BDTS: Blockchain-based Data Trading System

Erya Jiang,Bo Qin,Qin Wang,Qianhong Wu,Sanxi Li,Wenchang Shi,Yingxin Bi,Wenyi Tang
DOI: https://doi.org/10.1007/978-981-99-7356-9_38
2023-11-01
Abstract:Trading data through blockchain platforms is hard to achieve \textit{fair exchange}. Reasons come from two folds: Firstly, guaranteeing fairness between sellers and consumers is a challenging task as the deception of any participating parties is risk-free. This leads to the second issue where judging the behavior of data executors (such as cloud service providers) among distrustful parties is impractical in the context of traditional trading protocols. To fill the gaps, in this paper, we present a \underline{b}lockchain-based \underline{d}ata \underline{t}rading \underline{s}ystem, named BDTS. BDTS implements a fair-exchange protocol in which benign behaviors can get rewarded while dishonest behaviors will be punished. Our scheme requires the seller to provide consumers with the correct encryption keys for proper execution and encourage a rational data executor to behave faithfully for maximum benefits from rewards. We analyze the strategies of consumers, sellers, and dealers in the trading game and point out that everyone should be honest about their interests so that the game will reach Nash equilibrium. Evaluations prove efficiency and practicability.
Cryptography and Security,Computers and Society,Computer Science and Game Theory
What problem does this paper attempt to address?
The problem that this paper attempts to solve is to achieve fair exchange in data trading on the blockchain platform. Specifically, the paper points out that there are two main challenges in traditional data trading: 1. **Ensuring fairness**: It is difficult to achieve true fairness between the seller and the buyer during the data trading process, because any cheating behavior of any participating party is risk - free. 2. **Judging behavior**: In an untrusted environment, it is very difficult to judge whether the behavior of data executors (such as cloud service providers) is trustworthy, which leads to the poor performance of traditional trading protocols in practical applications. To address these challenges, the paper proposes a blockchain - based data trading platform - BDTS (Blockchain - based Data Trading System). BDTS ensures that good behavior is rewarded and malicious behavior is punished by implementing a fair exchange protocol. Specifically, BDTS requires the seller to provide the correct encryption key to ensure the correct execution of data and encourages rational data executors to abide by the rules to obtain the maximum benefit. ### Main contributions 1. **Proposing the BDTS system**: This system realizes fair exchange among all participating parties, namely consumers, sellers, and service providers. Each participating party must abide by the rules, and good - behavior actors can fairly obtain incentive rewards. Each piece of data can only be sold once because each transaction is unique in the blockchain system. In addition, BDTS uses a uniqueness indexing mechanism and compares the Merkle roots of different data to prevent secondary sales of data. 2. **Security proof**: Based on game theory, the security of the system is proven from an economic perspective. By simulating the behaviors of different participating parties, it is proven that the game reaches a sub - game perfect Nash equilibrium (SPE). 3. **Experimental verification**: The BDTS system is implemented on the Hyperledger Fabric blockchain platform and comprehensively evaluated. The experimental results prove the efficiency and practicality of the system. Compared with existing complex cryptographic algorithms (such as zero - knowledge proof), the BDTS scheme is fast enough and suitable for lightweight devices. ### System architecture The BDTS system contains three main entities: consumers (CM), sellers (SL), and service providers (SP). The working process of the system is as follows: 1. **Data upload**: - The seller first broadcasts the data description and Merkle root to the blockchain. - The service provider decides whether to store the data according to the provided information. - The seller sends the encrypted data to the service provider, and the service provider starts to store the data. 2. **Data download**: - The consumer decides whether to buy according to the description and the exposed part of the data. - The consumer stores enough tokens in the smart contract and then requests data from the service provider. - The service provider sends the encrypted data to the consumer. 3. **Decryption and appeal**: - The consumer pays the fee and obtains the decryption key. - If the consumer receives the wrong decryption key or finds that the data has been tampered with, an appeal can be made through the smart contract. ### Security assumptions 1. **The blockchain itself is secure**: It is assumed that the blockchain has good liveness and security. 2. **Basic cryptographic algorithms are secure**: It is assumed that AES and elliptic - curve encryption algorithms are secure. 3. **The participating parties are rational**: It is assumed that all participating parties (consumers, sellers, and service providers) are rational, and they will act honestly but still pursue profits within the legal range. ### Security model The paper analyzes the strategies of each participating party in detail to ensure that the system reaches Nash equilibrium. Specific strategies include: - **Seller**: Provide matching data and keys, provide matching data but non - matching keys, provide non - matching data but matching keys, provide non - matching data and keys. - **Consumer**: Fully pay the seller, under - pay the seller, fully pay the service provider, under - pay the service provider. - **Service provider**: Provide real data and matching keys, provide real data but non - matching keys, provide false data but matching keys, provide false data and non - matching keys. Through the analysis of these strategies, the paper proves that in the case of all participating parties acting honestly, the system...