ArticlePDF Available

An Investigation of Pseudonymization Techniques in Decentralized Transactions

Authors:

Abstract

Decentralized learning (DL) enables several devices to assemble deep learning models while keeping their private training data on the device. Rather than uploading the training data and model to the server, cross-silo DL only sends the local gradients gradually to the aggregation server back and forth. Hence, DL can provide privacy training of machine learning. Nevertheless, cross-silo DL lacks the proper incentive mechanism for the clients. Thanks to the blockchain, smart contracts (SCs) can address the concerns by providing immutable data records which are self-executing and tamper-proof to failures. Yet, the records of blockchain transactions are publicly visible, which can leak valuable clients’ information as analytical systems become more sophisticated. We leverage the Monero (XMR) protocols to be adjusted into cross-silo DL transactions over wireless networks to address the issues. Concurrently, we investigate the performance of constructed protocols embedded into blockchain smart contracts. This paper also reports and analyzes an empirical investigation of several privacy preservation techniques in decentralized transactions. Overall, the performance results satisfy the design goals. Our observations fill the current literature gap concerning an up-to-date systematic mapping study, not to mention extensive techniques in preserving privacy for cross-silo DL combined with blockchain.
An Investigation of Pseudonymization Techniques in
Decentralized Transactions
Sandi Rahmadika1, Muhammad Firdaus2, Yong-Hwan Lee1, and Kyung-Hyune Rhee2*
1Wonkwang University, Jeonbuk, Iksan City 54538, Republic of Korea
ndiikaa@gmail.com, hwany1458@empas.com
2Pukyong National University, Busan 48513, Republic of Korea
mfirdaus@pukyong.ac.kr, khrhee@pknu.ac.kr
Received: September 3, 2021; Accepted: November 2, 2021; Published: November 30, 2021
Abstract
Decentralized learning (DL) enables several devices to assemble deep learning models while keep-
ing their private training data on the device. Rather than uploading the training data and model
to the server, cross-silo DL only sends the local gradients gradually to the aggregation server back
and forth. Hence, DL can provide privacy training of machine learning. Nevertheless, cross-silo
DL lacks the proper incentive mechanism for the clients. Thanks to the blockchain, smart contracts
(SCs) can address the concerns by providing immutable data records which are self-executing and
tamper-proof to failures. Yet, the records of blockchain transactions are publicly visible, which can
leak valuable clients’ information as analytical systems become more sophisticated. We leverage the
Monero (XMR) protocols to be adjusted into cross-silo DL transactions over wireless networks to
address the issues. Concurrently, we investigate the performance of constructed protocols embedded
into blockchain smart contracts. This paper also reports and analyzes an empirical investigation of
several privacy preservation techniques in decentralized transactions. Overall, the performance re-
sults satisfy the design goals. Our observations fill the current literature gap concerning an up-to-date
systematic mapping study, not to mention extensive techniques in preserving privacy for cross-silo
DL combined with blockchain.
Keywords: blockchain-based incentive, decentralized learning, pseudonymization protocols, smart
contract
1 Introduction
The vigorous utilization of internet-based information systems that rely on a decentralized approach
has been broadly researched by academia, developers, and industries. The foremost objective of the
decentralized approach is to address the communication bottleneck issues and memory usage of the con-
ventional centralized system [22]. The paradigm of a robust concentrated approach (relies on a single
node) via wireless networks has been gradually shifting toward decentralized practices, such as financial
services, healthcare records, any forms of digital rights, and intellectual property. Blockchain technology
through Bitcoin cryptocurrency and decentralized learning are the most prominent practical adoptions of
decentralized approaches. Concurrently, decentralized ledger and artificial intelligence (AI) are expedi-
tiously converging to address many critical challenges. Blockchain technology arguably is an ingenious
invention, the brainchild of a user or group known by Satoshi Nakamoto’s pseudonym [11] that make
Journal of Internet Services and Information Security (JISIS), volume: 11, number: 4 (November), pp. 1-18
DOI:10.22667/JISIS.2021.11.30.001
*Corresponding author: Department of IT Convergence and Application Engineering, Pukyong National University,
Yongso-ro 45, Nam-gu, Busan (48513), Republic of Korea. Telp: +82-(0)51-6296247, Fax: +82-(0)51-6264887
1
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
smart contracts are all the rage in the blockchain world these days. Many pundits claim SCs will convey
an entirely new paradigm that forever changes how the parties write contracts and conduct business. The
successfully conducted blockchain transactions are candidly available in the network and can be accessed
through the user interface by blockchain entities. Thus, it has been practiced in various disciplines of
science.
Linked to the Bitcoin and Ethereum blockchain, distributed learning also relies on the decentralized
approach to collectively building the deep learning model from multiple devices. In contrast to conven-
tional machine learning, where the clients process the training model centrally, FL allows the clients
to build the artificial intelligence (AI) model by sending the updated gradient values to the aggregation
server without revealing the dataset [7]. Accordingly, private data remain confidential (the DL preserves
privacy for clients by design). The DL-based schemes, such as federated learning, lack the proper in-
centive mechanism to motivate clients to improve AI models. Several applications do not even provide
a reward for clients. Blockchain with SC features can be a solution to tackle the incentive mechanism
issues. Nevertheless, directly employing SCs threatens the clients’ privacy since SCs are transparent and
readily available in the blockchain user interface. The existing smart contracts-based solution, such as
Ethereum smart contract and Hyperledger chain-code, only perform a simple computation that cannot
satisfy the application of real-world AI. The developers can program the codes as a self-execute program
without third-party involvement. AI with smart contract integration may render a more resilient and effi-
cient path for a decentralized interactive system for the parties. In short, SCs in DL must be thoroughly
investigated when these technologies are implemented in a system with profoundly confidential infor-
mation, such as federated identity (federated electronic identity) [5] and digital forensics [32]. Precisely,
complementary protocols need to be supplemented.
Privacy-awareness in the smart contract and decentralized learning is part of a flaw that must be
considered in wireless network environments. Melis et al. [30] surprisingly claimed that the observer
could infer the presence of exact data points of clients’ datasets with particular assumptions. While
SCs present client’s transactions visible to the observer. The record of transactions can be accessed
anytime, and the value of data is noticeable. Transparency is one of the concrete features of the SC
blockchain. However, this feature is not desirable for various cases, especially in decentralized learning
with highly confidential data such as medical records, biometric data, employee data, sexual orientation,
philosophical beliefs, and so forth. For these reasons, the relationship between the data used in training
and the owner needs to be obscured. This research explores the techniques of privacy preservation
for cross-silo decentralized learning in untrusted wireless networks. We investigate the application of
decentralized transactions such as decentralized learning by referring to the federated learning principles
(developed by the Google AI team) [16] as a case study for an incentive scheme running on blockchain
SCs. We also analyze the extant protocols in enabling reliable and intelligent system orchestration for 5G
networks and beyond running on a mobile edge computing architecture, AI, and blockchain technology.
An untraceable incentive mechanism based on the data used by leveraging Ethereum smart contracts is
also detailed. A proportional incentive scheme can trigger the entities to contribute to maintaining cross-
silo DL transactions continuously. All processes within decentralized transactions are unlinkable to the
parties. In short, the transactions occur without revealing parties’ information values, which is a part of
privacy-awareness in decentralized approaches.
The rest of this paper is arranged as follows. Section 2 presents an in-depth overview of distributed
ledger technology with a public ledger embodying transaction records along with blockchain application
in the cross-silo decentralized learning (the new technology of trust). The motivation of the paper is
outlined in Section 3. Whilst Section 4 elaborates on the privacy awareness in decentralized approaches
and the linkability concerns in the smart contracts as a revenue mechanism. We also describe the potential
vulnerabilities and defenses in this section. A concrete scheme of secure decentralized transactions is
detailed in Section 5. Finally, we draw some concluding remarks in Section 6.
2
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
2 Blockchain Insights and Cross-Silo Decentralized Learning
This section provides the essential background related to the decentralized ledger, blockchain tables, and
decentralized learning. These approaches are pioneers of the new technology of trust where decentral-
ization is a fundamental component. The implementation of blockchain in decentralized collaborative
learning is also detailed.
