Submitted:
24 May 2023
Posted:
26 May 2023
You are already at the latest version
Abstract
Keywords:
1. Introduction
- a brief review on each technology that provides means to improve data security and privacy;
- a brief analysis regarding each technology based on the specified technical questions;
- a ranking for the technologies considering their technical analyses.
2. Background
2.1. Blockchain principles
2.2. Trusted Execution Environments
3. Review Methodology
- TQ1 - How is the communication with the blockchain nodes? Does it support HTTPS or another secure communication method?
- TQ2 - Is it secure? Does it allow/require confidential computing (i.e., trusted processing and storage)? What are the limitations of the programs running in the confidential environment?
- TQ3 - Does it have access control mechanisms? How are they?
- TQ4 - Does it scale? What is the approximate throughput (requests per day)?
- TQ5 - What is the cost? How are payments made? (It is relevant knowing how is the payment for the resources consumed.)
- TQ6 - Does it support communication with other blockchain technologies? How difficult is the communication?
- TQ7 - Is the platform well supported, well funded, and appears successful?
4. Privacy-based Blockchains
4.1. Secret Network
4.2. Oasis Network
- flexible - easy to modify system parameters;
- extensible - easy to add new components like confidential computing techniques;
- scalable - throughput should increase with the number of nodes;
- secure - the system should enforce security policies and provide confidential computing;
- and fault-isolated - the system should be fault-tolerant in terms of security and performance.
4.3. Phala
- Confidentiality, only authorized queries to the contract are answered;
- Code Integrity, verification on the blockchain of an output produced by a specific smart contract;
- State Consistency, verification of execution at specific chain state;
- Availability, no single point of failure (gatekeepers and miners);
- Interoperability, contracts can interoperate with other contracts and blockchains.
- Genesis Node, which bootstraps the network and is destroyed after launch;
- Gatekeepers, which manage the secrets and ensure availability and security of the network;
- Miners, which execute the confidential contracts.
- the user/developer publishes the contract to the blockchain;
- gatekeepers generate a symmetric contract key;
- gatekeepers save the encrypted key to the blockchain;
- the user/developer finds an available Miner to load the contract;
- the Miner pRuntime connects to a Gatekeeper through a secure connection and asks for the contract key;
- the Miner uses the received key to encrypt the contract state and saves it to the blockchain.
4.4. Integritee
- confidential decentralized state transition functions for private transactions, private smart contracts, off-chain confidential personal data records (GDPR), decentralized identity with selective disclosure, and subscription-based content delivery networks;
- scalability by providing a second layer to substrate-based blockchains for off-chain smart contracts and payment hubs;
- trusted chain bridges;
- trusted oracles.
- The Substratee node (archived);
- Integritee Node (Substratee node with TEE registry validating remote attestation);
- Integritee Worker (Integritee off-chain worker and sidechain “validateer”).
- subscriptions managed on-chain, and Integritee worker holds the content-encryption key (CEK – RSA-AES) to IPFS and registers the content on-chain;
- the consumers request content from the Integritee worker over a TLS channel (e.g., HTTPS or WSS), the worker authenticates the consumers and looks at subscription status on-chain;
- fetches the trusted content from IPFS;
- decrypts the content;
- sends the content to the consumer over the previous TLS channel.
4.5. Ternoa
- Create a capsule with an NFT;
- Encrypt the capsule content with a GPG key;
- Generate shares from the GPG key using the Shamir Secret Sharing method;
- Send the shares to master nodes with Intel SGX;
- Define the time protocol for the capsule and send it to the Ternoa chain.
4.6. NuCypher
4.7. Lit Protocol
- Encrypt and lock static content, among images, videos, and music, behind an on-chain condition such as ownership of an NFT;
- Decrypt static content that was locked behind an on-chain condition;
- Authorize network signatures that provide access to dynamic content (for example, a server or network resource) behind an on-chain condition;
- Request a network signed JWT (JSON Web Token Authentication) that provisions access and authorization to dynamic content behind an on-chain condition.
5. Technical Analysis
5.1. How is the communication with the blockchain nodes? Does it support HTTPS or another secure communication method?
5.1.1. Secret Network
5.1.2. Oasis Network
5.1.3. Phala Network
5.1.4. Integritee
5.1.5. Ternoa
5.1.6. NuCypher
5.1.7. Lit Protocol
5.2. Is it secure? Does it allow/require confidential computing? What are the limitations to run in the confidential environment?
