Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
Blockchain-Based Verifiable Computation: A Review
Author(s):
1. Maham Zara: School of Computer Science and Technology Xidian University, Xian, Shaanxi, 710071, China
2. Shuzhen Wang: School of Computer Science and Technology Xidian University, Xian, Shaanxi, 710071, China
3. Hasan ul Moin: Shaheed Zulfikar Ali Bhutto Institute of Science & Technology, Hyderabad Campus, Hyderabad, Sindh, 71000, Pakistan
Abstract:
Verifiable computation has been studied as a way to verify the outcomes of an outsourced computation. It is usually seen from the view of a user who wishes to outsource computation to a centralized third party but wants to ensure that the party provides correct results. With the said scheme, the verifier requests the prover to perform the computational task and then verifies the outcome by checking the output and the proof obtained from the prover. However, there are several security challenges within a centralized third party to execute verification tasks. Recently, the advancement in blockchain technology has ofered an opportunity to solve these security challenges. Blockchain is a distributed ledger and decentralized technology that eliminates the need for third-party verification. In recent years, the emergence of innovative applications of verifiable computing techniques within blockchain technology has been witnessed. These applications focus on ensuring secure key management, enhancing smart contracts, and fortifying sybil-resistance. The use of blockchain in the realm of verifiable computing has drawn the attention of many researchers. However, our research into relevant papers revealed a notable lack of comprehensive surveys on blockchain-based verifiable computing in the literature. To overcome this gap, we conducted a comprehensive survey on blockchain-based verifiable computation. First, we address fundamental concepts related to blockchainbased verifiable computation. Afterwards, we ofer a series of criteria to evaluate existing blockchain-based verifiable computation techniques. Finally, based on our comprehensive review and evaluation metrics, we explore various open challenges and potential research prospects. These include zero-knowledge proofs (ZKP) integration, addressing privacy preservation, scalability, and traceability. Future research should focus on robust privacy-preserving methods, using ZKP for enhanced security, of-chain computations for scalability, and decentralized file systems like Interplanetary File System (IPFS) to improve traceability.
Page(s): 113-128
Published: Journal: Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, Volume: 61, Issue: 2, Year: 2024
Keywords:
Blockchain , Security , Privacy , Smart Contract , Ethereum , Verifiable Computation
References:
[1] Yu X.,Yan Z.,Vasilakos A.V. .2017 .A Survey of Verifiable Computation. Mobile Networks and Application, 22 : 438-453.
[2] Nakamoto S. .2024 .Bitcoin: A peer-to-peer electronic cash system (. pdf (accessed 10 February, : .
[3] Crosby M.,Pattanayak P.,Verma S.,Kalyanaraman V. .2016 .Blockchain technology: Beyond bitcoin. Applied Innovation, 2 : 6-10.
[4] Šimunić S.,Bernaca D.,Lenac K. .2021 .Verifiable computing applications in blockchain. IEEE Access, 9 : 156729-156745.
[5] Dorsala M.R.,Sastry V.N.,Chapram S. .2021 .Blockchain-based solutions for cloud computing: A survey. Journal of Network and Computer Applications, 196 : 103246.
[6] Gamage H.,Weerasinghe H.,Dias N. .2020 .A survey on blockchain technology concepts, applications, and issues. SN Computer Science, 1 : 1-15.
[7] Soni S.,Bhushan B. .2019 .A comprehensive survey on blockchain: working, security analysis, privacy threats and potential applications. India (July 5-6, 1 : 922-926.
[8] Shi S.,He D.,Li L.,Kumar N.,Khan M.K.,K.K. R. Choo M.K. .2020 .Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Computers & Security, 97 : 101966.
[9] Peng L.,Feng W.,Yan Z.,Li Y.,Zhou X.,Shimizu S. .2021 .Privacy preservation in permissionless blockchain: A survey. Digital Communications and Networks, 7 : 295-307.
[10] M.R. Ahmed ,A.K.M.M. Islam S.,Shatabda S.,Islam S. .2022 .Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey. IEEE Access, 10 : 113436-113481.
[11] Li W.,Wu J.,Cao J.,Chen N.,Zhang Q.,Buyya R. .2021 .Blockchain-Based Trust Management in Cloud Computing Systems: A Taxonomy, Review and Future Directions. Journal of Cloud Computing, 35(1) : .
[12] A.M.S. Saleh .2024 .Blockchain for Secure and Decentralized Artificial Intelligence in Cybersecurity: A Comprehensive Review. Blockchain: Research and Applications, 5 : 100193.