2.1 The New Technology of Trust
Blockchain smart contract removes trade or service agreement from the realm of static documents that
require human management. Smart contracts transform into automation tools that manage complex
transactions in the decentralized system. In 2015, Ethereum appeared to the public which adding Turing-
Complete smart contracts to the blockchain. Ethereum performs more complex computations, and it
manages more responses compared to Bitcoin. However, it is not a self-evolving code. Ethereum is
a collection of purely rule-based and recursive programs. A recent study conducted by Kiffer et al.
[20] showed that the smart contract’s diversity is direct copies of other contracts. Moreover, the smart
contracts ecosystem has a considerable lack of diversity since the code is used extensively. Nevertheless,
the concern is gradually tackled since various approaches have risen, including in blending quantum and
cloud computing [8], artificial intelligence (AI), and blockchain smart contracts.
Figure 1: Append-only blockchain tables in general (tamper-resistant property) [1].
Blockchain tables are used to deploy centralized blockchain applications with a central authority,
namely the Oracle database. This centralized form provides an organization with more customizability
and authority to decide who can participate in the network. The authorized users are different database
users who trust the Oracle database to manage tamper-proof blockchain transactions. Compared to fully
decentralized blockchains, this approach is helpful in situations where a higher throughput and lower
latency are favoured over consensus selection. Blockchain tables, in general, provide application trans-
parency security from frauds by other users in the blockchain peer-to-peer network. The frauds can be
recognized by verifying rows in the Oracle table. In this sense, this process re-performs the hash value
and confirms it with the corresponding value stored.
2.2 Blockchain in Cross-Silo DL
Decentralized learning combines decentralized computation and AI learning models to enhance model
training and minimize the risk of privacy breaches in conventional AI techniques. In this context, the
3
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
conventional AI technique, such as machine learning, suffers from severe privacy leakage risk by central-
izing and aggregating the client’s training data that contain private information on a centralized server.
Thus, DL as a decentralized machine learning paradigm allows the clients to collaboratively perform
AI training without giving raw data containing the client’s private information to the central aggregator
[18]. The DL approach empowers the clients to perform a local training model that never leaves their
own devices. In this sense, the client’s raw data is only used to train and update a current global model
and send an updated model to the central aggregator in each iteration. Then, the central aggregator gener-
ates a new global model by aggregating these updated and trained models gathered from the participated
clients to be used in the next iteration. This process is repeated in multiple iterations until the global
model achieves a particular accuracy [2].
Based on application characteristics and client setting, DL is divided into two types, i.e., cross-
device DL and cross-silo DL. Cross-device DL admits a massive number of clients to participate in
model training. Currently, this setting has been widely deployed in consumer digital products, such as
Gboard mobile keyboards [15], Android Message [45], and Pixel phones. Contrary, in the context of
client setting, cross-silo DL relatively provides only a small number of clients by promising better client
reliability and data availability than cross-device DL. In this sense, cross-silo DL ensures that all clients
are almost always available and relatively few failures. Further, cross-silo DL can be relevant for sharing
incentives among clients who train the model using their data for system improvement.
Although cross-silo DL brings several advantages, the existing framework still potentially experi-
ences various adversarial attacks and concerns, including malicious clients and false data, a single point
of failure (SPoF) issue, and the lack of incentives. In order to address these challenges, several works
have been proposed the notion of merging the merits of blockchain and DL for the next-generation wire-
less network [41]. The blockchain-assisted DL approach is used to enhance client privacy and security
by recording transactions in immutable distributed ledger networks as well as improving model training
in a decentralized manner. Blockchain also might replace the aggregation server in cross-silo DL, which
means blockchain nodes can perform the global model aggregation task. Furthermore, blockchain with
SC features can be deployed as an incentive mechanism to motivate clients to collaborate on the global
model improvement using their local data.
3 Motivation
Most of the prior studies have been particularly focused on utilizing public blockchain platforms for
various use cases with transparency property. Some researches have either emphasized the merits of
blockchain smart contract [3, 29, 4], or utilized blockchain security as presented in [13, 25]. Blockchain
technology as an incentive mechanism with different platforms are also deployed in [35, 19, 42]. Nev-
ertheless, the additional security protocols that can be adjusted to the system requirements are rare to
be discussed, especially for sensitive data. The selected studies of previous researches in chronological
order can be seen in Table 1 that also summarizes the existing methods and highlights the importance of
our study in the matter of cross-silo distributed learning environment.
This research aims to bridge the gap by utilizing Monero (XMR) protocols in any decentralized trans-
actions activities. This research emphasizes the present state of the Ethereum blockchain smart contract
as a backbone technology in conducting decentralized transactions over peer-to-peer networks. Smart
contracts are self-executing contracts with irreversible data records that can be a plausible solution in
propagating incentives within distributed learning schemes. However, the two-phase commit designed
between users and model providers through the blockchain environment could violate users’ privacy
contrary to the principal objective of DL. Hence, by adopting inference attacks, the observer can infer
and link specific data features of the private dataset. This research investigates several pseudonymiza-
4
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Table 1: Summary of previous researches in chronological order.
Research Paper Year Objective Demerit Significance of the Study
Rahmadika and
Rhee [37]
2021 Untraceable transactions in the
cross-silo federated learning
Centralized aggregation server
(irreplacable)
Empirical benchmark
Rahmadika, Fir-
daus et al. [34]
2021 An intelligent cross-silo FL
based on distributed ledger
For general use cases only
(specific assumption)
Empirical and perfor-
mance benchmark
Shuaicheng et al.
[28]
2021 Privacy model for federated
learning running on BC
Impractical for several use
cases
Security and privacy
trade-offs
Ayaz et al. [3] 2021 BC and FL for message dis-
semination in VANETs
Linkability concerns in com-
munication exchanges
Unlinkable techniques
Mahmood and
Jusas [29]
2021 BC and FL adoption for classi-
fication problems
BC platform’s performances
are not defined
Performance benchmark
Qu and Wang et
al. [33]
2021 FL adoption as a PoW consen-
sus in blockchain
BC hardfork / radical changes
are required
Separation practices
benchmark studies
Feng et al. [13] 2021 Blockchain to provide security
in the MEC system
Transparency and untraceabil-
ity issues
Untraceable incentive
mechanism
Rahmadika and
Rhee [35]
2020 Reliable FL with blockchain-
based incentive
Impractical to be adopted in the
smart contract
Performance benchmark
and evaluation
Zhang et al. [46] 2020 BC with FL for device failure
detection in industrial IoT
Encryption techniques are not
elaborated
Privacy-preserving proto-
cols
Rehman et al.
[43]
2020 Blockchain-based reputation-
aware fine-grained FL (trust-
worthy FL in MEC system)
Impractical to be adopted in the
smart contract
Benchmark problems -
centralized aggregation
server/data centers
Khan et al. [19] 2020 Resource optimization and dis-
tributed reward
Linkable-reward mechanism Untraceability features
are required
Kumar et al. [25] 2020 Enhancing privacy in BC en-
abled FL
BC’s performances were not
elaborated
Performance benchmark
and evaluation
Bao and Su et al.
[4]
2019 A healthy marketplace with BC
and collaborative training
Undefined privacy-preserving
protocol and training auditing
Privacy preservation pro-
tocols
Kang et al. [17] 2019 Reliable FL reliable with mul-
tiweight suebjective logic
Privacy-awareness is beyond
the research
Empirical analysis
Toyoda et al. [42] 2019 An incentive-aware BC with
FL (incentive compatibility)
Key idea and design (theoreti-
cally)
Performance benchmark
& evaluation
tion techniques in obscuring decentralized transactions on the peer-to-peer network. This research also
outlines several points related to the concept, design and linkability issues of implemented schemes.
4 Privacy Awareness in Decentralized Approaches
First, this section delivers privacy awareness in decentralized approaches by stating the current state of
the blockchain-based decentralized learning environment. The existing contemporary works are also
presented. At the end of this section, the linkability concerns of decentralized learning with blockchain-
based incentive mechanisms are also discussed. We also highlight some research questions.
