R0)