Next Article in Journal
Short Duplex Module Coupled to G-Quadruplexes Increases Fluorescence of Synthetic GFP Chromophore Analogues
Next Article in Special Issue
Reliable Task Management Based on a Smart Contract for Runtime Verification of Sensing and Actuating Tasks in IoT Environments
Previous Article in Journal
FRET-Based Aptasensor for the Selective and Sensitive Detection of Lysozyme
Previous Article in Special Issue
A Cost Analysis of Implementing a Blockchain Architecture in a Smart Grid Scenario Using Sidechains
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things

1
Key Laboratory of Complex Systems Modeling and Simulation, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
2
Department of Mechanical, Materials and Manufacturing Engineering, Faculty of Science and Engineering, University of Nottingham Ningbo China, Ningbo 315100, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(3), 916; https://doi.org/10.3390/s20030916
Submission received: 25 December 2019 / Revised: 2 February 2020 / Accepted: 7 February 2020 / Published: 9 February 2020
(This article belongs to the Special Issue Blockchain Security and Privacy for the Internet of Things)

Abstract

:
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of the above-mentioned security issues, a security transmission and storage solution is proposed about sensing image for blockchain in the IoT. Firstly, this solution intelligently senses user image information, and divides these sensed data into intelligent blocks. Secondly, different blocks of data are encrypted and transmitted securely through intelligent encryption algorithms. Finally, signature verification and storage are performed through an intelligent verification algorithm. Compared with the traditional IoT data transmission and centralized storage solution, our solution combines the IoT with the blockchain, making use of the advantages of blockchain decentralization, high reliability, and low cost to transfer and store users image information securely. Security analysis proves that the solution can resist theft attacks and ensure the security of user image information during transmission and storage.

1. Introduction

Originated in the 1990s, the concept of the Internet of Things (IoT) is to build on the Internet and extend the Internet. The Internet is the interaction between people through the network, and the IoT is the information exchange between people, between people and things, and between things. The basic feature of the IoT is the intelligent sensing collection of data, which are then reliably transmitted to the server for calculation and intelligent processing. The IoT has experienced rapid development for more than two decades, and the number of IoT devices has grown exponentially, a trend that greatly improves social productivity and efficiency as well as makes people’s lives more convenient and intelligent. Today, the IoT has been used in every corner of people’s lives, including smartphones, cars, smart homes, and other mobile devices. With the official arrival of the 5G era, experts estimate that, by 2020, there will be more than 30 billion IoT devices worldwide. However, these many IoT devices will generate many data, which are transmitted through wireless networks. It is easy to cause security attacks, such as theft and forgery of malicious attackers. Therefore, to securely transmit massive IoT data is one of the important issues in the development of the IoT.
The issue of secure storage of IoT data is also a key concern in the field of IoT. Currently, many IoT data storage solutions store data on traditional centralized servers. However, centralized data storage has the following disadvantages. Firstly, all data are stored centrally on a main server, s thuso the performance requirements, environmental requirements, and maintenance costs for the main server are extremely high. The server must have a very high storage capacity to store many IoT data. Once the server fails, the entire IoT data storage system will not work properly. Secondly, because all IoT devices are connected to the centralized server, the connection will cause network congestion, high network delay, and inefficient data storage of the IoT. Finally, once the centralized server is attacked by malicious attackers, the security of IoT data will be greatly threatened.
As a new application mode of distributed data storage, the blockchain can well solve the problems that easily occur in centralized data storage. Originated in 2008, the essence of blockchain, which is the underlying technology for the development of Bitcoin, is to centrally maintain a reliable database solution through decentralization and detrust. The blockchain divides the data into a series of data blocks. Each data block can verify the validity of the data and generate the next data block, which is connected in a chronological order into a chain data structure. Blockchain storage has the following advantages. (1) Decentralization: There is no centralized hardware in blockchain storage. Using point-to-point technology, the power and obligations of each node are equal, thus the destruction of a node does not affect the normal work of the entire system. (2) Detrust: Since the interaction between nodes passes a fixed algorithm, there is no need to trust each other in the form of public identity. At the same time, the more nodes there are, the stronger is the security of the system. (3) Low cost: Blockchain storage has good data deduplication ability to reduce data redundancy and costs. (4) Information cannot be tampered: When data information is added to the blockchain through verification, the information cannot be tampered, a fact that effectively prevents forgery attacks on data by attackers and ensures the reliability of data storage. (5) High transparency: Except for individual private information being encrypted, the entire data storage system is transparent and open, so that nodes can maintain the system together.
To solve the security problems of the IoT data during the transmission and storage process, this article proposes a secure transmission and storage solution for the sensing images facing the blockchain in the IoT. It combines blockchain technology with the IoT, and divides the IoT data into different blocks for signature verification and storage. Our contributions are as follows:
(1) We propose a block division algorithm for image sensing and data sensing of the smart image sensor. By judging the number of distributed storage servers in the blockchain and the storage status, the number of divided blocks of user image sensing data is determined and divided.
(2) We propose a public key generation algorithm for the sensing data blocks. The public key is calculated by an intelligent algorithm with n numbers randomly generated by the intelligent image sensor, and all storage servers in the blockchain use the same public key.
(3) We propose a private key generation and update algorithm for the sensing data blocks. The private key of each sensing data block in different periods in the cycle is different, and the private key of the sensing data block in one time period can generate the private key of the data block in the next time period through an update algorithm.
(4) We propose a signature and verification algorithm for the sensing data blocks. Each data block is signed by a different private key and sent to the storage server through a signature algorithm. Each storage server uses the public key to authenticate and store the signature information of the sent data blocks.
The organization of this article is as follows: Section 2 introduces the related work of the IoT data storage combined with blockchain. Section 3 introduces the specific scheme of security transmission and storage solution about sensing image for blockchain in the IoT. The security of the scheme is analyzed and proved in Section 4. The last section presents conclusions and future work.