4.1 Blockchain-based Decentralized Learning
The conventional DL approach still faces several challenges that need to be addressed, especially in
privacy problems, such as membership inference attacks, data poisoning attacks, malicious clients, dis-
honest central aggregator servers, and the possibility of SPoF occurring. In the membership inference
5
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
attack, attackers might perform reverse engineering to gather the client’s private data by leveraging the
updated model training. In contrast, a poisoning attack affects the global model by sending the malicious
updated models during the collaborative training phase. Furthermore, the central aggregator responsi-
ble for managing whole system orchestration has trouble addressing crucial challenges associated with
the SPoF issue, which may cause the risk of client information being possibly exposed. As a result,
the clients could be reluctant to participate in improving the cross-silo DL system. On the other hand,
blockchain is an open database that guarantees data security by supporting trustworthy and anonymous
transactions without requiring any intermediaries. Moreover, those transactions are recorded on the dis-
tributed and immutable ledger [14]. Therefore, blockchain has also been exploited to tackle the several
flaws of conventional DL, as mentioned above. We investigate that the blockchain-based DL approach
has at least the following advantages:
(i) Blockchain can avoid SPoF and achieve decentralization by replacing the aggregation server (cen-
tralized approach) and allowing more than one blockchain node to execute the model aggregation
to be the global model in the cross-silo DL system.
(ii) The verification mechanism in the blockchain system can filter unreliable data from malicious
clients or other attacks (e.g., inference membership attack and data poisoning attack) before it is
stored and aggregated to be a global model. In this sense, only valid data will be aggregated to the
global model, while the unreliable data of local model updates will be detected in the verification
mechanism.
(iii) Blockchain can provide decentralized transactions, which means all transactions are marked with a
timestamp, and then a particular consensus mechanism validates and stores the verified transaction
on the distributed database network. Hence, the system allows all involved participants in the
blockchain network to obtain an updated ledger automatically.
(iv) Blockchain with SC can be deployed to address the lack of incentives as one of the flaws in con-
ventional cross-silo DL. Here, blockchain can be utilized to distribute incentives (i.e., rewards) to
clients. Thus, the incentive mechanism can encourage the clients to honestly contribute to training
their data using their computational resources to improve the global model.
The blockchain-based DL has been mentioned in various current existing works. In [27], the BLADE-
FL framework is proposed, which aims to deploy the fully decentralized model aggregation. Moreover,
this framework provides a reliable learning environment by encouraging a self-motivated approach for
clients. The smart contract is designed to integrate clients’ mining and training tasks to calculate and
update a global model. BlockFL architecture is proposed by Kim et al. [21] that focuses on providing
a decentralized manner by removing the aggregation server. BlockFL, as the combination of blockchain
and FL, is used to verify and exchange the local model updates generated by clients without coordination
from a centralized server. Figure 2 illustrates the framework of conventional DL and blockchain-based
DL. In general, as shown in Figure 2(b), blockchain-based DL allows the client to perform local model
training and verify the updated models to generate the global model in a decentralized manner. Weng
et al. [44] proposed DeepChain as a fair, secure, and distributed protocol by providing an incentive
mechanism based on blockchain to motivate clients to behave correctly in the system. DeepChain pro-
tocol requires every user to state their asset to access the system and perform their task to train the DL
model collaboratively. In this regard, users UE xnsend the asset transaction T x U Exn(Asset )using their
pseudonymous address public key PK UE xnto prove their asset U ExnAsset ownership (see formula
6
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Figure 2: (a) Conventional decentralized learning; (b) Blockchain-based decentralized learning.
[44]).
T x U E xn(Asset)=PK UExnPKUExnAsset =PubKeyHash(UE xnAsset),
αjUExn=Hash(j).PubKeyHash(UE xnAsset)H ash(UE xnAsset),Asset desc,
where PK U ExnPubKey1Sec UE x ,PubKey2Sec U Ex, ...,PubKeynSec U E x
(1)
Formula 1 describes the asset statement transaction of UExn. It consists of the client’s asset pseudonym
public key PKUE xnAsset , the proof of UEx’s asset ownership αjUExnand the U E xn’s asset descriptions
Asset desc (e.g., data topic, data format, and data size). Here, PKUE xnAsset and αjUE xnare essential
components that can be utilized to prove the client’s asset ownership and ensure that UExnAsset can
not be revealed. These asset statement components are composed of the collision-resistant hash func-
tion for mapping UE x’s assets Hash(UExnAsset)and the unique-generated public keys PubKey1Sec UE x
with corresponding private keys to maintain pseudonymity. In order to form a fair and secure collabo-
rative transaction, DeepChain proposed a collaborative information commitment including the number
of clients U Exn, index of the current iteration t, the parameter of threshold using Threshold Paillier
algorithm T hresMDL, client’s commitment Commit.Sec , collaborative global model φglb(x), the initial
weights W0,jand the amount of client’s deposit UExcoin. In short, all those information are recorded in
a collaborative transaction and associated with being a collective address PKcollab before uploading it to
DeepChain [44].
T x(collab)=PKcollab UExn,t,T hres(MDL),Commit.Sec ,φglb(x),W0,j,UE xcoin (2)
The fundamental DL model with blockchain-based revenue is shown in Algorithm 1. The high-
level model is divided into three procedures: server update mechanism, user update, and blockchain
revenue. In the server update mechanism, the model provider estimates the number of potential users
Poss.UExnto be included to build the model. Several requirements need to be met, such as device type,
7
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Algorithm 1 Fundamental DL technique with BC-based revenue. BSz is the global batch size; UExnare
users indexed by i; where Min BSz is local minibatch size, Lrate is learning rate, inspired by [23].
1: procedure SERVE RUPDATE MECHANISM:
2: Aggsvr roughly mapping Poss.UExn*aggregation server initialized the potential users
3: for each round t= 1,2, ..., n do
4: Poss.UExnglb maximum(BSz ·UExnPoss.(i,j))
5: Poss.UExn(subset Poss.UE xnglb users) *the users are a subset of total global U Exnavailable
6: for each user iPoss.UExnin parallel do
7: Poss.UExni
tUserUpdate(i,Poss.UExnt)*updated model is based on Poss.UExnglb
8: end for
9: Poss.UExnu1
nt iPoss.U ExnnPoss.UExni
u
10: Aggsvr Poss.UExnt+1=Poss.U Exn +LratePoss.UE xnu*gathering updated gradient
11: end for
12: end procedure
13: procedure USERUPDATE:(i,Poss.UExn)*the updated model is broadcasted to the users
14: //Executes on user i
15: Min BSz (split data iinto batches of size Min BSz)
16: for every local epoch nt from 1 to Edo
17: for batch Min BSz1Min BSz total do
18: Poss.UExni(MDL)Poss.UExni
tPoss.UExnt;*UExnreceive the updated model
19: end for
20: end for
21: return Poss.UExn list to aggregation server Aggsvr
22: end procedure
23: procedure ETHE R REVE NUE(Rv UExn,Rvmg)*incentivized using Ethereum platform
24: Aggsvr collects the list of sender (users) UExn1,U E xn2, ...,U E xn
25: Active miners mg1,mg2,..., mgn
26: for mg1,mg1,...,mgnMinertot ;Aggsvr do
27: Aggsvr ConfirmTransaction H(Poss.UE xn1
t,Poss.UExn2
t,..., Poss.UExnnt
t)
28: *Aggsvr has the list of users
29: *Other miners validate the result till it gets confirmed
30: Rv UExnare given to UExn1,UExn2, ...,U E xn*the rewards are distributed to the users
31: Rvmg are distruted to mg1,mg1,..., mgnMinertot *mining reward for the miners
32: end for
33: end procedure
the network latency, the minimum number of the dataset, and to name a few. The users send the gradient
model back and forth to the model provider after finishing the private training using their dataset. The
users are rewarded through the Ethereum blockchain whenever the UE x’s transactions are satisfied the
requirements. The revenue Rv U E xnbelongs to the data owner, and the revenue Rvmg is mining revenue
for the miners (automatically distributed). We detail this point in Section 5.
4.2 Linkability Concerns at a First Glance
The merits of Ethereum smart contracts can be utilized as a rewarding platform in the DL scheme. It
is irreversible and tamper-proof that can solve the dispute between parties. This section illustrates an
incentive mechanism in distributed learning by leveraging the Ethereum smart contract to tackle the
intermediaries issues in the centralized incentive schemes. Nevertheless, concerns arise if this scheme is
implemented for sensitive data such as health-related data since the gradient values [24] from users are
exposed publicly through the smart contract. The observer can adopt the active and passive inference
attack with certain assumptions to impose training data through gradients value that breaks privacy. We
8
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Figure 3: (a) Accuracy performance of DL learning; (b) The average amount of gas used by devices and
smart contract manager; (c) Inferring the users’ information.
suggest the reader refer to our prior work in [36] to comprehend the DL model setting details. Other
similar attacks and concerns are also described in [40, 10] .