5.2.1. Secret Network
5.2.2. Oasis Network
5.2.3. Phala Network
5.2.4. Integritee
5.2.5. Ternoa
5.2.6. NuCypher
5.2.7. Lit Protocol
5.3. Does it have access control mechanisms? What are they?
5.3.1. Secret Network
5.3.2. Oasis Network
5.3.3. Phala Network
5.3.4. Integritee
5.3.5. Ternoa
5.3.6. NuCypher
5.3.7. Lit Protocol
5.4. Does it scale? What is the approximate throughput?
5.4.1. Secret Network
5.4.2. Oasis Network
5.4.3. Phala Network
5.4.4. Integritee
5.4.5. Ternoa
5.4.6. NuCypher
5.4.7. Lit Protocol
5.5. What is the cost? How are payments made?
5.5.1. Secret Network
5.5.2. Oasis Network
5.5.3. Phala Network
5.5.4. Integritee
5.5.5. Ternoa
5.5.6. NuCypher
5.5.7. Lit Protocol
5.6. Does it support communication with other blockchain, web technologies? How difficult is the communication?
5.6.1. Secret Network
5.6.2. Oasis Network
5.6.3. Phala Network
5.6.4. Integritee
5.6.5. Ternoa
5.6.6. NuCypher
5.6.7. Lit Protocol
5.7. Is the platform well supported and well funded? Does it appear successful?
5.7.1. Secret Network
5.7.2. Oasis Network
5.7.3. Phala Network
5.7.4. Integritee
5.7.5. Ternoa
5.7.6. NuCypher
5.7.7. Lit Protocol
5.8. Summary
6. Conclusion
Author Contributions
Conflicts of Interest
References
- Aste, T.; Tasca, P.; Di Matteo, T. Blockchain Technologies: The Foreseeable Impact on Society and Industry. Computer 2017, 50, 18–28. [Google Scholar] [CrossRef]
- Zhang, R.; Xue, R.; Liu, L. Security and Privacy on Blockchain. ACM Comput. Surv. 2019. [Google Scholar] [CrossRef]
- Taylor, P.J.; Dargahi, T.; Dehghantanha, A.; Parizi, R.M.; Choo, K.K.R. A systematic literature review of blockchain cyber security. Digital Communications and Networks 2020, 6, 147–156. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 2008, 21260. [Google Scholar]
- Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics and Informatics 2019, 36, 55–81. [Google Scholar] [CrossRef]
- Fatima, N.; Agarwal, P.; Sohail, S.S. Security and Privacy Issues of Blockchain Technology in Health Care—A Review. In ICT Analysis and Applications; Fong, S., Dey, N., Joshi, A., Eds.; Springer Nature Singapore: Singapore, 2022; pp. 193–201. [Google Scholar]
- Chander, B. Deep Dive Into Blockchain Technology: Characteristics, Security and Privacy Issues, Challenges, and Future Research Directions. In Smart City Infrastructure; John Wiley & Sons, Ltd., 2022; chapter 1; pp. 1–32. [Google Scholar] [CrossRef]
- Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H. Blockchain technology as a Fog computing security and privacy solution: An overview. Computer Communications 2022, 182, 129–152. [Google Scholar] [CrossRef]
- Qahtan, S.; Sharif, K.Y.; Zaidan, A.A.; Alsattar, H.A.; Albahri, O.S.; Zaidan, B.B.; Zulzalil, H.; Osman, M.H.; Alamoodi, A.H.; Mohammed, R.T. Novel Multi Security and Privacy Benchmarking Framework for Blockchain-Based IoT Healthcare Industry 4.0 Systems. IEEE Transactions on Industrial Informatics 2022, 18, 6415–6423. [Google Scholar] [CrossRef]
- Jayabalan, J.; Jeyanthi, N. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. Journal of Parallel and Distributed Computing 2022, 164, 152–167. [Google Scholar] [CrossRef]
- Gimenez-Aguilar, M.; de Fuentes, J.M.; Gonzalez-Manzano, L.; Arroyo, D. Achieving cybersecurity in blockchain-based systems: A survey. Future Generation Computer Systems 2021, 124, 91–118. [Google Scholar] [CrossRef]
- Cao, Z.; Zhao, L. A Design of Key Distribution Mechanism in Decentralized Digital Rights Management Based on Blockchain and Zero-Knowledge Proof. In Proceedings of the 2021 The 3rd International Conference on Blockchain Technology, ICBCT ’21; Association for Computing Machinery: New York, NY, USA, 2021; pp. 53–59. [Google Scholar] [CrossRef]
- Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
- Issa, W.; Moustafa, N.; Turnbull, B.; Sohrabi, N.; Tari, Z. Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. ACM Comput. Surv. 2022. just accepted. [Google Scholar] [CrossRef]
- Grover, J. Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review. Vehicular Communications 2022, 34, 100458. [Google Scholar] [CrossRef]