2. Related Work

In the recent years, people have done a lot of research in the direction of secure transmission and storage of IoT data combined with blockchain technology, and have made some achievements.
Blockchain technology is used in many fields, such as smart grid, industry, and medical fields. Gai et al. [1] proposed the Privacy-enabled Blockchain-enabled Transaction (PBT) model to solve the privacy problem of energy transaction users in the smart grid. This solution first proposes a noise-based privacy protection method, which does not need to screen individual privacy, and hides the transaction distribution trend of adjacent energy trading systems with blockchain. Secondly, they designed a privacy protection mechanism to achieve the effect of the differential privacy algorithm, which introduces virtual accounts and divided accounts to change the function of transaction records without reducing other performance such as accuracy. Liang et al. [2] proposed a blockchain-based secure data transmission scheme based on an optimized FaBric architecture, which was applied to the Industrial IoT to solve the security problem in a blockchain-based power network. This solution is based on the blockchain’s dynamic key sharing mechanism, and implements network consensus and identity verification by dynamically adding power nodes. Through security experiment analysis, this scheme reduces the communication load of node consensus, simplifies the consensus flow in data transmission, improves the security of data transmission, and reduces overhead. Shen et al. [3] proposed a blockchain-based medical encrypted image retrieval scheme to protect user image privacy in the medical IoT environment. Firstly, this solution uploads images to the hospital server through IoT devices. The hospital server extracts different types of medical image features, and uses the image features to be encrypted and stored by Secure Multi-party Computation (SMC). Secondly, the image retrieval service indexes all encrypted images. When a user makes a retrieval request, the service initiates a smart contract to send a request for the user, and feeds back the retrieval results based on the image similarity.
The combination of blockchain technology and edge computing has huge potential and has gradually become a disruptive technology that promotes social progress. Li et al. [4] proposed a security scheme for the storage and protection of IoT data based on blockchain. The solution uses edge computing to perform data calculations for IoT devices and forwards the data to storage. In addition, the solution uses certificateless encryption technology to establish a convenient identity verification system for blockchain-based IoT applications, and overcomes the shortcomings of certificate encryption technology by broadcasting the public key of the IoT device. Gai et al. [5] combined the blockchain and edge computing technology, and proposed a model permission blockchain edge model (PBEM-SGN) suitable for smart grids to solve two important issues in smart grids, namely privacy protection and energy security. The transparent operation in this model helps to detect incorrect energy usage behaviors, thereby reducing or avoiding energy-related attacks to control and map SGN network nodes. Guo et al. [6] proposed a distributed trusted authentication system based on blockchain and edge computing. The system consists of a physical network layer, a blockchain edge layer, and a blockchain network layer. First, they designed an optimized practical Byzantine fault-tolerant consensus algorithm to build a consortium blockchain for storing authentication data and logs. It guarantees trusted authentication and enables traceability of terminal activities. In addition, edge computing is applied to blockchain edge nodes to provide name resolution and edge authentication services based on smart contracts. Secondly, the system uses asymmetric encryption technology to prevent the connection between the node and the terminal from being attacked. At the same time, the system proposes a cache strategy based on edge computing to improve the hit rate. Pan et al. [7] designed and prototyped an edge IoT framework based on blockchain and smart contracts. The core idea is to integrate the licensed blockchain with an internal currency or system to link the edge cloud resource pool with each IoT device’s linked account and resource usage, as well as the behavior of the IoT device. EdgeChain uses a credit-based resource management system to control how many resources IoT devices get from the edge server based on predefined rules of priority, application type, and past behavior. Smart contracts are used to enforce rules and policies and regulate the behavior of IoT devices in an undeniable, automated way. All IoT activities and transactions are recorded in the blockchain for secure data logging and auditing.
Reducing resource consumption is one of the advantages of the combination of blockchain technology and the IoT, especially for the limited resources of IoT devices. Kim et al. [8] optimized the Byzantine Fault Tolerance (BFT) consensus algorithm for the lightweight IoT network based on blockchain, and proposed a storage compression consensus (SCC) algorithm. The algorithm compresses the blockchain in each device to ensure storage capacity. When the lightweight device does not have enough storage space, it uses the SCC algorithm to compress the blockchain. Results of simulation and comparative experiment analysis show that the algorithm has a more obvious compression effect on the storage capacity of the blockchain, and can be used to form a storage-efficient lightweight IoT network. Shahid et al. [9] proposed a lightweight and scalable blockchain framework for resource-constrained IoT sensor devices and named it “sensor chai”. This framework realizes a lightweight blockchain through three steps. Firstly, the global blockchain is divided into smaller disjoint local blockchains in the spatial domain to ensure that the storage space of the local blockchain is always smaller than that of the traditional blockchain. Secondly, the lifecycle of the local blockchain is limited to control its size in the time domain. Finally, a sensor node can only retain up to one local blockchain. Experimental analysis shows that the framework can significantly reduce resource consumption and can be expanded as the network scale increases, while retaining key information of the IoT system. To solve the Proof of Work (PoW) computation problem when the resources of the IoT device are limited, Doku et al. [10] proposed a scheme that combines blockchain and the IoT and mines a network with limited node resources. The comparative experimental analysis shows that the scheme has stronger scalability and more efficient use of resources.
In the IoT, the identity authentication of nodes is required to ensure the security and reliability of data transmission, and the combination of blockchain technology can eliminate the need for trusted third parties to participate in authentication. Almadhoun et al. [11] proposed a user authentication scheme using blockchain atomized nodes, combined with Ethereum smart contracts to implement blockchain-based large-scale IoT device authentication without the need for an intermediate third party. The fog node is used to reduce the processing load of the IoT device during the authentication process and reduce the overhead of connecting to the Ethereum blockchain network interface. The security analysis shows that the scheme can resist known eavesdropping, replay, and DoS attacks and has good security. Manzoor et al. [12] proposed a blockchain-based proxy re-encryption scheme in the context of the IoT. This solution stores IoT data in a distributed cloud, and uses dynamic smart contracts to connect sensors to share IoT data with data users without the participation of trusted third parties. In addition, the scheme uses an effective proxy re-encryption algorithm, allowing only the owner and those present in the smart contract to see the data. Wang et al. [13] proposed the Blockchain and Bilinear mapping based Data Integrity Scheme (BB-DIS) for large-scale IoT data. This solution cuts IoT data into fragments and generates Homomorphic Verifiable Tags (HVT) for sample verification. In addition, this solution achieves data integrity based on the characteristics of bilinear mapping in the form of blockchain transactions. The analysis of experimental results shows that the BB-DIS scheme significantly improves the efficiency of large-scale IoT data integrity verification, and does not require the trust of Third Party Auditors (TPA).
Due to the decentralized nature of traditional blockchain technology, nodes are equal. Rashid et al. [14] proposed a multi-layer secure network model of the IoT network based on blockchain technology. This model solves the problems related to the actual deployment of blockchain technology by dividing the IoT network into a multi-layer decentralized system. The model uses Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) to divide the network into K unknown clusters, and uses a local authentication mechanism in the cluster handed over by each Cluster Head (CH). This model takes advantage of the high security and credibility of the blockchain technology, and provides an authentication mechanism that enables the CHs to communicate with each other and with the base station without central authorization. Ayoade et al. [15] proposed a decentralized data management system for blockchain-based IoT devices. The system uses a blockchain platform to provide the decentralized IoT data access management, and uses smart contracts to provide the equal data access management privileges between IoT users and IoT service providers. At the same time, the system uses a trusted execution environment (Intel SGX) to provide data storage for secure data storage. In addition, the system uses Ethereum smart contracts to provide a complete system implementation on a real blockchain platform.
Different from the traditional blockchain technology, some scholars have introduced special nodes in the blockchain, such that the nodes are no longer equal, to achieve some centralized control functions. Zhu et al. [16] proposed a Controllable Blockchain Data Management (CBDM) model, which introduced a specific node. This particular node is also called a Trust Authorization Authority (TA) node, and it has a higher level of voting authorization than other participant nodes. The system is configured with a veto power, which is specifically used to prevent malicious voting. In addition, our model utilizes cloud storage to achieve storage efficiency and the data in each block store only metadata to improve block building efficiency and minimize distributed storage waste. Zhou et al. [17] proposed a Threshold Secure Multi-Party Computing (TSMPC) protocol and combined it with the blockchain. Afterwards, they proposed a blockchain-based threshold IoT service system named BeeKeeper. In the BeeKeeper system, the server processes user data and generates responses by performing homomorphic calculations on the information, but the server cannot get any user privacy information from the information. Moreover, the system can verify the data and response to detect malicious nodes. In addition, any node can be a leader’s server. Based on performance evaluation and analysis, the system has good efficiency and fault tolerance.
Considering the above related work, due to the advantages of blockchain technology, being decentralization, high reliability, and low cost, the data storage solution combining the IoT and the blockchain is better than the traditional IoT data transmission and centralized storage solutions in terms of security, performance, and resource utilization. Based on the above advantages, a security transmission and storage solution is proposed to sense image for blockchain in the IoT. This solution can effectively resist the forgery and theft attacks of image information by attackers and ensure that the transmission and storage of user image information is more secure.