The users are data owners who possess a large amount of private training data, while the model
provider preserves the deep learning model that can be downloaded publicly. The gradient values are
gathered by the provider gradually, which later to be used to compute the aggregation value. The provider
provides Agsvr revenue through smart contracts SCxfor those proven to contribute to improving the
models (using users’ resources). The communication between providers and users is carried out via
two-phase commit transaction. The performance results can be seen in Figure 3 (a) and (b). The overall
results positively recommend that the schemes can be applied to real-world implementation (for non-
sensitive data). However, when the users Dxndeploy the transaction that consists of a cipher to encrypt
the information to the provider, the observer can impose the dataset knowledge by adopting active and
passive inference attacks [30] as shown in Figure 3 (c). Yet, the performance of the adversary decreases
with an increasing number of users. Blockchain can be utilized even further as a decentralized gradient
counter. In this sense, the role of the centralized aggregation server can be replaced with distributed
nodes scattered in the network.
5 Secure Decentralized Transactions
This section presents the techniques in securing decentralized learning transactions where the entities
can securely conduct several activities. The entities’ information remains secret. We also investigate the
pseudonymous rewarding mechanism by utilizing the XMR protocols. In the final section, comparative
analysis are discussed.
5.1 Secure Decentralized Learning Transactions
Privacy preservation and anonymity are the most paramount aspects of decentralized transaction activ-
ities. Peer-to-peer transactions seek to be concealed from the observer’s view, and a distinct difference
resembled the centralized approach. In particular, CryptoNote protocol stated two properties that a fully
anonymous cryptocurrency standard must meet to comply with the requirements presented by Okamoto
and Ohta [31] as follows: (i) Untraceable transactions. For the respectively incoming transactions, the
probability of all potential senders is equiprobable. (ii) Unlinkable transactions. It is extremely hard to
prove whether the same entity sent the two or more outgoing transactions.
9
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Perversely, most decentralized transactions activities from many different platforms do not satisfy
both requirements, especially the untraceability property. Every transaction can be unambiguously traced
to a unique origin and final recipient since the transactions are conducted on the public network. Even
when entities indirectly exchange the data or funds, adequately engineered path-finding algorithms will
expose the source and final recipient. In regards to the cryptocurrency as a reward in DL activities, Bit-
coin does not meet the unlikability property. A sophisticated blockchain analysis can unveil a relationship
between the users of the Bitcoin network and their associated transactions. Therefore, several techniques
have emerged to answer these challenges, such as Monero (XMR), which applies the CryptoNote proto-
col as the backbone of the cryptocurrency. In this research, we utilize some properties of the CryptoNote
protocol to support the pseudonymous of decentralized learning activities.
The first feature begins with modifying the ring signature algorithm, where BPx be the ed25519
basepoint as part of Edwards-curve digital signature algorithms using secure hash algorithms 512 (SHA-
512) and a Curve25519 (q=2255 19)with a twisted Edwards curve shown in formula (3). For detailed
information, we recommend readers refer to fast explicit formulas techniques for group operations on an
Edwards curve, elaborated in [6].
CorX2+CorY 2=1121665
121666 CorX 2·CorY 2,
W here l =2252 +2774231777372353 ... and c =3
CorX =ValU
ValV 4886664,with CorY =ValU 1
ValU +1
(equivalent t o the Montgomery curve)
(3)
We note that every hash value produces a point in accumulating the base point BPx (Hash =ψBPx for
any undefined ψ). Contrary to what occurs in secp256k1 (the curve is leveraged in the Bitcoin cryptocur-
rency). Suppose Commit.(a,CorX) = CorX ·BPx +a·H ash, the commitment to the value awith mask
CorX . We realize that as long as logBPx Hash is defined, while a6=0, then logBPx Commit.(a,CorX )is
remain unspecified. Contrary, with the value of a=0, then logBPx Commit.(a,CorX ) = CorX . In this
sense, it is possible to sign with the secret of sender’s private key. Eventually, the networks can check
whether the input commitments and output commitments are In puts =Out puts. Yet, these proper-
ties are not sufficient in XMR because the given transactions TX s consists of multiple potential inputs
Poss.i,i=1,2,3, ..., n, where only one of which corresponds to the sender. This concern is not expected
because it eliminates the anonymity produced by the ring signatures protocol. Hence, the commitments
are constructed in (4) as follows:
Commit.in puts =CorXcommit.·BPx +a·H ash
Commit.(out put 1)=CorY1·BPx +b1·Hash
Commit.(out put 2)=CorY2·BPx +b2·Hash
Commit.(out put n)=CorYn·BPx +bn·Hash
(4)
The constructed ring signatures protocol consists of all Commit.i,i=1,sec, ..., nwith sec is the
secret key index of the commitment of the sender, defining the corresponding public key. In this sense,
the commitments and public keys are paired (Commit.i,Poss.i); while the subtracting Commit.out is
generated in advance. In this case, the commitments are designed in formula (5). This formula is a ring
signature that can be signed since the senders have knowledge of the private keys. Precisely, due to the
knowledge of private key for Poss.iand the private key for Poss.i+Commit.i,in jCommit.j,out , the
sender can conduct a signature for any desired transactions. The signer can use the formula (5) to sign a
10
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
transaction, as we defined in our previous work in [37].
Poss.(1)+Commit.(1,in)
j
Commit.(j,out ), ..., Poss.(sec)+Commit.(sec,in)
j
Commit.(j,out ), ..., Poss.(n) + Commit.(n,in)
j
Commit.(j,out ).
(5)
DL T xφ1req.
RNGsgn(i,j)RN Gtot v”AND”
T xφnreq.=True thenApprove”; Otherwise :
RNGsgn(i,j)/RNGtotv ”OR”
T xφnreq=False t henDecline
(6)
For ease of understanding, we construct a scenario where the users desire to use a DL model φglb(x)
uploaded onto cloud services. The users are required to deploy a transaction request that states the desired
global model along with relevant information (the model owner governs the necessary inputs). The users
select the number of signatures to be applied to sign a request transaction DL T xφ1req.; where this is
can be understood as a pseudonymous request transaction with an anonymity feature. The model owner
can frequently change the format of transactions, yet the protocols behind the transactions remain the
same. When the model owner receives the DL T xφ1req.sent by users via a secure channel, then the
owner checks the condition of the transaction to confirm the completeness of requirements as defined
in (6). In the first place, the model owner checks the correctness of the ring signatures that he received
beforehand (it belongs to the group or not). The owner repudiates the transactions if one of the conditions
is not satisfied. The models are sent to the users if only conditions in (6) are met.
5.2 Pseudonymous Rewarding Mechanism and Comparative Analysis
In practice, most incentive schemes are centralized where the third party has a vital role in conducting
transactions. The centralized nature is inherent to the single point of failure (SPoF) [39] and bottleneck
issues that jeopardize the system’s root. On the other hand, with its merits, blockchain can be a plausible
solution to tackle the problems since it runs on top of the peer-to-peer network where no single interme-
diary has complete control over transactions. Accordingly, blockchain-based reward mechanisms have
been heavily adopted in many various use cases. For instance, Lin et al. [26] utilized blockchain to
deliver rewards in the energy-knowledge trading environment. In comparison, Chakrabarti et al. [9] pro-
posed a blockchain-based reward scheme for opportunistic disaster communication over a delay tolerant
network. Nevertheless, straightforwardly applying blockchain-based incentives for sensitive informa-
tion is not desirable. This section relies on several XMR protocols’ features to support pseudonymous
rewarding in decentralized learning.
The users are rewarded since they build the DL model collaboratively by broadcasting the updated
gradient values to the model provider. To be incentivized, the sender generates a Diffie-Hellman key
exchange protocol to obtain a shared secret key from his data and half of the recipient’s address. The
users UEx(i,j)are also needed to tender a new transaction via a private Ethereum smart contract. This
transaction is denoted as DL T xφnRwd.that proves the user’s contribution in building a DL model
using their corresponding valuable datasets. The DL T xφnRwd.transaction has a distinguish feature
with DL T xφ1req.transaction, where within DL T xφnRwd.there are a pair of public keys (PubA and
PubB). The first public key PubA is performed by the UE xnusing U Exn’s private key SecA blended with
a base point BPxA;PubA SecA ·BPxA. Similarly, the other public key PubB is generated from a private
key SecB with their respective generator BPxB;PubB SecB ·BPxB. The produced public key must be
11
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Figure 4: Structure of standard transactions.
unique since the private keys are different from others since the generators are also unique SecA 6=SecB
”AND” BPxA6=BPxB.
