Authenticating Spatial Queries on Blockchain Systems

In many blockchain networks, light nodes (e.g. mobile clients) with few computational resources must rely on more powerful full nodes to retrieve transactions from the chain. However, in this untrusted environment a malicious full node could deliver altered or incomplete information, requiring query...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2021, Vol.9, p.163363-163378
Hauptverfasser: Loporchio, Matteo, Bernasconi, Anna, Maesa, Damiano Di Francesco, Ricci, Laura
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 163378
container_issue
container_start_page 163363
container_title IEEE access
container_volume 9
creator Loporchio, Matteo
Bernasconi, Anna
Maesa, Damiano Di Francesco
Ricci, Laura
description In many blockchain networks, light nodes (e.g. mobile clients) with few computational resources must rely on more powerful full nodes to retrieve transactions from the chain. However, in this untrusted environment a malicious full node could deliver altered or incomplete information, requiring query authentication techniques to ensure the integrity of the results. To this aim, we study an authentication mechanism for spatial information (i.e. data representing the location, size, and shape of objects in a geographical coordinate system). We assume that light nodes issue range queries to obtain data from a single block. To enable authentication, we propose to construct a Merkle R-tree for each block and embed its root into the corresponding header, so that full nodes can exploit it to fetch information and construct a proof of integrity for lightweight clients. We also develop a new algorithm based on sorting and partitioning for constructing Merkle R-trees from a set of spatial transactions and employ space-filling curves to preserve the locality of elements. We examine its theoretical complexity, evaluate it experimentally on a real data set and compare it against other popular construction strategies. Results show that, as queries become more selective, trees generated with our solution improve query performance and reduce verification times with respect to other approaches. Moreover, we observe that the overhead induced by the tree construction is negligible if compared to the average inter-block time of popular blockchain protocols such as Bitcoin and Ethereum.
doi_str_mv 10.1109/ACCESS.2021.3132990
format Article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_9638515</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9638515</ieee_id><doaj_id>oai_doaj_org_article_4370943383964c97b7f9cdc5d274c0b3</doaj_id><sourcerecordid>2610984339</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-ce133fdb71a440858e550fe89fdf50b0971a96269ac9483d12fb889eea6943623</originalsourceid><addsrcrecordid>eNpNkF9LwzAUxYMoOOY-wV4KPnfmf5PHWaYOBiLV55Cm6dbZNTNpH_btzewY3pd7Obm_k8sBYI7gAiEon5Z5viqKBYYYLQgiWEp4AyYYcZkSRvjtv_kezELYw1giSiybALoc-p3t-sbovum2SXGMXbfJx2B9Y0PiuuS5debb7HTTJcUp9PYQHsBdrdtgZ5c-BV8vq8_8Ld28v67z5SY1FIo-NRYRUldlhjSNAhOWMVhbIeuqZrCEMj5IjrnURlJBKoTrUghpreaSEo7JFKxH38rpvTr65qD9STndqD_B-a3SPp7eWkVJBiNEBJGcGpmVWS1NZViFM2pgSaLX4-h19O5nsKFXezf4Lp6vMI8xigjLuEXGLeNdCN7W118RVOe01Zi2OqetLmlHaj5SjbX2SkhOBEOM_AKpOXji</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2610984339</pqid></control><display><type>article</type><title>Authenticating Spatial Queries on Blockchain Systems</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Loporchio, Matteo ; Bernasconi, Anna ; Maesa, Damiano Di Francesco ; Ricci, Laura</creator><creatorcontrib>Loporchio, Matteo ; Bernasconi, Anna ; Maesa, Damiano Di Francesco ; Ricci, Laura</creatorcontrib><description>In many blockchain networks, light nodes (e.g. mobile clients) with few computational resources must rely on more powerful full nodes to retrieve transactions from the chain. However, in this untrusted environment a malicious full node could deliver altered or incomplete information, requiring query authentication techniques to ensure the integrity of the results. To this aim, we study an authentication mechanism for spatial information (i.e. data representing the location, size, and shape of objects in a geographical coordinate system). We assume that light nodes issue range queries to obtain data from a single block. To enable authentication, we propose to construct a Merkle R-tree for each block and embed its root into the corresponding header, so that full nodes can exploit it to fetch information and construct a proof of integrity for lightweight clients. We also develop a new algorithm based on sorting and partitioning for constructing Merkle R-trees from a set of spatial transactions and employ space-filling curves to preserve the locality of elements. We examine its theoretical complexity, evaluate it experimentally on a real data set and compare it against other popular construction strategies. Results show that, as queries become more selective, trees generated with our solution improve query performance and reduce verification times with respect to other approaches. Moreover, we observe that the overhead induced by the tree construction is negligible if compared to the average inter-block time of popular blockchain protocols such as Bitcoin and Ethereum.