3. Security Transmission and Storage Solution of Induction Images

This section introduces a specific solution for the security transmission and storage solution about sensing image for blockchain in the Internet of Things. This solution mainly contains five algorithms: (1) blocking algorithm for image sensing and data sensing of the smart image sensor; (2) public key generation algorithm for the sensing data blocks; (3) private key generation and update algorithm for the sensing data blocks; (4) signature algorithm for the sensing data blocks; and (5) signature verification algorithm for the sensing data blocks. Through these five algorithms, secure transmission and storage of blockchain-oriented sensor information can be achieved in the IoT. This solution uses intelligent image sensors and storage servers. The intelligent image sensor is a device with a camera and computing power that can collect user’s image information for analysis. In this solution, the block division, the generation of public and private keys, and the update and encryption of private keys are all implemented through the intelligent image sensor. The storage server can store user image information divided into blocks. In this solution, the authentication function is implemented by the storage server. The symbols and definitions used in this article are shown in Table 1.

3.1. Implementation Process

The schematic diagram of the realization process of the secure transmission and storage solution about sensing image for blockchain in the IoT is shown in Figure 1 and described as follows:
Step 1: The intelligent image sensor perceives the user image based on the surrounding scene using the image sensing of the intelligent image sensor and the block division algorithm of the sensing data.
Step 2: The intelligent image sensor divides the perceived user image using the image sensing and block data partitioning algorithm of the sensing data.
Step 3: The smart image sensor uses the public key generation algorithm of the sensing data block to generate a public key according to the status of the divided sensing data block, and securely transmits this public key to each storage server in the blockchain.
Step 4: The storage server sends a confirmation message to the smart image sensor after receiving the public key sent by the smart image sensor.
Step 5: After receiving the confirmation message from the storage server, the smart image sensor uses the signature algorithm of the sensing data block to sign the sensing data block with different private keys in different time periods and sends the signed message to the corresponding storage server.
Step 6: After receiving the sensing data blocks transmitted by the intelligent image sensor in different time periods, the storage server uses the signature verification algorithm of the sensing data blocks to quickly perform signature verification on different sensing data.
Step 7: If the signature verification is passed, the storage server receives the sensing data block and saves the received data block.
Step 8: End.