DL T xφnRwd.=
φglb(in f o)||φu pδ1||δ1knowledge
UExn0s PubKey PubA,PubB (Generated)
{RNGsgn(i,j)RN Gtot 1||SecA} Signed
(7)
Dest.ψ=BPxn+U E XnPubB ·Hash(random UEXnSecA)(8)
Spendψ=S ecB +Hash(SecA ·rand om ·BPXn)(9)
Figure 5: The illustration of distribution points of time spent by UExnto generate a shared public key.
This process is carried out for 50 repetitions for each number of RNGsgn .
Formula (7) represents the UExn’s reward transaction. It consists of the global model of DL’s infor-
mation φglb(in f o), the updated gradient values φu pδ1, and the knowledge of dataset δ1knowledge. The
parameters of the transaction can be adjusted accordingly. The user UExnalso attached a pair of public
keys (PubA and PubB)within transactions which are derived from SecA 6=SecB ”AND” BPxA6=BPxB.
12
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Suppose random =Owner0s random data R=random·BPxnis part of Diffie Hellman exchange prin-
ciple. If DL T xφnRwd .condition is satisfied, the DL model provider can unpack the public key attached
to the transaction. The provider then generates another random base point rb p [1,l1]and manages
the one-time destination key Dest.ψas depicted in 8 to be sent back to the UE xnvia Ethereum smart
contract. The U E xnas a recipient checks every passing blockchain transaction using his private key SecA
and SecB.UExnwill be able to recover the respective one-time private key to spend the Ether since only
UExnknows about SecA and SecB as shown in formula (9). In short, UExnis the only legitimate user.
Table 2: Ethereum daily gas used information (historical total daily).
No. Date (UTC) POSIX time Total Value
1 Jan. 1st, 2021 1609459200 80034402241
2 Feb. 1st, 2021 1612137600 79242528840
3 Mar. 1st, 2021 1614556800 79006491494
4 Apr. 1st, 2021 1617235200 79787949899
5 May. 1st, 2021 1619827200 94431457868
... ... ... ...
9 Sep. 1st, 2021 1630454400 99646996226
10 Oct. 1st, 2021 1633046400 99940537596
Figure 6: The sequence number of 50 shared key generations for each different RNGsgn.
In terms of time spent in generating a shared key for entities is depicted in Figure 5 (XMR-based
protocols). This illustration figure is representative of distribution points of time spent by U E xnin
performing a shared public key to be used to conduct a transaction. For another perspective view, the
transactions in sequential order can be seen in Figure 6. This process is carried out for 50 repetitions
with a varying number of UExn. Suppose user 1 UEx1gathers another public key to create a group
ring of signature. First, UE x1selects one public key of UE x2. He also chooses the other two public
keys (UEx1,U E x2,U Ex3). Finally, for the last transaction, UEx1uses four public keys including himself
13
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Table 3: Performance benchmark with several existing approaches.
Study Year BC Platform Concerns Addressed Unlink. TXs
Our approach 2021 Ethereum Unlinkability TXs and privacy preserv. Yes (Prot.)
Feng et al. [13] 2021 Hyperledger Security and trust issues over MENs Yes (Part.)
Ma et al. [28] 2021 SCx-based Transparency and contribution evaluation N/D
Ayaz et al. [3] 2021 SCx-based Message dissemination in VANETs N/D
Fan et al. [12] 2020 FISCO-BCOS Auditable rational reverse auction N/D
Sandi et al. [35] 2020 Ethereum Commensurate decentralized incentive N/D
Khan et al. [19] 2020 N/D Incentive-based entities interaction N/D
Weng et al. [44] 2019 Corda Decentralized incentive mechanism Yes (Part.)
Prototype (Prot.); Partial (Part.); Not defined (N/D);
(UE x1,U Ex2,U Ex3,and U Ex4).
The average generating time for the first creation (UEx1andU E x1) was 66.415ms, with the fastest
and longest time were 55.876ms and 76.263ms, respectively. The same procedures are applied to the sec-
ond creation, where U E x1selects U Ex1,U Ex2,U Ex3keys. The average generating time was recorded at
74.103ms, with the fastest time was 71.133ms, and the longest time was recorded at 78.274ms. Eventu-
ally, the last recorded generation time of the shared key is carried out by selecting four keys of the users.
The average time was 84.768ms, with the fastest and the longest time were 82.776ms and 86.055ms. The
simulation results show that the more keys involved, the more time it takes to create a shared key. This
concern becomes essential to be taken into account since it directly affects the gas usage in the Ethereum
smart contract transactions. The amount of gas usage continues to increase over time, affecting the gas
limit and gas price. In the end, the uncertainty of the Ethereum gas affects the cost fee per transaction.
Therefore, the effective design of smart contracts is essential. The increasing number of Ethereum gas
usage can be seen in Table 2 that describes the Unix time-stamps and the values. The data was recorded
from January 1st, 2021, up to October 1st, 2021 [38]. We also recommend readers refer to our previous
works in [34] and [37].
Finally, we emphasize the unlinkability feature in decentralized learning transactions with several
existing approaches, as highlighted in Table 3. We limit the transactions into two categories, namely,
a request transaction and distributed reward transaction. Our proposed scheme covers both transactions
where also can be adjusted by following the design requirements. However, we only embed the protocols
into smart contract transactions in a prototype form due to the hard fork concerns that require radical
changes to the entire Ethereum networks. The previous work in [13] and [44] also provided some parts of
privacy techniques in decentralized transactions activity. However, the precise methods of unlinkability
features were not described in the paper. In contrast, other works listed in Table 3 directly adopted the
blockchain and decentralized learning without addressing the linkability issues. This research fills the
current literature gap concerning a recent systematic mapping study to preserve privacy in decentralized
transactions.
6 Conclusion
We have presented and investigated the pseudonymization techniques in decentralized transactions. Cross-
silo distributed learning and blockchain smart contracts emerged as backbone technologies to tackle sev-
eral issues in the centralized system. This investigation becomes essential to be discussed since many
existing schemes only provide privacy protocols, yet the linkability concerns are beyond the topics.
14
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Thus, we utilized the XMR protocols to be adopted into the DL system with a blockchain-based incen-
tive mechanism that can cover many centralized issues. Simulation results and performance benchmarks
indicate that the XMR protocols can be a plausible solution to address the linkability concerns inher-
ent to the public blockchain in general. In order to be fully implemented into the Ethereum network,
a radical change (hard-fork) is required that makes predecessor invalid blocks and transactions become
valid and vice versa. Therefore, we limit this research by implanting the designed protocols into smart
contract transactions, where the protocols can be adjusted proportionately. Apart from the benefits of the
proposed scheme, several points need to be explored further, such as the aggregation server involvement
(irreplaceable), the amount of gas usage in the Ethereum, the devices availability, and to name a few.
These points are part of our research interest for the long run.
Acknowledgments
This research was supported in part by the MSIT(Ministry of Science and ICT), Korea, under the
ITRC(Information Technology Research Center) support program(IITP-2021-2020-0-01797) supervised
by the IITP(Institute for Information & Communications Technology Planning & Evaluation), and in part
by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded
by the Ministry of Education (2021R1I1A304659011).
References
[1] Blockchain table. https://docs.oracle.com/en/database/oracle/oracle-database/ [Online; ac-
cessed on September 20, 2021].
[2] T. T. Anh, N. C. Luong, D. Niyato, D. I. Kim, and L.-C. Wang. Efficient training management for mobile
crowd-machine learning: A deep reinforcement learning approach. IEEE Wireless Communications Letters,
8(5):1345–1348, October 2019.
[3] F. Ayaz, Z. Sheng, D. Tian, and Y. L. Guan. A blockchain based federated learning for message dissemination
in vehicular networks. arXiv preprint arXiv:2109.06667, September 2021.
[4] X. Bao, C. Su, Y. Xiong, W. Huang, and Y. Hu. Flchain: A blockchain for auditable federated learning with
trust and incentive. In Proc. of the 5th International Conference on Big Data Computing and Communications
(BIGCOM’19), Shandong Province, China, pages 151–159. IEEE, August 2019.
[5] D. Berbecaru, A. Lioy, and C. Cameroni. Supporting authorize-then-authenticate for wi-fi access based
on an electronic identity infrastructure. Journal of Wireless Mobile Networks, Ubiquitous Computing, and
Dependable Applications, 11(2):34–54, June 2020.