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2021.3132990</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Bitcoin ; Blockchain ; Blockchains ; Clients ; Coordinates ; Cryptography ; Data structures ; Integrity ; Merkle R-tree ; Mobile computing ; Nodes ; Queries ; query authentication ; Sorting ; Sorting algorithms ; space-filling curve ; Spatial data ; Spatial databases ; Trees</subject><ispartof>IEEE access, 2021, Vol.9, p.163363-163378</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-ce133fdb71a440858e550fe89fdf50b0971a96269ac9483d12fb889eea6943623</citedby><cites>FETCH-LOGICAL-c408t-ce133fdb71a440858e550fe89fdf50b0971a96269ac9483d12fb889eea6943623</cites><orcidid>0000-0002-9806-6475 ; 0000-0003-0263-5221 ; 0000-0002-8179-8215</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9638515$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,864,2102,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Loporchio, Matteo</creatorcontrib><creatorcontrib>Bernasconi, Anna</creatorcontrib><creatorcontrib>Maesa, Damiano Di Francesco</creatorcontrib><creatorcontrib>Ricci, Laura</creatorcontrib><title>Authenticating Spatial Queries on Blockchain Systems</title><title>IEEE access</title><addtitle>Access</addtitle><description>In many blockchain networks, light nodes (e.g. mobile clients) with few computational resources must rely on more powerful full nodes to retrieve transactions from the chain. However, in this untrusted environment a malicious full node could deliver altered or incomplete information, requiring query authentication techniques to ensure the integrity of the results. To this aim, we study an authentication mechanism for spatial information (i.e. data representing the location, size, and shape of objects in a geographical coordinate system). We assume that light nodes issue range queries to obtain data from a single block. To enable authentication, we propose to construct a Merkle R-tree for each block and embed its root into the corresponding header, so that full nodes can exploit it to fetch information and construct a proof of integrity for lightweight clients. We also develop a new algorithm based on sorting and partitioning for constructing Merkle R-trees from a set of spatial transactions and employ space-filling curves to preserve the locality of elements. We examine its theoretical complexity, evaluate it experimentally on a real data set and compare it against other popular construction strategies. Results show that, as queries become more selective, trees generated with our solution improve query performance and reduce verification times with respect to other approaches. Moreover, we observe that the overhead induced by the tree construction is negligible if compared to the average inter-block time of popular blockchain protocols such as Bitcoin and Ethereum.</description><subject>Authentication</subject><subject>Bitcoin</subject><subject>Blockchain</subject><subject>Blockchains</subject><subject>Clients</subject><subject>Coordinates</subject><subject>Cryptography</subject><subject>Data structures</subject><subject>Integrity</subject><subject>Merkle R-tree</subject><subject>Mobile computing</subject><subject>Nodes</subject><subject>Queries</subject><subject>query authentication</subject><subject>Sorting</subject><subject>Sorting algorithms</subject><subject>space-filling curve</subject><subject>Spatial data</subject><subject>Spatial databases</subject><subject>Trees</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNkF9LwzAUxYMoOOY-wV4KPnfmf5PHWaYOBiLV55Cm6dbZNTNpH_btzewY3pd7Obm_k8sBYI7gAiEon5Z5viqKBYYYLQgiWEp4AyYYcZkSRvjtv_kezELYw1giSiybALoc-p3t-sbovum2SXGMXbfJx2B9Y0PiuuS5debb7HTTJcUp9PYQHsBdrdtgZ5c-BV8vq8_8Ld28v67z5SY1FIo-NRYRUldlhjSNAhOWMVhbIeuqZrCEMj5IjrnURlJBKoTrUghpreaSEo7JFKxH38rpvTr65qD9STndqD_B-a3SPp7eWkVJBiNEBJGcGpmVWS1NZViFM2pgSaLX4-h19O5nsKFXezf4Lp6vMI8xigjLuEXGLeNdCN7W118RVOe01Zi2OqetLmlHaj5SjbX2SkhOBEOM_AKpOXji</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Loporchio, Matteo</creator><creator>Bernasconi, Anna</creator><creator>Maesa, Damiano Di