Journal of Agricultural Big Data >
Application Analysis of Blockchain and Confidential Computing Technology in Material Database Platform
Received date: 2024-01-31
Accepted date: 2024-04-16
Online published: 2024-07-03
With the rise of data-driven material design driven by artificial intelligence and materials science, material science data has become a focal point of production factors, national strategic resources, and international competition. However, as material data sharing increases, data security issues become increasingly important. Issues such as data leakage, misuse, and tampering threaten the competitiveness of enterprises. We first review mainstream data security protection technologies, including access control and encryption technologies, which constitute the traditional data security protection model, ensuring security during data transmission and storage. Next, the development of blockchain technology is introduced. Blockchain technology can achieve confidentiality, integrity, and availability during data transmission and storage, but these mechanisms still cannot address privacy issues during data usage, nor can they protect the confidentiality and integrity of data during usage. Then, the advantages of confidential computing technology are analyzed. By executing calculations in a hardware-based trusted execution environment, confidential computing technology minimizes the trusted computing base, providing comprehensive data protection and adhering to the concept of "data usability without visibility" to protect data during usage, thereby constructing end-to-end lifecycle data security. Finally, we combine the advantages of blockchain and confidential computing technology to propose a trustworthy infrastructure solution for material data based on blockchain and confidential computing, to achieve security throughout the data lifecycle and provide strong support for the secure application of material data.
Key words: confidential calculations; blockchain; material data; data security; data sharing
GONG HaiYan, MA FuQiang, ZHANG DaWei, LI XiaoGang . Application Analysis of Blockchain and Confidential Computing Technology in Material Database Platform[J]. Journal of Agricultural Big Data, 2024 , 6(2) : 241 -252 . DOI: 10.19788/j.issn.2096-6369.000026
| [1] | Xu Y. Accomplishment and challenge of materials database toward big data[J]. Chinese Physics B, 2018, 27(11): 118901. |
| [2] | Curtarolo S, Setyawan W, Hart G L, et al. AFLOW: An automatic framework for high-throughput materials discovery[J]. Computational Materials Science, 2012, 58: 218-226. |
| [3] | Liu S, Su Y, Yin H, et al. An infrastructure with user-centered presentation data model for integrated management of materials data and services[J]. NPJ Computational Materials, 2021, 7(1): 88. |
| [4] | Gong H, He J, Zhang X, et al. A repository for the publication and sharing of heterogeneous materials data[J]. Scientific Data, 2022, 9(1): 787. |
| [5] | Agrawal A, Choudhary A. Perspective: Materials informatics and big data: Realization of the “fourth paradigm” of science in materials science[J]. APL Materials, 2016, 4(5):053208. |
| [6] | Huber S P, Zoupanos S, Uhrin M, et al. AiiDA 1.0, a scalable computational infrastructure for automated reproducible workflows and data provenance[J]. Scientific data, 2020, 7(1): 300. |
| [7] | Draxl C, Scheffler M. NOMAD: The FAIR concept for big data-driven materials science[J]. Mrs Bulletin, 2018, 43(9): 676-682. |
| [8] | 王畅畅, 苏航, 段琳娜, 等. 材料数据共享现状综述及区块链应用前景探讨[J]. 材料导报, 2023, 36(24):21020155-9. |
| [9] | Yue Hou C P, Mingxia Yang, Zhihao Liu, Xiaolu Zhou. Storing and Sharing Ecological Observation Data Using Blockchain Technology[J]. Journal of Agricultural Big Data, 2020, 2(2): 55-66. |
| [10] | Chen Z, Xu W, Wang B, et al. A blockchain-based preserving and sharing system for medical data privacy[J]. Future Generation Computer Systems, 2021, 124: 338-350. |
| [11] | Yang J, Wen J, Jiang B, et al. Blockchain-based sharing and tamper-proof framework of big data networking[J]. IEEE Network, 2020, 34(4): 62-67. |
| [12] | Yang Y, Wei L, Wu J, et al. Block-SMPC: a blockchain-based secure multi-party computation for privacy-protected data sharing[C]. Proceedings of the 2020 the 2nd International Conference on Blockchain Technology, 2020: 46-51. |
| [13] | Wang R, Xu C, Dong R, et al. A secured big-data sharing platform for materials genome engineering: State-of-the-art, challenges and architecture[J]. Future Generation Computer Systems, 2023, 142: 59-74. |
| [14] | Mulligan D P, Petri G, Spinale N, et al. Confidential Computing—a brave new world[C]. 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021: 132-138. |
| [15] | Zhang C, Chen Y. A review of research relevant to the emerging industry trends: Industry 4.0, IoT, blockchain, and business analytics[J]. Journal of Industrial Integration and Management, 2020, 5(1): 165-180. |
| [16] | Zhang Y, Deng R H, Liu X, et al. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing[J]. Information Sciences, 2018, 462: 262-277. |
| [17] | GM/T 0111-2021, 区块链密码应用技术要求[S]. |
| [18] | Liu X, Yang Y, Choo K-K R, et al. Security and Privacy Challenges for Internet-of-Things and Fog Computing: Hindawi, 2018. |
