Journal Home > Volume 5 , issue 1

The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. Because of these characteristics, the blockchain is suitable for solving certain open problems in the service-oriented social network, where the unreliability of submitted reviews of service vendors can cause serious security problems. To solve the unreliability problems of submitted reviews, this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model. The new trusted service evaluation model consists of the blockchain-based identity authentication scheme, evaluation submission module, and evaluation publicity module. In the proposed evaluation model, only users who have successfully been authenticated can submit reviews to service vendors. The registration and authentication records of users’ identity and the reviews for service vendors are all stored in the blockchain network. The security analysis shows that this model can ensure the credibility of users’ reviews for service vendors, and other users can obtain credible reviews of service vendors via the review publicity module. The experimental results also show that the proposed model has a lower review submission delay than other models.


menu
Abstract
Full text
Outline
About this article

BCSE: Blockchain-Based Trusted Service Evaluation Model over Big Data

Show Author's information Fengyin Li( )Xinying YuRui GeYanli WangYang CuiHuiyu Zhou
School of Computer Science, Qufu Normal University, Rizhao 276826, China
School of Informatics, University of Leicester, Leicester, LE1 7RH, UK

Abstract

The blockchain, with its key characteristics of decentralization, persistence, anonymity, and auditability, has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions. Because of these characteristics, the blockchain is suitable for solving certain open problems in the service-oriented social network, where the unreliability of submitted reviews of service vendors can cause serious security problems. To solve the unreliability problems of submitted reviews, this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model. The new trusted service evaluation model consists of the blockchain-based identity authentication scheme, evaluation submission module, and evaluation publicity module. In the proposed evaluation model, only users who have successfully been authenticated can submit reviews to service vendors. The registration and authentication records of users’ identity and the reviews for service vendors are all stored in the blockchain network. The security analysis shows that this model can ensure the credibility of users’ reviews for service vendors, and other users can obtain credible reviews of service vendors via the review publicity module. The experimental results also show that the proposed model has a lower review submission delay than other models.

Keywords:

social network, trusted service evaluation model, blockchain, identity authentication
Received: 05 August 2020 Revised: 30 September 2020 Accepted: 18 October 2020 Published: 27 December 2021 Issue date: March 2022
References(25)
[1]
D. G. Feng, M. Zhang, and H. Li, Big data security and privacy protection, Chin. J. Comput., vol. 37, no. 1, pp. 246-258, 2014.
[2]
X. L. Xu, X. Y. Zhang, H. H. Gao, Y. Xue, L. Y. Qi, and W. C. Dou, BeCome: Blockchain-enabled computation offloading for IoT in mobile edge computing, IEEE Trans. Ind. Informatics, vol. 16, no. 6, pp. 4187-4195, 2020.
[3]
H. W. Liu, H. Z. Kou, C. Yan, and L. Y. Qi, Keywords-driven and popularity-aware paper recommendation based on undirected paper citation graph, Complexity, vol. 2020, p. 2085638, 2020.
[4]
Nomura Research Institute, Survey on blockchain technologies and related services, , 2016.
[5]
S. Matsumoto, and R. M. Reischuk, IKP: Turning a PKI around with decentralized automated incentives, in Proc. 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, pp. 410-426, 2017.
[6]
Z. X. Chen, L. S. Ge, H. Y. Wang, X. Z. Huang, and J. J. Lin, A trust-based service evaluation and selection model in pervasive computing environment, in Proc. 2006 1st Int. Symp. on Pervasive Computing and Applications, .
[7]
H. Zhang, Y. Wang, and X. Zhang, A trust vector approach to transaction context-aware trust evaluation in e-commerce and e-service environments, in Proc. 2012 5th IEEE Int. Conf. on Service-Oriented Computing and Applications (SOCA), Taipei, China, .
[8]
L. Li, Trust evaluation in service-oriented environments, PhD dissertation, Macquarie University, Sydney, Australia, 2011, pp. 217-226.
[9]
D. F. Liu, Y. Su, H. A. Xie, and K. Yang, Customer evaluation based trust model in cloud service, (in Chinese), Appl. Electronic Tech., vol. 42, no. 9, pp. 99-102, 2016.
[10]
Y. B. Wang, J. H. Wen, X. B. Wang, and W. Zhou, Cloud service evaluation model based on trust and privacy-aware, Optik, vol. 134, pp. 269-279, 2017.
[11]
S. Shunmuganathan, R. D. Saravanan, and Y. Palanichamy, Secure and efficient smart-card-based remote user authentication scheme for multiserver environment, Can. J. Electrical Comput. Eng., vol. 38, no.1, pp. 20-30, 2015.
[12]
Z. P. Hu, W. P. Ding, Z. Gao, X. H. Zhu, and J. H. Wang, Multi-stage cascade wireless security authentication scheme based on blockchain technology, (in Chinese), Comput. Sci., vol. 46, no.12, pp. 180-185, 2019.
[13]
A. Nash, W. Duane, and C. Joseph, PKI: Implementing and Managing E-security, New York, NY, USA: Mc Graw-Hill, Inc., 2001.
[14]
Y. L. Chen, Y. J. Du, and G. Yang, Efficient attribute-based authenticated key agreement protocol, (in Chinese), Comput. Sci., vol. 41, no. 4, pp. 150-154, 177, 2014.
[15]
Z. C. Zhou, L. X. Li, S. Guo, and Z. H. Li, Biometric and password two-factor cross domain authentication scheme based on blockchain technology, (in Chinese), J. Comput. Appl., vol. 38, no. 6, pp. 1620-1627, 2018.
[16]
J. L. Fan, J. M. Chen, Y. Du, P. Wang, and Y. X. Sun, DelQue: A socially aware delegation query scheme in delay-tolerant networks, IEEE Trans. Vehicular Technol., vol. 60, no. 5, pp. 2181-2193, 2011.
[17]
X. H. Liang, X. D. Lin, and X. S. Shen, Enabling trustworthy service evaluation in service-oriented mobile social networks, IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 310-320, 2013.
[18]
S. Raju, S. Boddepalli, S. Gampa, Q. B. Yan, and J. S. Deogun, Identity management using blockchain for cognitive cellular networks, in Proc. 2017 IEEE Int. Conf. on Communications (ICC), Paris, France, .
[19]
H. Wang, S. L. Ma, H. N. Dai, M. Imran, and T. S. Wang, Blockchain-based data privacy management with nudge theory in open banking, Future Generation Computer Systems, vol. 110, pp. 812-823, 2020.
[20]
X. Liang, X. Li, R. X. Lu, X. Lin, and X. Shen, Seer: A secure and efficient service review system for service-oriented mobile social networks, in Proc. 2012 IEEE 32nd Int. Conf. on Distributed Computing Systems, Macau, China, 2012, pp. 647-656.
[21]
P. L. Zheng, Z. B. Zheng, J. J. Wu, and H. N. Dai, XBlock-ETH: Extracting and exploring blockchain data from ethereum, IEEE Open J. Comput. Soc., vol. 1, pp. 95-106, 2020.
[22]
W. Wang, J. J. Song, G. Q. Xu, Y. D. Li, H. Wang, and C. H. Su, ContractWard: Automated vulnerability detection models for ethereum smart contracts, IEEE Trans. Netw. Sci. Eng., .
[23]
C. Fromknecht, D. Velicanu, and S. Yakoubov, CertCoin: A Namecoin Based Decentralized Authentication System 6.857 Class Project, Cambridge, MA, USA: Massachusetts Institute of Technology, 2014.
[24]
M. A. Wright, An overview of PKI, Network Security, vol. 1999, no. 9, pp.14-17, 1999.
[25]
A. S. Konoplev, A. G. Busygin, and D. P. Zegzhda, A blockchain decentralized public key infrastructure model, Automatic Control and Computer Sciences, vol. 52, no. 8, pp. 1017-1021, 2018.
Publication history
Copyright
Rights and permissions

Publication history

Received: 05 August 2020
Revised: 30 September 2020
Accepted: 18 October 2020
Published: 27 December 2021
Issue date: March 2022

Copyright

© The author(s) 2022

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Reprints and Permission requests may be sought directly from editorial office.

Return