3.2. Algorithm 1: Blocking Algorithm for Image Sensing and Data Sensing of the Smart Image Sensor

Step 1: The intelligent image sensor judges whether there are user images that need to be collected according to the surrounding scenes. If so, go to Step 3; otherwise, go to Step 2.
Step 2: The smart image sensor waits for three seconds before going to Step 1.
Step 3: The intelligent image sensor collects user images P ( u ) according to the surrounding scene.
Step 4: The intelligent image sensor determines the number n of the sensing data of the user image according to the number of distributed storage servers and storage status in the blockchain.
Step 5: The intelligent image sensor determines the division mode of the image sensing data block according to the storage status of the distributed storage server in the blockchain and divides it, that is, S P i ( u ) Φ , S P i ( u ) P ( u ) , S P i ( u ) S P j ( u ) = Φ , P ( u ) = i = 1 n S P i ( u ) .
Step 6: The intelligent image sensor determines whether the sensing data of the user image has been divided. If so, go to Step 7; otherwise, go to Step 5.
Step 7: End.

3.3. Algorithm 2: Public Key Generation Algorithm for the Sensing Data Blocks

Step 1: The intelligent image sensor randomly selects two large prime numbers P and Q and calculates the product of P and Q, that is, N = P Q .
Step 2: The intelligent image sensor calculates ϕ ( N ) = ( P 1 ) ( Q 1 ) and randomly selects a generator R 1 of Z N of module N, that is, R 1 = r a n d ( Z N ) .
Step 3: The intelligent image sensor randomly selects a relatively large integer L, calculates A = L 2 , and makes the value of A greater than the number of divided blocks n of the sensing data of the user image, that is, A > n .
Step 4: The smart image sensor randomly selects an integer a i in interval [ A , 2 A ) (i.e.,, a i [ A , 2 A ) , i { 1 , 2 , 3 , , n } , n < A ), makes a i and ϕ ( N ) coprime, and makes a i and a j coprime (i.e.,, gcd ( a i , ϕ ( N ) ) = 1 , gcd ( a i , a j ) = 1 , i { 1 , 2 , 3 , , n } , j { 1 , 2 , 3 , , n } , i j ).
Step 5: At the beginning of the signature calculation, the smart image sensor sets the initial time to 0, selects a relatively large cycle period T according to the system setting requirements (T is an integer, and the cycle period T is greater than or equal to the system each time maximum cycle working time), and calculates B 1 = A ( 1 + ( i 1 ) / T ) , B 2 = A ( 1 + i / T ) ( 1 i T ).
Step 6: The smart image sensor randomly selects an integer b i in interval [ B 1 , B 2 ) (i.e.,, b i [ B 1 , B 2 ) , i { 1 , 2 , 3 , , k } , k T ), makes b i and ϕ ( N ) coprime, and makes b i and b j coprime (i.e.,, gcd ( b i , ϕ ( N ) ) = 1 , gcd ( b i , b j ) = 1 , i { 1 , 2 , 3 , , k } , j { 1 , 2 , 3 , , k } , i j ).
Step 7: The intelligent image sensor calculates M A = a 1 a 2 a n = i = 1 n a i .
Step 8: In the cycle T, the intelligent image sensor calculates the key parameter t i , 1 = R 1 M A / a i mod N ( 1 i n ) of each sensing data block after the sensing data are segmented.
Step 9: The smart image sensor calculates P K ( P ( u ) ) = R 1 M A m = 1 T b m mod N , and uses P K ( P ( u ) ) as the public key of the user’s image sensing data P ( u ) (i.e.,, the public key of each storage server in the blockchain to authenticate the signature information of the sent data block).
Step 10: The smart image sensor determines whether the public key of the user’s image sensing data P ( u ) has been generated. If not, go to the Step 1; otherwise, go to the Step 11.
Step 11: The smart image sensor saves the parameter information ξ = { t 1 , 1 | | t 2 , 1 | | t 3 , 1 | | | | t i , 1 | | | | t n , 1 } , ψ = { b 1 | | b 2 | | | | b j | | | | b T } and N during the calculation of the public key, and sends the generated public key P K ( P ( u ) ) of the user image sensing data to each storage server in the blockchain through the network.
Step 12: End.

3.4. Algorithm 3: Private Key Generation and Update Algorithm for the Sensing Data Blocks

Step 1: The intelligent image sensor calculates S i , 1 ( S P i ( u ) ) = t i , 1 b 2 b 3 b 4 b T mod N ( i { 1 , 2 , 3 , , n } ), t i , 2 = t i , 1 b 1 mod N based on the parameter information ξ = { t 1 , 1 | | t 2 , 1 | | t 3 , 1 | | | | t i , 1 | | | | t n , 1 } , ψ = { b 1 | | b 2 | | | | b j | | | | b T } , and N in the public key calculation process.
Step 2: The intelligent image sensor calculates the private key S K i , 1 ( S P j ( u ) ) = { i | | 1 | | α i | | b 1 | | S i , 1 ( S P i ( u ) ) | | t i , 2 | | ψ } of the sensing data block S P i ( u ) during the period t = 1 of the cycle T ( t T ).
Step 3: In the period t = m ( m { 1 , 2 , 3 , , k 1 } , k T ) within the cycle T, the smart image sensor generates a private key S K i , m ( S P i ( u ) ) = { i | | m | | α i | | b m | | S i , m ( S P i ( u ) ) | | t i , m + 1 | | ψ } ( S i , m ( S P i ( u ) ) = t i , 1 b j b m + 1 b m + 2 b T mod N , t i , m + 1 = t i , m b m mod N ) for the sensing data block S P i ( u ) ( i { 1 , 2 , 3 , , n } ).
Step 4: During the period t = m + 1 ( m + 1 { 1 , 2 , 3 , , k } ) within the cycle T, the intelligent image sensor generates a private key S K i , m + 11 ( S P i ( u ) ) = { i | | m + 1 | | α i | | b m + 1 | | S i , m + 1 ( S P i ( u ) ) | | t i , m + 2 | | ψ } ( S i , m + 1 ( S P i ( u ) ) = t i , 1 b j b m b m + 2 b T mod N , t i , m + 2 = t i , m + 1 b m + 1 mod N ) for the sensing data block S P i ( u ) ( i { 1 , 2 , 3 , , n } ).
Step 5: End.