| [19] | 区块链安全白皮书[EB/OL]. http://www.caict.ac.cn/english/research/whitepapers/202303/P020230316609943145191.pdf. |
| [20] | 刘敖迪, 杜学绘, 王娜, 等. 基于区块链的大数据访问控制机制[J]. 软件学报, 2019, 30(9):2636-2654. |
| [21] | 牛淑芬, 陈俐霞, 李文婷, 等. 基于区块链的电子病历数据共享方案[J]. 自动化学报, 2022, 48(8):2028-2038. |
| [22] | 于戈, 聂铁铮, 李晓华, 等. 区块链系统中的分布式数据管理技术——挑战与展望[J]. 计算机学报, 2021, 44(1):28-54. |
| [23] | 孙忠富, 马浚诚, 郑飞翔, 等. 区块链支撑农业大数据安全初探[J]. 农业大数据学报, 2020, 2(2):25-37. |
| [24] | 路爱同. 基于 Hyperledger Sawtooth的区块链跨链技术研究[D]. 长春: 吉林大学, 2020. |
| [25] | Baliker C, Baza M, Alourani A, et al. On the Applications of Blockchain in FinTech: Advancements and Opportunities[J]. IEEE Transactions on Engineering Management, 2023. |
| [26] | Sun Y, Jiang S, Jia W, et al. Blockchain as a cutting-edge technology impacting business: A systematic literature review perspective[J]. Telecommunications Policy, 2022, 46(10):102443. |
| [27] | Xing F, Peng G, Liang Z. Research on the Application of Blockchain Technology in the Cross-border E-Commerce Supply Chain Domain[C]. Distributed, Ambient and Pervasive Interactions: Smart Living, Learning, Well-Being and Health, Art And Creativity, PT II, 2022: 99-109. |
| [28] | Ripple, Global Payments Steering Group. https://ripple.com/insights/announcing-ripples-global-payments-steering-group/, 2016. |
| [29] | Andrew J, Isravel D P, Sagayam K M, et al. Blockchain for healthcare systems: Architecture, security challenges, trends and future directions[J]. Journal of Network and Computer Applications, 2023, 215:103633. |
| [30] | Tagliafico A S, Campi C, Bianca B, et al. Blockchain in radiology research and clinical practice: current trends and future directions[J]. Radiologia Medica, 2022, 127(4): 391-397. |
| [31] | Tian S, Chen Y, Xie C. Application prospects and challenges of electronic health records blockchain[J]. Chinese Journal of Hospital Administration, 2022, 38(5): 343-346. |
| [32] | Wu Y-F, Kim H-H. Research on the application of blockchain technology in the comprehensive health industry[J]. Asia-pacific Journal of Convergent Research Interchange, 2022, 8(3): 15-26. |
| [33] | Bhowmik D, Feng T. The multimedia blockchain: A distributed and tamper-proof media transaction framework[C]// 2017 22nd International conference on digital signal processing (DSP). IEEE, 2017: 1-5. |
| [34] | Dupont Q. Blockchain identities: Notational technologies for control and management of abstracted entities[J]. Metaphilosophy, 2017, 48(5): 634-653. |
| [35] | Haferkorn M, Quintana Diaz J M. Seasonality and interconnectivity within cryptocurrencies-an analysis on the basis of bitcoin, litecoin and namecoin[C]// Enterprise Applications and Services in the Finance Industry:7th International Workshop, FinanceCom 2014, Sydney, Australia, December 2014, Revised Papers 7. Springer International Publishing, 2015: 106-120. |
| [36] | Obour Agyekum K O-B, Xia Q, Sifah E B, et al. A secured proxy- based data sharing module in IoT environments using blockchain[J]. Sensors, 2019, 19(5): 1235. |
| [37] | Kiayias A, Zhou H-S, Zikas V. Fair and robust multi-party computation using a global transaction ledger[C]. Advances in Cryptology-EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II 35, 2016: 705-734. |
| [38] | Wang Z, Lin J, Cai Q, et al. Blockchain-based certificate transparency and revocation transparency[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 19(1): 681-697. |
| [39] | Stokkink Q, Pouwelse J. Deployment of a blockchain-based self-sovereign identity[C]. 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), 2018: 1336-1342. |
| [40] | 李明煜, 夏虞斌, 陈海波. 面向SGX2 代新型可信执行环境的内存优化系统[J]. 软件学报, 2022, 33(6):2012-2029. |
| [41] | Zheng W, Wu Y, Wu X, et al. A survey of Intel SGX and its applications[J]. Frontiers of Computer Science, 2021, 15: 1-15. |
| [42] | Scarlata V, Johnson S, Beaney J, et al. Supporting third party attestation for Intel? SGX with Intel? data center attestation primitives[J]. White Paper, 2018: 12. |
| [43] | 张珑脐. 基于机密计算的隐私数据安全共享模型的研究与实现[D]. 广州: 华南理工大学, 2022. |
| [44] | 信息安全技术机密计算通用框架征求意见稿,中国标准, 2023. |
| [45] | Seshadri A, Perrig A, Van Doorn L, et al. SWATT: Software-based attestation for embedded devices[C]. IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004: 272-282. |
| [46] | Yang P H, Yen S M. SARA: Sandwiched attestation through remote agents for cluster-based wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2017, 13(7): 1550147717719192. |
| [47] | Carpent X, Rattanavipanon N, Tsudik G. Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware[C]. 2018 IEEE international symposium on hardware oriented security and trust (HOST), 2018: 9-16. |
| [48] | Nguyen H, Ivanov R, Phan L T X, et al. LogSafe: Secure and scalable data logger for IoT devices[C]// 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2018: 141-152. |
| [49] | Liang X, Shetty S, Zhao J, et al. Towards decentralized accountability and self-sovereignty in healthcare systems[C]// Information and Communications Security:19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings 19. Springer International Publishing, 2018: 387-398. |
| [50] | Silva L V, Barbosa P, Marinho R, et al. Security and privacy aware data aggregation on cloud computing[J]. Journal of Internet Services and Applications, 2018, 9(1): 1-13. |
/
| 〈 |
|
〉 |