[6] D. J. Bernstein and T. Lange. Faster addition and doubling on elliptic curves. In Proc. of the 2007 Interna-
tional Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’07),
Kuching, Malaysia, volume 4833 of Lecture Notes in Computer Science, pages 29–50. Springer, Berlin,
Heidelberg, December 2007.
[7] A. N. Bhagoji, S. Chakraborty, P. Mittal, and S. Calo. Analyzing federated learning through an adversarial
lens. In Proc. of the 36th International Conference on Machine Learning (ICML’19), California, USA,
volume 97, pages 634–643. PMLR, June 2019.
[8] D. Caputo, L. Verderame, A. Ranieri, A. Merlo, and L. Caviglione. Fine-hearing google home: why silence
will not protect your privacy. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable
Applications, 11(1):35–53, March 2020.
[9] C. Chakrabarti and S. Basu. A blockchain based incentive scheme for post disaster opportunistic commu-
nication over dtn. In Proc. of the 20th International Conference on Distributed Computing and Networking
(ICDCN’19), Bangalore, India, pages 385–388. ACM, January 2019.
[10] R. Chen, J. Guo, D.-C. Wang, J. J. Tsai, H. Al-Hamadi, and I. You. Trust-based service management for
mobile cloud iot systems. IEEE transactions on network and service management, 16(1):246–263, December
2018.
15
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
[11] A. De Villiers and P. Cuffe. A three-tier framework for understanding disruption trajectories for blockchain
in the electricity industry. IEEE Access, 8:65670–65682, March 2020.
[12] S. Fan, H. Zhang, Y. Zeng, and W. Cai. Hybrid blockchain-based resource trading system for federated
learning in edge computing. IEEE Internet of Things Journal, 8(4):2252–2264, October 2020.
[13] L. Feng, Z. Yang, S. Guo, X. Qiu, W. Li, and P. Yu. Two-layered blockchain architecture for federated
learning over mobile edge network. IEEE Network, Early Access:1–14, January 2021.
[14] M. Firdaus, S. Rahmadika, and K.-H. Rhee. Decentralized trusted data sharing management on internet of
vehicle edge computing (iovec) networks using consortium blockchain. Sensors, 21(7):2410, March 2021.
[15] A. Hard, K. Rao, R. Mathews, S. Ramaswamy, F. Beaufays, S. Augenstein, H. Eichner, C. Kiddon, and
D. Ramage. Federated learning for mobile keyboard prediction. arXiv preprint arXiv:1811.03604, November
2018.
[16] R. Kanagavelu, Z. Li, J. Samsudin, Y. Yang, F. Yang, R. S. M. Goh, M. Cheah, P. Wiwatphonthana,
K. Akkarajitsakul, and S. Wang. Two-phase multi-party computation enabled privacy-preserving federated
learning. In Proc. of the 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing
(CCGRID’20), Melbourne, Victoria, Australia, pages 410–419. IEEE, May 2020.
[17] J. Kang, Z. Xiong, D. Niyato, S. Xie, and J. Zhang. Incentive mechanism for reliable federated learning: A
joint optimization approach to combining reputation and contract theory. IEEE Internet of Things Journal,
6(6):10700–10714, September 2019.
[18] J. Kang, Z. Xiong, D. Niyato, Y. Zou, Y. Zhang, and M. Guizani. Reliable federated learning for mobile
networks. IEEE Wireless Communications, 27(2):72–80, February 2020.
[19] L. U. Khan, S. R. Pandey, N. H. Tran, W. Saad, Z. Han, M. N. Nguyen, and C. S. Hong. Federated learning
for edge networks: Resource optimization and incentive mechanism. IEEE Communications Magazine,
58(10):88–93, November 2020.
[20] L. Kiffer, D. Levin, and A. Mislove. Analyzing ethereum’s contract topology. In Proc. of the 2018 Inter-
net Measurement Conference 2018 (IMC’18), Boston, Massachusetts, USA, pages 494–499. ACM, October
2018.
[21] H. Kim, J. Park, M. Bennis, and S.-L. Kim. Blockchained on-device federated learning. IEEE Communica-
tions Letters, 24(6):1279–1283, June 2019.
[22] A. Koloskova, S. U. Stich, and M. Jaggi. Decentralized stochastic optimization and gossip algorithms with
compressed communication. arXiv preprint arXiv:1902.00340, February 2019.
[23] J. Koneˇ
cn`
y, H. B. McMahan, F. X. Yu, P. Richt´
arik, A. T. Suresh, and D. Bacon. Federated learning:
Strategies for improving communication efficiency. https://arxiv.org/abs/1610.05492, October 2016.
[24] P. Kumar, S. Garg, A. Singh, S. Batra, N. Kumar, and I. You. Mvo-based 2-d path planning scheme for
providing quality of service in uav environment. IEEE Internet of Things Journal, 5(3):1698–1707, January
2018.
[25] S. Kumar, S. Dutta, S. Chatturvedi, and M. Bhatia. Strategies for enhancing training and privacy in blockchain
enabled federated learning. In Proc. of the 6th IEEE International Conference on Multimedia Big Data
(BigMM’20), New Delhi, India, pages 333–340. IEEE, September 2020.
[26] X. Lin, J. Li, J. Wu, H. Liang, and W. Yang. Making knowledge tradable in edge-ai enabled iot: A con-
sortium blockchain-based efficient and incentive approach. IEEE Transactions on Industrial Informatics,
15(12):6367–6378, May 2019.
[27] C. Ma, J. Li, M. Ding, L. Shi, T. Wang, Z. Han, and H. V. Poor. When federated learning meets blockchain:
A new distributed learning paradigm. arXiv preprint arXiv:2009.09338, September 2020.
[28] S. Ma, Y. Cao, and L. Xiong. Transparent contribution evaluation for secure federated learning on blockchain.
In Proc. of the 37th IEEE International Conference on Data Engineering Workshops (ICDEW’21), Chania,
Greece, pages 88–91. IEEE, April 2021.
[29] Z. Mahmood and V. Jusas. Implementation framework for a blockchain-based federated learning model for
classification problems. Symmetry, 13(7):1116, June 2021.
[30] L. Melis, C. Song, E. De Cristofaro, and V. Shmatikov. Exploiting unintended feature leakage in collaborative
learning. In Proc. of the 2019 IEEE Symposium on Security and Privacy (SP’19), San Francisco, California,
USA, pages 691–706. IEEE, May 2019.
16
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
[31] T. Okamoto and K. Ohta. Universal electronic cash. In Proc. of the 1991 Annual international cryptol-
ogy conference (CRYPTO’91), Santa Barbara, California, USA, volume 576 of Lecture Notes in Computer
Science, pages 324–337. Springer, Berlin, Heidelberg, May 1991.
[32] M. Park, S. Kim, and J. Kim. Research on note-taking apps with security features. Journal of Wireless Mobile
Networks, Ubiquitous Computing, and Dependable Applications, 11(4):63–76, December 2020.
[33] X. Qu, S. Wang, Q. Hu, and X. Cheng. Proof of federated learning: A novel energy-recycling consensus
algorithm. IEEE Transactions on Parallel and Distributed Systems, 32(8):2074–2085, August 2021.
[34] S. Rahmadika, M. Firdaus, S. Jang, and K.-H. Rhee. Blockchain-enabled 5g edge networks and beyond: An
intelligent cross-silo federated learning approach. Security and Communication Networks, 2021:1–14, March
2021.
[35] S. Rahmadika and K.-H. Rhee. Reliable collaborative learning with commensurate incentive schemes. In
Proc. of the 2020 IEEE International Conference on Blockchain (Blockchain’20), Rhodes, Greece, pages
496–502. IEEE, November 2020.
[36] S. Rahmadika and K.-H. Rhee. Enhancing data privacy through a decentralised predictive model with
blockchain-based revenue. International Journal of Ad Hoc and Ubiquitous Computing, 37(1):1–15, May
2021.
[37] S. Rahmadika and K.-H. Rhee. Unlinkable collaborative learning transactions: Privacy-awareness in decen-
tralized approaches. IEEE Access, 9:65293–65307, April 2021.
[38] E. Scan. Ethereum daily gas used chart. https://etherscan.io/chart/gasused [Online; accessed on
October 15, 2021], October 2021.