- Gawusu, S.; Zhang, X.; Ahmed, A.; Jamatutu, S.A.; Miensah, E.D.; Amadu, A.A.; Osei, F.A.J. Renewable energy sources from the perspective of blockchain integration: From theory to application. Sustainable Energy Technologies and Assessments 2022, 52, 102108. [Google Scholar] [CrossRef]
- Pournader, M.; Shi, Y.; Seuring, S.; Koh, S.L. Blockchain applications in supply chains, transport and logistics: a systematic review of the literature. International Journal of Production Research 2020, 58, 2063–2081. [Google Scholar] [CrossRef]
- Saeed, H.; Malik, H.; Bashir, U.; Ahmad, A.; Riaz, S.; Ilyas, M.; Bukhari, W.A.; Khan, M.I.A. Blockchain technology in healthcare: A systematic review. "PLoS ONE 2022, 17, 1–31. [Google Scholar] [CrossRef]
- Abou Jaoude, J.; George Saade, R. Blockchain Applications – Usage in Different Domains. IEEE Access 2019, 7, 45360–45381. [Google Scholar] [CrossRef]
- Lashkari, B.; Musilek, P. A Comprehensive Review of Blockchain Consensus Mechanisms. IEEE Access 2021, 9, 43620–43652. [Google Scholar] [CrossRef]
- Mingxiao, D.; Xiaofeng, M.; Zhe, Z.; Xiangwei, W.; Qijun, C. A review on consensus algorithm of blockchain. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC); 2017; pp. 2567–2572. [Google Scholar] [CrossRef]
- Nijsse, J.; Litchfield, A. A Taxonomy of Blockchain Consensus Methods. Cryptography 2020, 4, 32. [Google Scholar] [CrossRef]
- Pilkington, M. Blockchain technology: principles and applications. In Research handbook on digital transformations; Edward Elgar Publishing, 2016. [Google Scholar]
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. International journal of web and grid services 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Zhang, J.; Zhong, S.; Wang, T.; Chao, H.C.; Wang, J. Blockchain-based systems and applications: a survey. Journal of Internet Technology 2020, 21, 1–14. [Google Scholar]
- Platt, M.; McBurney, P. Sybil attacks on identity-augmented Proof-of-Stake. Computer Networks 2021, 199, 108424. [Google Scholar] [CrossRef]
- Hafid, A.; Hafid, A.S.; Samih, M. A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols. IEEE Transactions on Emerging Topics in Computing 2022, 1. [Google Scholar] [CrossRef]
- Hassan, M.U.; Rehmani, M.H.; Chen, J. Anomaly Detection in Blockchain Networks: A Comprehensive Survey. IEEE Communications Surveys & Tutorials 2022, 1. [Google Scholar] [CrossRef]
- Hafid, A.; Hafid, A.S.; Samih, M. Scaling Blockchains: A Comprehensive Survey. IEEE Access 2020, 8, 125244–125262. [Google Scholar] [CrossRef]
- Henry, R.; Herzberg, A.; Kate, A. Blockchain Access Privacy: Challenges and Directions. IEEE Security & Privacy 2018, 16, 38–45. [Google Scholar] [CrossRef]
- Valadares, D.C.G.; Will, N.C.; Spohn, M.A.; de Souza Santos, D.F.; Perkusich, A.; Gorgônio, K.C. Confidential computing in cloud/fog-based Internet of Things scenarios. Internet of Things 2022, 19, 100543. [Google Scholar] [CrossRef]
- Valadares, D.C.G.; Will, N.C.; Caminha, J.; Perkusich, M.B.; Perkusich, A.; Gorgônio, K.C. Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications. IEEE Access 2021, 9, 80953–80969. [Google Scholar] [CrossRef]
- Valadares, D.C.G.; Will, N.C.; Caminha, J.; Perkusich, M.B.; Perkusich, A.; Gorgônio, K.C. Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications. IEEE Access 2021, 9, 80953–80969. [Google Scholar] [CrossRef]
- Secret Network: A Privacy-Preserving Secret Contract & Decentralized Application Platform. https://bit.ly/3XU64LB (accessed on 10 July 2022).
- The Oasis Blockchain Platform. https://bit.ly/41kzwgo (accessed on 10 July 2022).
- Oasis Network Primer. https://bit.ly/3xK8RMw (accessed on 10 July 2022).
- Oasis Emerald — EVM ParaTime is live on Mainnet. https://bit.ly/3lNrLPS (accessed on 10 July 2022).
- A Beginner’s Guide to Oasis. https://bit.ly/3lOhwe6 (accessed on 10 July 2022).
- Introducing Parcel Beta. https://bit.ly/3RSsgU3 (accessed on 10 July 2022).
- What is Phala Network (PHA)? https://bit.ly/3krDYt8 (accessed on 10 July 2022).
- Phala Network: A Secure Decentralized Cloud Computing Network Based on Polkadot. https://bit.ly/3lM7fz5 (accessed on 10 July 2022).
- All Systems Go for Integritee in the Coming Weeks. https://bit.ly/3DypWND (accessed on 10 July 2022).