3.5. Algorithm 4: Signature Algorithm for the Sensing Data Blocks

In the user image P ( u ) , it is assumed that the smart image sensor needs to transmit the divided sensing data block S P i ( u ) to a storage server in the blockchain. After receiving the confirmation message from this storage server, the smart image sensor block S P i ( u ) performs the following operations.
Step 1: In the period t = m ( m { 1 , 2 , 3 , , k } , k T ) within the cycle T, the intelligent image sensor randomly selects a generator R 2 of Z N of module N for the sensing data block S P i ( u ) ( i { 1 , 2 , 3 , , n } ), that is, R 2 = r a n d ( Z N ) .
Step 2: The intelligent image sensor calculates x = R 2 a i b m mod N for the sensing data block S P i ( u ) ( i { 1 , 2 , 3 , , n } ).
Step 3: The intelligent image sensor calculates ϖ = H ( i | | m | | α i | | b m | | x | | S P i ( u ) ) , y = ( R 2 S i , m ( S P i ( u ) ) ϖ ) mod N for the sensing data block S P i ( u ) ( i { 1 , 2 , 3 , , n } ).
Step 4: The smart image sensor signs the sensing data block S P i ( u ) ( i { 1 , 2 , 3 , , n } ), that is, η = s i g n S K i , m ( S P i ( u ) ) ( S P i ( u ) ) ( i | | m | | α i | | b m | | ϖ | | y ) .
Step 5: The smart image sensor generates a timestamp value T S i of the smart image sensor, and transmits the signature message η = s i g n S K i , m ( S P i ( u ) ) ( S P i ( u ) ) and the timestamp value T S i of the sensing data block S P i ( u ) ( i { 1 , 2 , 3 , , n } ) to the corresponding storage server (Storage Server l) in the blockchain.
Step 6: End.

3.6. Algorithm 5: Signature Verification Algorithm for the Sensing Data Blocks

Step 1: The corresponding storage server S T S l in the blockchain receives the signed message η = s i g n S K i , m ( S P i ( u ) ) ( S P i ( u ) ) ( i { 1 , 2 , 3 , , n } , n < A ) and the timestamp value T S i sent by the smart image sensor.
Step 2: Storage server S T S l generates a storage server timestamp T S T S i . First, check whether the session delay T S T S i T S i is within the allowable time interval Δ t . If T S T S i T S i Δ t , the session times out, and go to Step 1. Then, the storage server S T S l uses signature message η = s i g n S K i , m ( S P i ( u ) ) ( S P i ( u ) ) to calculate f = y mod N = ( ( R 2 S i , m ( S P i ( u ) ) ϖ ) mod N ) mod N , and determines whether the following equation f = 0 mod N holds. If it is true, go to Step 3; otherwise, go to Step 1.
Step 3: The storage server S T S l uses the public key P K ( P ( u ) ) = R 1 M A m = 1 T b m mod N of the user image sensing data and the signature message η = s i g n S K i , m ( S P i ( u ) ) ( S P i ( u ) ) to perform calculation x = y a i b m P K ( P ( u ) ) ϖ mod N .
Step 4: Storage server S T S l determines whether equation ϖ = H ( i | | m | | α i | | b m | | x | | S P i ( u ) ) holds. If it is true, the signature authentication is correct, then go to Step 5; otherwise, go to Step 1.
Step 5: The storage server S T S l receives the sensing data block S P i ( u ) and determines whether other sensing data blocks have been received. If yes, go to Step 6; otherwise, go to Step 1.
Step 6: The storage server S T S l stores all the sensing data blocks S P i ( u ) | | | | S P h ( u ) received by the server ( S P i ( u ) P ( u ) , …, S P h ( u ) P ( u ) ).
Step 7: End.

4. Security Analysis

The generation of keys, the overhead of key storage, the overhead of key renewal, and the signature and authentication of information are usually important indicators for measuring the transmission security and storage performance of blockchain-oriented sensor images. They are also important factors affecting the transmission and storage performance of inductive images. In this solution, the image sensing and sensing data blocks division algorithm of the smart image sensor, the public key generation algorithm of the sensing data blocks, the private key generation of the sensing data blocks and the update algorithm, the signature algorithm of the sensing data blocks, and the signature verification algorithm of the sensing data blocks are all important factors affecting the secure transmission and storage of the sensor image for the blockchain. Therefore, this section analyzes and proves the security aspect of this solution. We also analyze and prove the overhead aspects such as key storage overhead and key update overhead of this solution. The security function analysis table is shown in Table 2. The specific descriptions are as follows.

