Blockchain-Based Verifiable Computation: A Review
DOI:
https://doi.org/10.53560/PPASA(61-2)850Keywords:
Blockchain, Verifiable Computation, Smart Contract, Privacy, Security, EthereumAbstract
Verifiable computation has been studied as a way to verify the outcomes of an outsourced computation. It
is usually seen from the view of a user who wishes to outsource computation to a centralized third party but wants
to ensure that the party provides correct results. With the said scheme, the verifier requests the prover to perform the computational task and then verifies the outcome by checking the output and the proof obtained from the prover. However, there are several security challenges within a centralized third party to execute verification tasks. Recently, the advancement in blockchain technology has offered an opportunity to solve these security challenges. Blockchain is a distributed ledger and decentralized technology that eliminates the need for third-party verification. In recent years, the emergence of innovative applications of verifiable computing techniques within blockchain technology has been witnessed. These applications focus on ensuring secure key management, enhancing smart contracts, and fortifying sybil-resistance. The use of blockchain in the realm of verifiable computing has drawn the attention of many researchers. However, our research into relevant papers revealed a notable lack of comprehensive surveys on blockchain-based verifiable computing in the literature. To overcome this gap, we conducted a comprehensive survey on blockchain-based verifiable computation. First, we address fundamental concepts related to blockchain-based verifiable computation. Afterwards, we offer a series of criteria to evaluate existing blockchain-based verifiable computation techniques. Finally, based on our comprehensive review and evaluation metrics, we explore various open challenges and potential research prospects. These include zero-knowledge proofs (ZKP) integration, addressing privacy preservation, scalability, and traceability. Future research should focus on robust privacy-preserving methods, using ZKP for enhanced security, off-chain computations for scalability, and decentralized file systems like Interplanetary File System (IPFS) to improve traceability.
References
X. Yu, Z. Yan, and A.V. Vasilakos. A Survey of Verifiable Computation. Mobile Networks and Application 22: 438–453 (2017).
S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf (accessed 10 February 2024).
M. Crosby, P. Pattanayak, S. Verma, and V. Kalyanaraman. Blockchain technology: Beyond bitcoin. Applied Innovation 2: 6-10 (2016).
S. Šimunić, D. Bernaca, and K. Lenac. Verifiable computing applications in blockchain. IEEE Access 9: 156729-156745 (2021).
M.R. Dorsala, V.N. Sastry, and S. Chapram. Blockchain-based solutions for cloud computing: A survey. Journal of Network and Computer Applications 196: 103246 (2021).
H. Gamage, H. Weerasinghe, and N. Dias. A survey on blockchain technology concepts, applications, and issues. SN Computer Science 1: 1–15 (2020).
S. Soni, and B. Bhushan. A comprehensive survey on blockchain: working, security analysis, privacy threats and potential applications. 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kerala, India (July 5-6, 2019) 1: 922–926 (2019).
S. Shi, D. He, L. Li, N. Kumar, M.K. Khan, and K.K. R. Choo. Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Computers & Security 97: 101966 (2020).
L. Peng, W. Feng, Z. Yan, Y. Li, X. Zhou, and S. Shimizu. Privacy preservation in permissionless blockchain: A survey. Digital Communications and Networks 7: 295–307 (2021).
M.R. Ahmed, A.K.M.M. Islam, S. Shatabda, and S. Islam. Blockchain-Based Identity Management System and Self-Sovereign Identity Ecosystem: A Comprehensive Survey. IEEE Access 10: 113436-113481 (2022).
W. Li, J. Wu, J. Cao, N. Chen, Q. Zhang, and R. Buyya. Blockchain-Based Trust Management in Cloud Computing Systems: A Taxonomy, Review and Future Directions. Journal of Cloud Computing 10(1): 35 (2021).
A.M.S. Saleh. Blockchain for Secure and Decentralized Artificial Intelligence in Cybersecurity: A Comprehensive Review. Blockchain: Research and Applications 5: 100193 (2024).
M.M. Memon, M.A. Hashmani, F.T. Simpao, A.C. Sales, N.Q. Santillan, and D. Khan. Blockchain in Healthcare: A Comprehensive Survey of Implementations and a Secure Model Proposal. Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences 60(3): 1-13 (2023).
M. Rosenfeld. Overview of colored coins (2012). https://bitcoil.co.il/BitcoinX.pdf (accessed 10 February 2024).
M. Conoscenti, A. Vetro, and J.C. De Martin. Blockchain for the internet of things: A systematic literature review. IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco (November 29 - December 2, 2016) pp. 1–6 (2016).
S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F.Y. Wang. Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems 49: 2266–2277 (2019).
K. Gai, J. Guo, L. Zhu, and S. Yu. Blockchain meets cloud computing: A survey. IEEE Communications Surveys Tutorials 22: 2009–2030 (2020).
D.C. Nguyen, P.N. Pathirana, M. Ding, and A. Seneviratne. Blockchain for 5g and beyond networks: A state of the art survey. Journal of Network and Computer Applications 166: 102693 (2020).
F. Zafar, A. Khan, S.U.R. Malik, M. Ahmed, A. Anjum, M.I. Khan, N. Javed, M. Alam, and F. Jamil. A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Computers & Security 65: 29–49 (2017).
C. Dong, Y. Wang, A. Aldweesh, P. McCorry, and A. van Moorsel. Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA (30 October – 3 November 2017) pp. 211–227 (2017).
N.Z. Benisi, M. Aminian, and B. Javadi, Blockchain-based decentralized storage networks: A survey Journal of Network and Computer Applications 162: 102656 (2020).
R. Kumaresan, and I. Bentov. How to use bitcoin to incentivize correct computations. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, USA (November 3-7, 2014) pp. 30–41 (2014).
C. Yang, L. Tan, N. Shi, B. Xu, Y. Cao, and K. Yu. AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud. IEEE Access 8: 70604–70615 (2020).
Y. Zhang, R.H. Deng, X. Liu, and D. Zheng. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Information Sciences 462: 262–277 (2018).
Y. Zhang, R.H. Deng, X. Liu, and D. Zheng. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing 14: 1152–1166 (2018).
S. Wang, Y. Wang, and Y. Zhang. Blockchain-based fair payment protocol for deduplication cloud storage system. IEEE Access 7: 127652–127668 (2019).
M. Krol, and I. Psaras. Spoc: Secure payments for outsourced computations. arXiv preprint arXiv: 1807.06462 (2018).
F. Hjlmarsson, G.K. Hreiarsson, M. Hamdaqa, and G. Hjlmtsson. Blockchain-based e-voting system. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA (July 2-7, 2018) pp. 983–986 (2018).
J. Eberhardt, and S. Tai. Zokrates-scalable privacy-preserving off-chain computations. IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada (July 30 – August 3, 2018) pp. 1084–1091 (2018).
S. Jiang, J. Liu, L. Wang, and S.M. Yoo. Verifiable search meets blockchain: A privacy-preserving framework for outsourced encrypted data. In ICC 2019-2019 IEEE International Conference on Communications (ICC), Shanghai, China (May 20-24, 2019) pp. 1–6 (2019).
M.R. Dorsala, V. Sastry, and S. Chapram. Fair payments for verifiable cloud services using smart contracts. Computers & Security 90: 101712 (2020).
L. Zhou, L. Wang, and Y. Sun. Mistore: a blockchain-based medical insurance storage system. Journal of Medical Systems 42: 1–17 (2018).
S. Avizheh, M. Nabi, R. Safavi-Naini, and M. Venkateswarlu K. Verifiable computation using smart contracts. Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, London, UK (November 11, 2019) pp. 17–28 (2019).
J. Teutsch, and C. Reitwießner. A scalable verification solution for blockchains. arXiv preprint arXiv:1908.04756 (2019).
C. Yang, X. Chen, and Y. Xiang. Blockchain-based publicly verifiable data deletion scheme for cloud storage. Journal of Network and Computer Applications 103: 185–193 (2018).
M. Li, L. Zhu, Z. Zhang, C. Lal, M. Conti, and M. Alazab. Anonymous and verifiable reputation system for e-commerce platforms based on blockchain. IEEE Transactions on Network and Service Management 18: 4434–4449 (2021).
J. Zawistowski, P. Janiuk, A. Regulski, A. Skrzypczak, A. Leverington, P. Bylica, M. Franciszkiewicz, P. Peregud, A. Banasiak, M. Stasiewicz, and R. Zagórowicz. The Golem Project. Golem Whitepaper (2016). https://assets. website-files.com/62446d07873fde065cbcb8d5/62446d07873fdeb626bcb927_Golemwhitepaper.pdf (accessed 30 December 2023).
G. Fedak, H. He, O. Lodygensky, and E. Alves. iExec Blockchain-based decentralized cloud computing v3.0 (2018). https://iex.ec/wp-content/uploads/2022/09/iexec_whitepaper.pdf (accessed 30 December 2023).
SONM. Supercomputer organized by network mining (2017). https://whitepaper.io/document/326/sonm-whitepaper (accessed 30 December 2023).
M.A.N.U. Ghani, K. She, M.A. Rauf, M. Alajmi, Y.Y. Ghadi, and A. Algarni. Securing Synthetic Faces: A GAN-Blockchain Approach to Privacy Enhanced Facial Recognition. Journal of King Saud University-Computer and Information Sciences 36(4): 102036 (2024).
M.A.N.U. Ghani, K. She, M.A. Rauf, S. Khan, J.A. Khan, E.A. Aldakheel, and D.S. Khafaga. Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies. Computers, Materials & Continua 79(2): 2610 (2024).
A.H. Magsi, L.V. Yovita, G. Ali, G. Muhammad, and Z. Ali. A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking. Sustainability 15(14): 10931 (2023).