[39] V. Sharma, I. You, and G. Kul. Socializing drones for inter-service operability in ultra-dense wireless net-
works using blockchain. In Proc. of the 2017 international workshop on managing insider security threats
(MIST’17), Dallas, Texas, USA, pages 81–84. ACM, October 2017.
[40] V. Sharma, I. You, K. Yim, R. Chen, and J.-H. Cho. Briot: Behavior rule specification-based misbehavior
detection for iot-embedded cyber-physical systems. IEEE Access, 7:118556–118580, May 2019.
[41] R. Shokri, M. Stronati, C. Song, and V. Shmatikov. Membership inference attacks against machine learning
models. In Proc. of the 2017 IEEE Symposium on Security and Privacy (SP’17), San Jose, California, USA,
pages 3–18. IEEE, May 2017.
[42] K. Toyoda and A. N. Zhang. Mechanism design for an incentive-aware blockchain-enabled federated learning
platform. In Proc. of the 2019 IEEE International Conference on Big Data (Big Data’19), Los Angeles,
California, USA, pages 395–403. IEEE, December 2019.
[43] M. H. ur Rehman, K. Salah, E. Damiani, and D. Svetinovic. Towards blockchain-based reputation-aware
federated learning. In Proc. of the 2020 IEEE Conference on Computer Communications Workshops (INFO-
COM WKSHPS’20), Virtual Conference, pages 183–188. IEEE, July 2020.
[44] J. Weng, J. Weng, J. Zhang, M. Li, Y. Zhang, and W. Luo. Deepchain: Auditable and privacy-preserving
deep learning with blockchain-based incentive. IEEE Transactions on Dependable and Secure Computing,
14(8):1–18, November 2019.
[45] T. Yang, G. Andrew, H. Eichner, H. Sun, W. Li, N. Kong, D. Ramage, and F. Beaufays. Applied federated
learning: Improving google keyboard query suggestions. arXiv preprint arXiv:1812.02903, December 2018.
[46] W. Zhang, Q. Lu, Q. Yu, Z. Li, Y. Liu, S. K. Lo, S. Chen, X. Xu, and L. Zhu. Blockchain-based federated
learning for device failure detection in industrial iot. IEEE Internet of Things Journal, 8(7):5926–5937,
October 2020.
——————————————————————————
17
Pseudonymization Techniques in Decentralized Transactions Sandi and Muhammad et al.
Author Biography
Sandi Rahmadika received the Ph.D. degree from Pukyong National University,
South Korea. He is currently a Postdoctoral Researcher with the Department of Dig-
ital Contents Engineering, Wonkwang University, South Korea. He has authored/co-
authored more than 25 papers in academic conferences and journals. He was the
Track Chair of the International Symposium and Mobile Internet Security (MobiSec)
2021. His research interests include applied cryptography, privacy preservation in the
decentralized system, edge computing, and AI with blockchain integration.
Muhammad Firdaus received his Master of Engineering degree in Telematics and
Telecommunication Networks from Institut Teknologi Bandung (ITB), Indonesia. He
is currently a Ph.D. student and a member of the Laboratory of Information Secu-
rity and Internet Applications (LISIA), Pukyong National University. His research
interests include applied cryptography, blockchain with AI integration, and commu-
nication security.
Yong-Hwan Lee received the MS degree in computer science and PhD in electronics
and computer engineering from Dankook University, Korea, in 1995 and 2007, re-
spectively. He is an active member of International Standard committees of ISO/IEC
JTC1 SC29 responsible for Image Retrieval and Coding issues. Currently, he is a
Professor at the Department of Digital Contents, Wonkwang University, Korea. His
research areas include Image Retrieval, Image Coding, Computer Vision and Pattern
Recognition, Augmented Reality, Mobile Programming and Multimedia Communi-
cation.
Kyung-Hyune Rhee received his M.S. and Ph.D. degrees from the Korea Advanced
Institute of Science and Technology (KAIST), Republic of Korea in 1985 and 1992,
respectively. He worked as a senior researcher at the Electronic and Telecommuni-
cations Research Institute (ETRI), Republic of Korea, from 1985 to 1993. He also
worked as a visiting scholar at the University of Adelaide, University of Tokyo, and
the University of California, Irvine. He has served as a Chairman of the Division of
Information and Communication Technology, Colombo Plan Staff College for Tech-
nician Education in Manila, the Philippines. He is currently a professor in the Department of IT Con-
vergence and Application Engineering, Pukyong National University, Republic of Korea. His research
interests center on security and the evaluation of blockchain technology, key management and its appli-
cations, and AI-enabled security evaluation of cryptographic algorithms.
18
... The inherent design of DApps, aimed at enhancing user privacy and security, creates complexities that traditional investigative approaches may need help to address effectively. In order to combat cybercrime in decentralized applications, a comprehensive strategy and close cooperation between law enforcement agencies and technology providers are essential (Dyson et al., 2019;Rahmadika et al., 2021). While some DApps store data on the blockchain, others may rely on off-chain storage or peer-to-peer networks, making data collection and preservation complex. ...
Article
Full-text available
In the digital age, cybercrime facilitated by anonymous communication apps raises significant concerns. Criminals exploit the anonymity provided by these apps, creating challenges for law enforcement and cybersecurity professionals when investigating and combating cybercrime. The complexity of decentralized applications (DApps) without centralized servers further complicates evidence certification. Although anonymity features to protect privacy, they impede the establishment of connections between digital accounts and real-world identities. In centralized server environments, data access for investigations is relatively straightforward. However, this study reveals that DApps present challenges due to decentralized control, anonymity, encrypted communication, and jurisdictional issues. DApps designed for anonymous communication allow users to interact without revealing their identities, making it challenging to trace criminals. While cybercrime investigations in centralized environments involve systematic evidence collection, correlation, analyzing communication patterns, collaboration with agencies, tracking IP addresses, legal authorization, and forensic analysis of digital devices, DApps-based investigations require vital intelligence gathering through open-source techniques (OSINT). This includes retrieving digital footprints, analyzing social media profiles, and tracing ownership information. Moreover, investigators may exploit human vulnerabilities, engage in deceptive communication, or use social engineering techniques to gather information while carefully considering the balance between user privacy and investigative requirements. In this study, we explore the many facets of anonymity in DApps and what challenges they impose for the investigation of cybercrime. The anonymity of users and their transactions in the context of new blockchain and decentralized technology presents difficulties for law enforcement. In the end, our research helps shed light on the complex relationship between anonymity in decentralized systems and the need for fairness online.
... It is quite evident that cloud service customers (CSC) deploy these services on their networks with their own specifications, based on their past operational experiences and convenience. Some of the leading cloud network environments are Amazon Web Services, Microsoft Azure, IBM Cloud, VMware and Google Cloud [3,4]. ...
Article
Full-text available
Recently, networks have shifted from traditional in-house servers to third-party-managed cloud platforms due to its cost-effectiveness and increased accessibility toward its management. However, the network remains reactive, with less accountability and oversight of its overall security. Several emerging technologies have restructured our approach to the security of cloud networks; one such approach is the zero-trust network architecture (ZTNA), where no entity is implicitly trusted in the network, regardless of its origin or scope of access. The network rewards trusted behaviour and proactively predicts threats based on its users’ behaviour. The zero-trust network architecture is still at a nascent stage, and there are many frameworks and models to follow. The primary focus of this survey is to compare the novel requirement-specific features used by state-of-the-art research models for zero-trust cloud networks. In this manner, the features are categorized across nine parameters into three main types: zero-trust-based cloud network models, frameworks and proofs-of-concept. ZTNA, when wholly realized, enables network administrators to tackle critical issues such as how to inhibit internal and external cyber threats, enhance the visibility of the network, automate the calculation of trust for network entities and orchestrate security for users. The paper further focuses on domain-specific issues plaguing modern cloud computing networks, which leverage choosing and implementing features necessary for future networks and incorporate intelligent security orchestration, automation and response. The paper also discusses challenges associated with cloud platforms and requirements for migrating to zero-trust architecture. Finally, possible future research directions are discussed, wherein new technologies can be incorporated into the ZTA to build robust trust-based enterprise networks deployed in the cloud.