4.1. Security Analysis

4.1.1. Resist Theft Attacks

This solution is the basic principle of security based on the RSA signature mechanism, that is, the difficulty of large composite prime factorization. In the IoT, it is often faced that a certain piece of image sensing data may be stolen in a certain period of time. How to ensure the security of image sensing data in the blockchain under this situation becomes very important. This solution can effectively defend against theft attacks of user sensor images by an attacker, and even if a certain piece of image sensing data is stolen, the remaining image sensing blocks cannot be stolen through this piece of data. The specific analysis is proved as follows.
Theorem 1.
In this solution, if the image sensing data block n = 2 , then the security of this solution is equal to the security of the Guillou–Quisquater (GQ) digital signature mechanism.
Proof of Theorem 1.
When n = 2 , according to the public key generation algorithm of the sensing data blocks, the key parameter information t 1 , 1 = R 1 a 2 mod N of the image sensing data block S P 1 ( u ) and the key parameter information t 2 , 1 = R 1 a 1 mod N of the image sensing data block S P 2 ( u ) can be obtained. Even if an illegal user steals the key parameter information t 1 , 1 = R 1 a 2 mod N of the image sensing data block S P 1 ( u ) , if he wants to derive the key parameter information t 2 , 1 of the image sensing data block S P 2 ( u ) , he will face the problem of solving the RSA problem. Similarly, even if an illegal user steals the key parameter information t 2 , 1 = R 1 a 1 mod N of the image sensing data block S P 2 ( u ) , if he wants to derive the key parameter information t 1 , 1 of the image sensing data block S P 1 ( u ) , he will again face the problem of solving the RSA problem. □
Theorem 2.
When the number of image sensing data blocks is greater than 2, if P ( u ) is a user image collected by a smart image sensor, and S P Λ ( u ) is a set of sensing image data blocks stolen by an illegal user, then P ( u ) S P Λ ( u ) is a data block set of sensing images whose sensing image data have not been stolen. Let S P i ( u ) P ( u ) , S P j ( u ) P ( u ) , and S P i ( u ) S P Λ ( u ) , S P j ( u ) ( P ( u ) S P Λ ( u ) ) . The necessary and sufficient condition is: if and only if gcd ( M A / a i : S P i ( u ) ) S P Λ ( u ) ) | ( M A / a j ) , then the key parameter information t j , 1 = R 1 M A / a j mod N of the image sensing data block S P j ( u ) can be derived from the key parameter information t i , 1 = R 1 M A / a i mod N of the image sensing data block S P i ( u ) .
Proof of Theorem 2.
(1) Let Δ = gcd ( M A / a i : S P i ( u ) S P Λ ( u ) ) , then there exists a corresponding integer e i such that L = S P i ( u ) S P Λ ( u ) e i M A / a i . If gcd ( M A / a i : S P i ( u ) S P Λ ( u ) ) | ( M A / a j ) , then there is an integer r such that M A / a j = r L ; then, t j , 1 = R 1 M A / a j mod N = R 1 r L mod N = R 1 r S P i ( u ) S P Λ ( u ) e i M A / a i mod N = S P i ( u ) S P Λ ( u ) R 1 r e i M A / a i = S P i ( u ) S P Λ ( u ) t i , 1 r e i . Therefore, t j , 1 can be derived from the key parameter information t i , 1 = R 1 M A / a i mod N of the sensing image data block S P i ( u ) .
(2) If t j , 1 can be deduced from the key parameter information of all the sensing image data blocks in S P i ( u ) S P Λ ( u ) , then according to the derivation in Part (1), it is easy to get gcd ( M A / a i : S P i ( u ) S P Λ ( u ) ) | ( M A / a j ) . □
Theorem 3.
In this solution, gcd ( M A / a i : S P i ( u ) S P Λ ( u ) ) ( M A / a j ) .
Proof of Theorem 3.
Because M A = a 1 a 2 a n = i = 1 n a i , there is a j | gcd ( M A / a i : S P i ( u ) S P Λ ( u ) ) . Because gcd ( a i , a j ) = 1 ( i { 1 , 2 , 3 , , n } , j { 1 , 2 , 3 , , n } , i j ), there is a j ( M A / a j ) , thus gcd ( M A / a i : S P i ( u ) S P Λ ( u ) ) ( M A / a j ) . □
In summary, from Theorems 1, 2, and 3, we can get that: In this solution, at each time period, it is difficult for illegal users to steal the image sensing data. According to the analysis of Theorems 2 and 3: In this solution, even if there are n 1 blocks of image sensing data in the image sensing data, and they are stolen in a certain period of time, it is still very difficult for illegal users to steal the remaining image sensing data blocks.

4.1.2. Resist Replay Attack and Denial of Service (Dos) Attack

In the signature algorithm of the sensing data block proposed in this paper, the smart image sensor generates a timestamp value T S i of the smart image sensor after signing the sensing data block S P i ( u ) , and then transmits the signature message and timestamp value to the storage server. In the signature verification algorithm of the sensing data block, when the storage server receives the signed message and the timestamp value ( η | | T S i ) , another storage server timestamp value T S T S i is generated. The storage server verifies the freshness of the signed message by determining whether the session delay is within an allowable time interval Δ t . Assume that the attacker obtains the signature message and timestamp of the verified sensing data block through illegal means, and attempts to destroy the correctness of the verification algorithm with the verified sensing data block. The storage server can ignore these duplicate signed messages by checking the freshness of the timestamp value, protect the correctness of the transmission and verification of the sensing data block, and effectively resist replay attacks. It can effectively reduce the consumption of network bandwidth by repeated information, reduce the occupation rate of the storage server algorithm when the repeated information is verified, and effectively resist denial of service attacks.