Francesco</creator><creator>Ricci, Laura</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-9806-6475</orcidid><orcidid>https://orcid.org/0000-0003-0263-5221</orcidid><orcidid>https://orcid.org/0000-0002-8179-8215</orcidid></search><sort><creationdate>2021</creationdate><title>Authenticating Spatial Queries on Blockchain Systems</title><author>Loporchio, Matteo ; Bernasconi, Anna ; Maesa, Damiano Di Francesco ; Ricci, Laura</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-ce133fdb71a440858e550fe89fdf50b0971a96269ac9483d12fb889eea6943623</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Authentication</topic><topic>Bitcoin</topic><topic>Blockchain</topic><topic>Blockchains</topic><topic>Clients</topic><topic>Coordinates</topic><topic>Cryptography</topic><topic>Data structures</topic><topic>Integrity</topic><topic>Merkle R-tree</topic><topic>Mobile computing</topic><topic>Nodes</topic><topic>Queries</topic><topic>query authentication</topic><topic>Sorting</topic><topic>Sorting algorithms</topic><topic>space-filling curve</topic><topic>Spatial data</topic><topic>Spatial databases</topic><topic>Trees</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Loporchio, Matteo</creatorcontrib><creatorcontrib>Bernasconi, Anna</creatorcontrib><creatorcontrib>Maesa, Damiano Di Francesco</creatorcontrib><creatorcontrib>Ricci, Laura</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Loporchio, Matteo</au><au>Bernasconi, Anna</au><au>Maesa, Damiano Di Francesco</au><au>Ricci, Laura</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Authenticating Spatial Queries on Blockchain Systems</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2021</date><risdate>2021</risdate><volume>9</volume><spage>163363</spage><epage>163378</epage><pages>163363-163378</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>In many blockchain networks, light nodes (e.g. mobile clients) with few computational resources must rely on more powerful full nodes to retrieve transactions from the chain. However, in this untrusted environment a malicious full node could deliver altered or incomplete information, requiring query authentication techniques to ensure the integrity of the results. To this aim, we study an authentication mechanism for spatial information (i.e. data representing the location, size, and shape of objects in a geographical coordinate system). We assume that light nodes issue range queries to obtain data from a single block. To enable authentication, we propose to construct a Merkle R-tree for each block and embed its root into the corresponding header, so that full nodes can exploit it to fetch information and construct a proof of integrity for lightweight clients. We also develop a new algorithm based on sorting and partitioning for constructing Merkle R-trees from a set of spatial transactions and employ space-filling curves to preserve the locality of elements. We examine its theoretical complexity, evaluate it experimentally on a real data set and compare it against other popular construction strategies. Results show that, as queries become more selective, trees generated with our solution improve query performance and reduce verification times with respect to other approaches. Moreover, we observe that the overhead induced by the tree construction is negligible if compared to the average inter-block time of popular blockchain protocols such as Bitcoin and Ethereum.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2021.3132990</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-9806-6475</orcidid><orcidid>https://orcid.org/0000-0003-0263-5221</orcidid><orcidid>https://orcid.org/0000-0002-8179-8215</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2021, Vol.9, p.163363-163378
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_9638515
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals
subjects Authentication
Bitcoin
Blockchain
Blockchains
Clients
Coordinates
Cryptography
Data structures
Integrity
Merkle R-tree
Mobile computing
Nodes
Queries
query authentication
Sorting
Sorting algorithms
space-filling curve
Spatial data
Spatial databases
Trees
title Authenticating Spatial Queries on Blockchain Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T06%3A28%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Authenticating%20Spatial%20Queries%20on%20Blockchain%20Systems&rft.jtitle=IEEE%20access&rft.au=Loporchio,%20Matteo&rft.date=2021&rft.volume=9&rft.spage=163363&rft.epage=163378&rft.pages=163363-163378&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2021.3132990&rft_dat=%3Cproquest_ieee_%3E2610984339%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2610984339&rft_id=info:pmid/&rft_ieee_id=9638515&rft_doaj_id=oai_doaj_org_article_4370943383964c97b7f9cdc5d274c0b3&rfr_iscdi=true