- Integritee Book. https://bit.ly/3Iuus0G (accessed on 10 July 2022).
- Integritee Token Economics. https://bit.ly/3f15J8P (accessed on 10 July 2022).
- Integritee Network. https://bit.ly/3YOFDrM (accessed on 10 July 2022).
- Integritee Use Cases - CDN Subscriptions. https://bit.ly/3IhfVFk (accessed on 10 July 2022).
- TERNOA - White Paper. https://bit.ly/3LnJSok (accessed on 10 July 2022).
- The Ternoa blockchain. https://bit.ly/3SgaJ7R (accessed on 10 July 2022).
- Duchemin, N. Ternoa, Creating Environmentally-Friendly Augmented NFTs. https://bit.ly/3LpGoBz (accessed on 10 July 2022).
- Ternoa capsules. https://www.ternoa.com/capsules (accessed on 10 July 2022).
- Schreyer, D. How is Ternoa using TEE technology to maximize security. https://bit.ly/3Ueqmih (accessed on 10 July 2022).
- Eshwarla, P. Ternoa Phase 1 Roadmap: Alphanet and Mainnet. https://bit.ly/3LuXuOD (accessed on 10 July 2022).
- Gabriel, G. Introducing Ternoa. https://bit.ly/3UmcUIU (accessed on 10 July 2022).
- Gabriel, G. Ternoa Bridge. https://bit.ly/3UuR5XY (accessed on 10 July 2022).
- NuCypher Documentation. https://bit.ly/3khF0YT (accessed on 10 December 2020).
- A Deep Dive Into NuCypher. https://bit.ly/3IKDjfI (accessed on 10 December 2020).
- Egorov, M.; Wilkison, M.; Nuñez, D. NuCypher KMS: Decentralized key management system. Blockchain Protocol Analysis and Security Engineering 2018, 2018. [Google Scholar]
- Egorov, M.; Nuñez, D.; Wilkison, M. NuCypher: A proxy re-encryption network to empower privacy in decentralized systems. 2018. [Google Scholar]
- What is the Lit Protocol? https://bit.ly/41tJFaW (accessed on 10 December 2022).
- Lit Protocol Use Cases. https://bit.ly/3Ze8NR6 (accessed on 10 December 2022).
- Introduction to Decentralized Access Control. https://bit.ly/3YUrKIB (accessed on 10 December 2022).
- Lit Protocol SDK. https://bit.ly/3klQfzs (accessed on 10 December 2022).
- Lit Gateway. https://bit.ly/3Zf1OXN (accessed on 10 December 2022).
- Integritee Lightpaper. https://uploads-ssl.webflow.com/60c21bdfde439ba700ea5c56/612892db018a36f054100b4dIntegritee AG Lightpaper.pdf (accessed on 20 February 2023).
| 1 | |
| 2 | |
| 3 | |
| 4 | |
| 5 | |
| 6 | |
| 7 | |
| 8 | |
| 9 | |
| 10 | |
| 11 | |
| 12 | |
| 13 | |
| 14 | |
| 15 | |
| 16 | |
| 17 | |
| 18 | |
| 19 | |
| 20 | |
| 21 | |
| 22 | |
| 23 | |
| 24 | |
| 25 | |
| 26 | |
| 27 | |
| 28 | |
| 29 | |
| 30 | |
| 31 | |
| 32 | |
| 33 | |
| 34 | |
| 35 | |
| 36 | |
| 37 | |
| 38 | |
| 39 | |
| 40 | |
| 41 | |
| 42 | |
| 43 | |
| 44 | |
| 45 | |
| 46 | |
| 47 | |
| 48 | |
| 49 | |
| 50 | |
| 51 | |
| 52 | |
| 53 | |
| 54 | |
| 55 | |
| 56 | |
| 57 | |
| 58 |
| 1cTechnology | Secure Channel |
TEE on Nodes |
Access Control |
Scalability | Costwise | Communication with blockchains |
Support and maturity |
SDKs and Tutorials |
Total |
|---|---|---|---|---|---|---|---|---|---|
| Secret | 5 | 5 | 4 | 5 | 4 | 5 | 5 | 4 | 37 |
| Oasis | 5 | 5 | 4.5 | 5 | 4 | 5 | 5 | 4 | 37.5 |
| Phala | 5 | 5 | 4 | 5 | 1 | 5 | 3 | 4 | 32 |
| Integritee | 5 | 5 | 5 | 5 | 1 | 5 | 2 | 3 | 31 |
| Ternoa | 5 | 3 | 4 | 5 | 2.5 | 5 | 2.5 | 2 | 29 |
| NuCypher | 4 | 1 | 4 | 3 | 2 | 2 | 2 | 4 | 22 |
| Lit Protocol | 3 | 1 | 5 | 3 | 2 | 2 | 1 | 4 | 21 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).