4.1.3. Resist Counterfeit Attack and Server Camouflage Attack

In this solution, the smart image sensor generates different private keys for different sensing image data blocks to sign in each time period of the cycle T, and the private keys in different time periods are updated. Therefore, even if the attacker obtains the signature message η = s i g n S K i , m ( S P i ( u ) ) ( S P i ( u ) ) of the sensing image data block S P i ( u ) stored in a certain storage server in a certain period by illegal means, and fakes the correct sensing image data block, it is still impossible to calculate x = y a i b m P K ( P ( u ) ) ϖ mod N through the storage server at other time periods, and the verification of the equation ϖ = H ( i | | m | | α i | | b m | | x | | S P i ( u ) ) is not successful. It can resist counterfeit attacks, protect the security of the sensing image data blocks, and avoid storing false or duplicate image block information, thereby effectively improving the storage efficiency of the storage server. Secondly, since the storage servers store the sensing image data blocks independently of each other and do not need to pass mutual authentication, a malicious attacker cannot disguise as a storage server to obtain the user sensing image data blocks stored in another storage server. It can resist server camouflage attack.

4.1.4. Decentralization and Private Key Update

This solution uses the advantages of blockchain technology decentralization to intelligently divide the user’s sensory image data into n blocks, and the status between the data blocks is equal. Moreover, it is proved from the above Theorems 2 and 3 that, even if a data block is illegally acquired or destroyed by an attacker, the remaining data block information cannot be obtained through this data block information, and the entire image sensing data cannot be affected. At each time period of the sensing cycle, the smart image sensor updates different private keys and generates different signatures for each image sensing data block, which undoubtedly increases the difficulty for illegal users to steal image sensing data, and enhances the security of image sensing data during transmission and storage.

4.2. Cost Analysis

In this solution, assume that the number of divided blocks of user image’s sensing data is n. At each time period in the cycle T, the key calculated by the smart image sensor is n + 1 , the key to be stored is n, and the key to be stored by the different storage servers in the blockchain is 1. During the entire cycle T, the total number of updates required by the smart image sensor is n T . The cost analysis results of this solution are shown in Table 3. The specific analysis and proof are as follows.
Theorem 4.
In this solution, when the image data are divided into n quickly in different time periods within the cycle T, the intelligent image sensor calculates the key is n + 1 , the key to be stored is n, and the key to be stored by different storage servers in the blockchain is 1.
Proof of Theorem 4.
In this solution, b i represents the parameter generated in the jth time period in the cycle T, but i in a i is related to the number n of the divided blocks of the user’s image sensing data. According to the block division algorithm for image sensing and sensing data, the public key generation algorithm for sensing data blocks, and the private key generation and updating algorithm for sensing data blocks can determine the jth time period (j = 1,2, …, T) within the cycle T. The smart image sensor needs to calculate a unique private key for the signature transmission of each image sensing data block. In this way, since the image sensing data are divided into n blocks, n private keys need to be calculated. In the blockchain, only the unique public key is needed to authenticate the signatures of different sensing data blocks. Therefore, the unique public key is calculated in the public key generation algorithm of the sensing data block. Therefore, at different time periods in the cycle T, the key calculated by the smart image sensor is n + 1 , the key to be stored is n, and the key to be stored by different storage servers in the blockchain is 1. □
Theorem 5.
In this solution, if the image data are divided into n quicklu, in the jth time period within the cycle T, the total number of keys that the smart image sensor has updated is n ( j 1 ) .
Proof of Theorem 5.
(1) During the j = 1 time period in the cycle T, the intelligent image sensor can only generate a privacy key for each image sensing data block, and there is no key update process. Therefore, the total number of keys updated by the system is 0, thus the conclusion holds.
(2) Assume that the conclusion is valid during the j = i time period (j = 1,2, …, T) in the cycle T, that is, the total number of keys that the smart image sensor has updated is n ( i 1 ) . When j = i + 1 , during the transition of the intelligent image sensor from the ith time period to the i + 1 time period, each image sensing data block needs to update its own private key. Therefore, during the transition, the total number of key updates is n. Since the total number of keys updated by the smart image sensor during the ith period is n ( i 1 ) , the total number of keys already updated by the smart image sensor during the i + 1 period is n ( i 1 ) + n = n i . Thus, the conclusion holds. □

5. Conclusions and Future Work

This paper proposes a security transmission and storage solution about sensing image for blockchain in the IoT. This solution mainly includes five algorithms: the blocking algorithm for image sensing and data sensing of smart image sensors; the public key generation algorithm for sensing data block; the private key generation and update algorithm for sensing data block; the signature algorithm for sensing data block; and the signature verification algorithm for sensing data block. To prove that the solution can safely transmit and store the user’s sensory image information, we conducted a series of security analysis. The proof results show that the solution can resist attacks such as theft and forgery, and ensure the security of user image information during transmission and storage.
In future work, we intend to apply digital image encryption technology to user-induced image encryption. Multi-encryption is used to ensure that user images are not stolen by attackers. Even if they are obtained by others, no valuable information can be obtained from the image information. Therefore, the technology can effectively prevent attackers from forging user image information to deceive authentication, and enhance the security of secure image transmission and storage solution.