Chapter
In the current era, Blockchain Technology is blooming and growing faster. Blockchain is currently used in soft computing, agriculture, cloud network, healthcare, electronics, and electrical fields. Older technologies are upgraded to increase their reach using Distributed Cloud networks and blockchain. Implementing security for heterogeneous 5G services-based technologies of the MEC is challenging.In this paper, we propose a blockchain-based distributed cloud security solution that uses technologies such as Digital Signature, RSA algorithm, AES encryption, and a Lookup table to improve the security of blockchain and decrease the traversal time of data in the blockchain. This proposed model is adept at solving the primary concern related to storage and confidentiality in a Distributed Cloud environment.KeywordsBlockchainDistributed cloud securityDigital signatureRivest-Shamir-Adleman (RSA) algorithmAdvanced Encryption Standard (AES) algorithm
Article
Full-text available
This paper introduces a blockchain-based federated learning (FL) framework with incentives for participating nodes to enhance the accuracy of classification problems. Machine learning technology has been rapidly developed and changed from a global perspective for the past few years. The FL framework is based on the Ethereum blockchain and creates an autonomous ecosystem, where nodes compete to improve the accuracy of classification problems. With privacy being one of the biggest concerns, FL makes use of the blockchain-based approach to ensure privacy and security. Another important technology that underlies the FL framework is zero-knowledge proofs (ZKPs), which ensure that data uploaded to the network are accurate and private. Basically, ZKPs allow nodes to compete fairly by only submitting accurate models to the parameter server and get rewarded for that. We have conducted an analysis and found that ZKPs can help improve the accuracy of models submitted to the parameter server and facilitate the honest participation of all nodes in FL.
Article
Full-text available
Smart contracts (SCs) and collaborative learning (CL) are disclosed publicly, in which most transactions and activities that occur by the parties can be bared in real-time. Both are strengthened in a decentralized manner. CL allows numerous clients to collectively build deep learning models privately by aggregating the gradient values from clients’ devices, yet it lacks the incentive mechanism for the contributing clients. On the other hand, the merits of SCs can be a plausible solution as an incentive mechanism in the CL system because self-executing contracts with immutable data records are resistant to failure. The clients can claim the rewards by stating their contribution arbitrarily in the SCs and tendering a proof transaction function. Nevertheless, directly adopting SCs in the CL system could breach clients’ privacy because the transactions are exposed openly. The observer can infer the properties of the clients’ resources. Therefore, we designed schemes that can overcome observers’ ability to link clients’ information with their associated devices during training. In essence, our schemes are unbiased. We also provide a secure incentive mechanism for the parties in the CL system by obscuring the information values. Finally, the numerical results indicate that the proposed schemes satisfy the design goals.
Article
Full-text available
The emergence of the Internet of Vehicles (IoV) aims to facilitate the next generation of intelligent transportation system (ITS) applications by combining smart vehicles and the internet to improve traffic safety and efficiency. On the other hand, mobile edge computing (MEC) technology provides enormous storage resources with powerful computing on the edge networks. Hence, the idea of IoV edge computing (IoVEC) networks has grown to be an assuring paradigm with various opportunities to advance massive data storage, data sharing, and computing processing close to vehicles. However, the participant’s vehicle may be unwilling to share their data since the data-sharing system still relies on a centralized server approach with the potential risk of data leakage and privacy security. In addition, vehicles have difficulty evaluating the credibility of the messages they received because of untrusted environments. To address these challenges, we propose consortium blockchain and smart contracts to accomplish a decentralized trusted data sharing management system in IoVEC. This system allows vehicles to validate the credibility of messages from their neighboring by generating a reputation rating. Moreover, the incentive mechanism is utilized to trigger the vehicles to store and share their data honestly; thus, they will obtain certain rewards from the system. Simulation results substantially display an efficient network performance along with forming an appropriate incentive model to reach a decentralized trusted data sharing management of IoVEC networks.
Article
Full-text available
Edge networks (ENs) in 5G have the capability to protect traffic between edge entry points (edge-to-edge), enabling the design of various flexible and customizable applications. The advantage of edge networks is their pioneering integration of other prominent technologies such as blockchain and federated learning (FL) to produce better services on wireless networks. In this paper, we propose an intelligent system integrating blockchain technologies, 5G ENs, and FL to create an efficient and secure framework for transactions. FL enables user equipment (UE) to train the artificial intelligence model without exposing the UE’s valuable data to the public, or to the model providers. Furthermore, the blockchain is an immutable data approach that can be leveraged for FL across 5G ENs and beyond. The recorded transactions cannot be altered maliciously, and they remain unchanged by design. We further propose a dynamic authentication protocol for UE to interact with a diverse base station. We apply blockchain as a reward mechanism in FL to enable computational offloading in wireless networks. Additionally, we implement and investigate blockchain technology for FL in 5G UE.
Article
Full-text available
Abstract--Federated learning (FL) is seen as a road towards privacy-preserving distributed artificial intelligence (AI) while keeping the raw training data on the local device. By leveraging blockchain, this paper puts forward a blockchain and FL fusioned framework to manage the security and trust issues when applying FL over mobile edge networks. First, a two-layered architecture is proposed that consists of two types of blockchains: local model update chain (LMUC) assisted by device-to-device (D2D) communication and global model update chain (GMUC) supporting task sharding. D2D-assisted LMUC is designed to chronologically and efficiently record all of the local model training results, which can help to form a long-term reputation of local devices. The GMUC is proposed to provide both security and efficiency by preventing mobile edge computing (MEC) nodes from malfunctioning and dividing it into logically-isolated FL task-specific chains. Then, a reputation-learning based incentive mechanism is introduced to make the participant local devices more trustful with the reward implemented by a smart contract. Finally, a case study is given to show that the proposed framework performs well in terms of FL learning accuracy and blockchain time delay.
Article
Message exchange among vehicles plays an important role in ensuring road safety. Emergency message dissemination is usually carried out by broadcasting. However, high vehicle density and mobility lead to challenges in message dissemination such as broadcasting storm and low probability of packet reception. This paper proposes a federated learning based blockchain-assisted message dissemination solution. Similar to the incentive-based Proof-of-Work consensus in blockchain, vehicles compete to become a relay node (miner) by processing the proposed Proofof-Federated-Learning (PoFL) consensus which is embedded in the smart contract of blockchain. Both theoretical and practical analysis of the proposed solution are provided. Specifically, the proposed blockchain based federated learning results in more vehicles uploading their models in a given time, which can potentially lead to a more accurate model in less time as compared to the same solution without using blockchain. It also outperforms other blockchain approaches in reducing 65.2% of time delay in consensus, improving at least 8.2% message delivery rate and preserving privacy of neighbour vehicle more efficiently. The economic model to incentivize vehicles participating in federated learning and message dissemination is further analysed using Stackelberg game. The analysis of asymptotic complexity proves PoFL as the most scalable solution compared to other consensus algorithms in vehicular networks.
Article
Federated learning (FL) permits a vast number of connected to construct deep learning models while keeping their private training data on the device. Rather than uploading the training data and model to the server, FL only sends the local gradients gradually. Hence, FL preserves data privacy by design. FL leverages a decentralized approach where the training data is no longer concentrated. Similarly, blockchain uses the same approach by providing a digital ledger that can cover the flaws in the centralized system. Motivated by the merits of a decentralized approach, we construct a collaborative model of simultaneous distributed learning by employing multiple computing devices over shared memory with blockchain smart contracts as a secure incentive mechanism. The collaborative model preserves a value-driven of distributed learning in enhancing users' privacy. It is supported by blockchain with a secure decentralized incentive technique without having a single point of failure. Furthermore, potential vulnerabilities and plausible defenses are also outlined. The experimental results positively recommend that the collaborative model satisfies the design goals.
Article
Proof of work (PoW), the most popular consensus mechanism for Blockchain, requires ridiculously large amounts of energy but without any useful outcome beyond determining accounting rights among miners. To tackle the drawback of PoW, we propose a novel energy-recycling consensus algorithm, namely proof of federated learning (PoFL), where the energy originally wasted to solve difficult but meaningless puzzles in PoW is reinvested to federated learning. Federated learning and pooled-mining, a trend of PoW, have a natural fit in terms of organization structure. However, the separation between the data usufruct and ownership in Blockchain lead to data privacy leakage in model training and verification, deviating from the original intention of federal learning. To address the challenge, a reverse game-based data trading mechanism and a privacy-preserving model verification mechanism are proposed. The former can guard against training data leakage while the latter verifies the accuracy of a trained model with privacy preservation of the task requester's test data as well as the pool's submitted model. To the best of our knowledge, our paper is the first work to employ federal learning as the proof of work for Blockchain. Extensive simulations demonstrate the effectiveness and efficiency of our proposed mechanisms.