[13] M.M. Memon M.A.,Hashmani F.T.,Simpao A.C.,Sales N.Q.,Santillan D.,Khan D. .2023 .Blockchain in Healthcare: A Comprehensive Survey of Implementations and a Secure Model Proposal. Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, 60(3) : 1-13.
[14] Rosenfeld M. .2024 .Overview of colored coins (. (accessed 10 February, : .
[15] M. Conoscenti A.,Vetro A.,C. De Martin A. .2016 .Blockchain for the internet of things: A systematic literature review. Morocco (November 29 - December 2, : 1-6.
[16] Wang S.,Ouyang L.,Yuan Y.,Ni X.,Wang F.Y. .2019 .Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 49 : 2266-2277.
[17] Gai K.,Guo J.,Zhu L.,Yu S. .2020 .Blockchain meets cloud computing: A survey. IEEE Communications Surveys Tutorials, 22 : 2009-2030.
[18] D.C. Nguyen P.N.,Pathirana M.,Ding M.,Seneviratne A. .2020 .Blockchain for 5g and beyond networks: A state of the art survey. Journal of Network and Computer Applications, 166 : 102693.
[19] Zafar F.,Khan A.,Malik S.U.R.,Ahmed M.,Anjum A.,Khan M.I.,Javed N.,Alam M.,Jamil F. .2017 .A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Computers & Security, 65 : 29-49.
[20] C. Dong Y.,Wang A.,Aldweesh P.,McCorry P.,A. van Moorsel P. .2017 .Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. USA (30 October - 3 November, : 211-227.
[21] Benisi N.Z.,Aminian M.,Javadi B. .2020 .Blockchainbased decentralized storage networks: A survey Journal of Network. Computer Applications, 162 : 102656.
[22] Kumaresan R.,and I. Bentov. R. .2014 .How to use bitcoin to incentivize correct computations. USA (November 3-7, : 30-41.
[23] C. Yang L.,Tan N.,Shi B.,Xu Y.,Cao K.,Yu. AuthPrivacyChain K. .2020 .A blockchain-based access control framework with privacy protection in cloud. IEEE Access, 8 : 70604-70615.
[24] Zhang Y.,Deng R.H.,Liu X.,Zheng D. .2018 .Blockchain based eficient and robust fair payment for outsourcing services in cloud computing. Information Sciences, 462 : 262-277.
[25] Zhang Y.,Deng R.H.,Liu X.,Zheng D. .2018 .Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing, 14 : 1152-1166.
[26] Wang S.,Wang Y.,Y. Zhang. Y. .2019 .Blockchainbased fair payment protocol for deduplication cloud storage system. IEEE Access, 7 : 127652-127668.
[27] M. Krol and I.,Psaras and I. .2018 .Secure payments for outsourced computations. , 06462 : .
[28] Hjlmarsson F.,Hreiarsson G.K.,Hamdaqa M.,Hjlmtsson G. .2018 .Blockchain-based e-voting system. USA (July 2-7, : 983-986.
[29] J. Eberhardt S.,Tai S.,NS S. .2018 .Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax. Canada (July 30 - August 3, : 1084-1091.
[30] Jiang S.,Liu J.,Wang L.,Yoo S.M. .2019 .Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data. In ICC 2019-2019 IEEE International Conference on Communications (ICC), : 1-6.
[31] M.R. Dorsala V.,Sastry S.,Chapram S. .2020 .Fair payments for verifiable cloud services using smart contracts. Computers & Security, 90 : 101712.
[32] Zhou L.,Wang Y.,Sun Y. .2018 .Mistore: a blockchainbased medical insurance storage system. Journal of Medical Systems, 42 : 1-17.
[33] Avizheh S.,Nabi M.,Safavi-Naini R. .2019 .Venkateswarlu K. Verifiable computation using smart contracts. UK (November, 11 : 17-28.
[34] J. Teutsch C.,Reitwießner C. .2019 .A scalable verification solution for blockchains. , 04756 : .
[35] C. Yang X.,Chen Y.,Xiang Y. .2018 .Blockchainbased publicly verifiable data deletion scheme for cloud storage. Journal of Network and Computer Applications, 103 : 185-193.
[36] M. Li L.,Zhu Z.,Zhang C.,Lal M.,Conti M.,Alazab M. .2021 .Anonymous and verifiable reputation system for e-commerce platforms based on blockchain. IEEE Transactions on Network and Service Management, 18 : 4434-4449.
[37] J. Zawistowski P.,Janiuk A.,Regulski A.,Skrzypczak A.,Leverington P.,Bylica M.,Franciszkiewicz P.,Peregud A.,Banasiak M.,Stasiewicz R.,Zagórowicz R. .2023 .. com/62446d07873fde065cbcb8d5/62 446d07873fdeb626bcb927_Golemwhitepaper.pdf (accessed 30 December, : .
[38] He H.,Lodygensky O.,Alves E. .2023 .. pdf (accessed 30 December, : .
[39] .2023 .Supercomputer organized by network mining (. (accessed 30 December, : .
[40] Ghani M.A.N.U.,She K.,Rauf M.A.,Alajmi M.,Ghadi Y.Y.,Algarni. Securing Synthetic A. .2024 .Faces: A GAN-Blockchain Approach to PrivacyEnhanced Facial Recognition. Journal of King Saud University-Computer and Information Sciences, 102036(4) : .
[41] Ghani M.A.N.U.,She K.,Rauf M.A.,Khan S.,Khan J.A.,Aldakheel E.A.,Khafaga D.S. .2024 .Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies. Materials & Continua, 2610(2) : .
[42] A.H. Magsi L.V.,Yovita Z.,Ali Z. .2023 .A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking. Sustainability, 10931(14) : .
Citations
Citations are not available for this document.
0

Citations

0

Downloads

61

Views