Author Contributions

Conceptualization, Y.L. and Y.T.; Data curation, Y.L. and Y.T.; Formal analysis, Y.L. and Y.T.; Investigation, Y.L. and Y.T.; Methodology, Y.L. and Y.T.; Project administration, Y.L.; Resources, Y.L.; Supervision, Y.L., J.L. and Y.W.; Validation, Y.L.; Visualization, Y.L. and Y.T.; Writing—original draft, Y.L., Y.T., J.L. and Y.W.; and Writing—review and editing, Y.T., J.L. and Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gai, K.; Wu, Y.; Zhu, L.; Qiu, M.; Shen, M. Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid. IEEE Trans. Ind. Inf. 2019, 15, 3548–3558. [Google Scholar] [CrossRef]
  2. Liang, W.; Tang, M.; Long, J.; Peng, X.; Xu, J.; Li, K. A Secure FaBric Blockchain-Based Data Transmission Technique for Industrial Internet-of-Things. IEEE Trans. Ind. Inf. 2019, 15, 3582–3592. [Google Scholar] [CrossRef]
  3. Shen, M.; Deng, Y.; Zhu, L.; Du, X.; Guizani, N. Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach. IEEE Netw. 2019, 33, 27–33. [Google Scholar] [CrossRef]
  4. Li, R.; Song, T.; Mei, B.; Li, H.; Cheng, X.; Sun, L. Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE Trans. Serv. Comput. 2019, 12, 762–771. [Google Scholar] [CrossRef]
  5. Gai, K.; Wu, Y.; Zhu, L.; Xu, L.; Zhang, Y. Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks. IEEE Int. Things J. 2019, 6, 7992–8004. [Google Scholar] [CrossRef]
  6. Guo, S.; Hu, X.; Guo, S.; Qiu, X.; Qi, F. Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System. IEEE Trans. Ind. Inf. 2020, 16, 1972–1983. [Google Scholar] [CrossRef]
  7. Pan, J.; Wang, J.; Hester, A.; Alqerm, I.; Liu, Y.; Zhao, Y. EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts. IEEE Int. Things J. 2019, 6, 4719–4732. [Google Scholar] [CrossRef] [Green Version]
  8. Kim, T.; Noh, J.; Cho, S. SCC: Storage Compression Consensus for Blockchain in Lightweight IoT Network. In Proceedings of the 2019 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 11–13 January 2019. [Google Scholar]
  9. Shahid, A.; Pissinou, N.; Staier, C.; Kwan, R. Sensor-Chain: A Lightweight Scalable Blockchain Framework for Internet of Things. In Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 14–17 July 2019. [Google Scholar]
  10. Doku, R.; Rawat, D.; Garuba, M.; Njilla, L. LightChain: On the Lightweight Blockchain for the Internet-of-Things. In Proceedings of the 2019 IEEE International Conference on Smart Computing (SMARTCOMP), Washington, DC, USA, 12–15 June 2019. [Google Scholar]
  11. Almadhoun, R.; Kadadha, M.; Alhemeiri, M.; Alshehhi, M.; Salah, K. A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018. [Google Scholar]
  12. Manzoor, A.; Liyanage, M.; Braeken, A.; Kanhere, S.; Ylianttila, M. Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Korea, 14–17 May 2019. [Google Scholar]
  13. Wang, H.; Zhang, J. Blockchain Based Data Integrity Verification for Large-Scale IoT Data. IEEE Access 2019, 7, 164996–165006. [Google Scholar] [CrossRef]
  14. Rashid, M.; Pajooh, H. A Security Framework for IoT Authentication and Authorization Based on Blockchain Technology. In Proceedings of the 2019 18th IEEE International Conference On Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, 5–8 August 2019. [Google Scholar]
  15. Ayoade, G.; Karande, V.; Khan, L.; Hamlen, K. Decentralized IoT Data Management Using BlockChain and Trusted Execution Environment. In Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration (IRI), Salt Lake City, UT, USA, 6–9 July 2018. [Google Scholar]
  16. Zhu, L.; Wu, Y.; Gai, K.; Choob, K. Controllable and trustworthy blockchain-based cloud data management. Future Gener. Comput. Syst. 2019, 91, 527–535. [Google Scholar] [CrossRef]
  17. Zhou, L.; Wang, L.; Sun, Y.; Lv, P. BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation. IEEE Access 2018, 6, 43472–43488. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of secure transmission and storage of blockchain-oriented sensory images in the IoT.
Figure 1. Schematic diagram of secure transmission and storage of blockchain-oriented sensory images in the IoT.
Sensors 20 00916 g001
Table 1. Symbols and definitions.
Table 1. Symbols and definitions.
SymbolDefinition
uUser u
P ( u ) Images of user u
S P i ( u ) ith block in user image
Φ Empty
ABA is included in B
Union operation
Intersection
| | String operation
A|BA divisible by B
A BA is not divisible by B
TCycle T of smart image sensor
P K ( P ( u ) ) Public key of user image sensing data P ( u )
S K i , m ( S P i ( u ) ) Private key of sensing data block S P i ( u ) in time period t = m
S T S l Storage server l
T S i A timestamp value generated by the smart image sensor
T S T S i A timestamp value generated by the storage server
s i g n S K ( A ) ( B ) Data B is signed with the private key S K ( A )
S P Λ ( u ) Set of sensory image data blocks stolen by illegal users
Table 2. Analysis of safety functions.
Table 2. Analysis of safety functions.
Security FunctionOur Solution
Resist theft attacks
Resist replay attack
Resist denial of service (DOS) attack
Resist counterfeit attack
Resist server camouflage attack
Decentralization
Private key update
Table 3. Solution cost analysis.
Table 3. Solution cost analysis.
PeriodNumber of Keys Calculated by Smart SensorNumber of Keys Updated by Smart SensorNumber of Keys Stored per Storage ServerTotal Number of Keys Updated by Smart Sensor
1st time period n + 1 n10
jth time period n + 1 n1 n ( j 1 )
The entire cycle T n T + 1 n T T n T

Share and Cite

MDPI and ACS Style

Li, Y.; Tu, Y.; Lu, J.; Wang, Y. A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things. Sensors 2020, 20, 916. https://doi.org/10.3390/s20030916

AMA Style

Li Y, Tu Y, Lu J, Wang Y. A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things. Sensors. 2020; 20(3):916. https://doi.org/10.3390/s20030916

Chicago/Turabian Style

Li, Yunfa, Yifei Tu, Jiawa Lu, and Yunchao Wang. 2020. "A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things" Sensors 20, no. 3: 916. https://doi.org/10.3390/s20030916

APA Style

Li, Y., Tu, Y., Lu, J., & Wang, Y. (2020). A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things. Sensors, 20(3), 916. https://doi.org/10.3390/s20030916

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop