蚂蚁区块链-CONFIDE-ACM SIGMOD 20

论文名称:《Confidentiality Support over Financial Grade Consortium Blockchain》

论文地址:https://dl.acm.org/doi/abs/10.1145/3318464.3386127


一、区块链可能在哪些场景中找到自己的归属?

区块链可以作为传统互联网的一种补充,在信任机制不完善的领域建立(相比多次协商)更高效的、具体到代码的多方互信。但在真实世界中很多应用场景的信任体系已经完备且成本低廉,那么区块链的多方互信其实没有必要,传统的金融领域,区块链只能锦上添花。所以需要什么思考哪些场景的信任体制没有建立完善,信用成本高昂。

联盟链适合的技术场景,为实现技术场景又面临哪些技术问题?

  • 跨境结算
  • 供应链金融
  • 医疗行业的隐私保护
  • 保险行业的数据共享 

性能瓶颈,以公有链为基础的解决方案更为严重。性能低下在看重安全性的公有链可以接受,在直接对接业务的联盟链不能接受。

preview

部分区块链共识算法的吞吐量示意图

联盟链和公有链的不同:

  1. 公链需要严格的安全性来保证用户资产,联盟链中安全性和性能的优先级要根据业务调整。
  2. 联盟链直接面向业务,联盟链各个用户之间存在上下级关系,权限等级也不同。联盟链中独有的概念:权限管理和机密性(confidentiality)。相对而言,公有链称之为用户隐私(privacy)。

针对业务制定联盟链,需要引入很多不同的技术来满足特定业务的强制要求,技术本身是有冲突的。比如:

  • 增加链上存储容量和吞吐量,要考虑提高区块大小和降低区块间隔。这样做可能会降低安全性。
  • 采用多链结构,会增加数据查询的复杂度,需要考虑优化查询时的路由寻址。

所以在规划联盟链的结构时,为了尽量满足不同场景的复用要求,非常重要的设计原则是模块化,技术之间需要尽量降低耦合程度。

因此,蚂蚁区块链设计了一个由加密传输、加密存储、密钥管理和可信执行环境(TEE)构成的端到端、全声明周期机密性保护机制,而不是拆分出来加密或执行。机制成为蚂蚁区块链硬件隐私保护技术,CONFIDE(confidentiality in financial grade blockchain)。

preview

蚂蚁区块链TEE智能合约逻辑

二、区块链中只有链上计算才能保证可信吗?(联盟链中智能合约有效性和可信程度的思考)

为什么CONFIDE是一个硬件隐私保护技术?什么是可信计算环境?TEE是什么?

区块链智能合约的瓶颈:

出块速度。区块时间固定,但每个业务的流程不一样,则出块的速度差异很大。是否可以把业务部分的处理流程放在区块链外,只在链上存储初始化状态和最终状态。并通过保证链下计算的可信度和链上数据可验证来获取近似的安全性。

可用区块链的Layer-2扩展,业务逻辑和共识逻辑分离,业务逻辑off-chain。特性如下:

待看paper:朱立, 俞欢, 詹士潇, 等. 高性能联盟区块链技术研究[J]. Journal of Software, 2019, 6: 1577-1593.

  • 计算部分被移动至链下,实现隐私和节省计算机资源。(业务逻辑越复杂,区块链带来的速度越明显)
  • 只在链上存储初始化状态和最终状态,方案就能同时完成高效的隐私保护。

所以在蚂蚁区块链的技术方法出现了:基于可行计算机环境(TEE)的加密计算协议。

在区块链中应用TEE,是通过CPU来隔离一块安全区域来实现,对于Intel CPU这块安全区域称为Enclave(飞地)。

preview

Intel SGX业务框架

不采用TEE,传统区块链也能保证用户隐私,但是付出的代价不同。

区块链的隐私保护方案有很多,比如:同态加密、零知识证明、环签名、分布式密钥

而TEE本质上是通过对区块链参与方增加硬件约束(需要支持TEE的CPU),来换取性能和隐私保障。因此相比公链来说,TEE也更适合联盟链这种带有一定准入门槛的区块链体系。

三、区块链中实用的TEE(可信执行环境)存在什么问题?蚂蚁金服解决了什么问题?

建立端到端、全业务声明周期的设计方案。

preview

CONFIDE的简易流程图

1. 数据加密传输协议 2.智能合约处理引擎 3.数据加密储存协议 4.远程认证及密钥协商协议

  1.  数据加密传输协议:确保交易数据端到端的隐私安全,交易数据从客户端加密发出后,仅在需要的时候载入TEE环境进行解密运算
  2. 智能合约处理引擎:运行在TEE内部的智能合约处理引擎,可以高效处理智能合约数据,在保证数据隐私的情况下,最大限度的保留的性能和通用性。
  3. 数据加密储存协议:充分考虑区块链数据持久化的特性,建立了完善的数据安全加密和数据完整性保护机制,确保数据持久化安全。
  4. 远程认证及密钥协商协议:确保了区块链节点上在TEE内运行的程序的可认证性,同时各节点TEE内协商的密钥对外不可见,确保节点TEE运行时数据安全。

智能合约处理引擎

在 TEE 合约链中,交易和合约都分为隐私交易/合约和明文交易/合约。明文交易即无需隐私保护的交易,其执行过程与现有明文逻辑一致;隐私交易/合约是利用密码学技术进行保护的交易,交易/合约内容只有在 TEE 内才安全可见,其执行过程中产生的全局状态数据以及交易回执均采用密码学技术进行加密保护。

从系统设计角度,这其中的关键点是如何正确识别、分发隐私交易和明文交易。 蚂蚁区块链的设计思路是增加了交易分发和交易存储这个阶段,把待处理的交易放入缓存池中识别、预处理,同时扩展智能合约的隐私标识。

最后,在Synthetic workload的模块测试中,由图可知,CONFIDE的虚拟机大幅度领先EVM(ETH的虚拟机)。

preview

总结:

1.目前只有趣链和微软在考虑基于TEE可信执行环境的区块链解决方案,但都离落地还很远。

2.但蚂蚁金服的CONFIDE已落地,在此基础上运行了若干金融业务,日均交易达上千万。

3.中国科技公司区块链原创技术在CCF国际A类学术会议的第一篇独立论文。

参考链接:如何看待蚂蚁区块链技术入选国际顶会? - 知乎目录(八千字长文):1.背景 2.狂欢过后,联盟链探索的这一年3.区块链中只有链上计算才能保证可信吗?…https://www.zhihu.com/question/384569738/answer/1123624078

  • 0
    点赞
  • 2
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
14 Continuous obstructed nearest neighbor queries in spatial databases Yunjun Gao, Baihua Zheng Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data In this paper, we study a novel form of continuous nearest neighbor queries in the presence of obstacles, namely continuous obstructed nearest neighbor (CONN) search. It considers the impact of obstacles on the distance between objects, ... 15 Optimizing complex extraction programs over evolving text data Fei Chen, Byron J. Gao, AnHai Doan, Jun Yang, Raghu Ramakrishnan Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data Most information extraction (IE) approaches have considered only static text corpora, over which we apply IE only once. Many real-world text corpora however are dynamic. They evolve over time, and so to keep extracted information up to date we ... 16 Privacy preservation of aggregates in hidden databases: why and how? Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Chaudhuri Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting sensitive aggregate information of hidden databases from being ... 17 Efficient approximate entity extraction with edit distance constraints Wei Wang, Chuan Xiao, Xuemin Lin, Chengqi Zhang Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respect to a large dictionary of known entities, as the domain ... 18 Large-scale uncertainty management systems: learning and exploiting your data Shivnath Babu, Sudipto Guha, Kamesh Munagala Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data The database community has made rapid strides in capturing, representing, and querying uncertain data. Probabilistic databases capture the inherent uncertainty in derived tuples as probability estimates. Data acquisition and stream systems can ... 19 Data warehouse technology by infobright Dominik Slezak, Victoria Eastwood Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data We discuss Infobright technology with respect to its main features and architectural differentiators. We introduce the upcoming research and development projects that may be of special interest to the academic and industry communities. ... 20 Detecting and resolving unsound workflow views for correct provenance analysis Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data Workflow views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is carefully designed, it may not preserve the dataflow ... 21 Indexing correlated probabilistic databases Bhargav Kanagal, Amol Deshpande Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data With large amounts of correlated probabilistic data being generated in a wide range of application domains including sensor networks, information extraction, event detection etc., effectively managing and querying them has become an important ... 22 Cross-tier, label-based security enforcement for web applications Brian J. Corcoran, Nikhil Swamy, Michael Hicks Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and Ruby on Rails, with language syntax for accessing objects ... 23 Exploiting context analysis for combining multiple entity resolution systems Zhaoqi Chen, Dmitri V. Kalashnikov, Sharad Mehrotra Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data Entity Resolution (ER) is an important real world problem that has attracted significant research interest over the past few years. It deals with determining which object descriptions co-refer in a dataset. Due to its practical significance for ... 24 Kernel-based skyline cardinality estimation Zhenjie Zhang, Yin Yang, Ruichu Cai, Dimitris Papadias, Anthony Tung Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data The skyline of a d-dimensional dataset consists of all points not dominated by others. The incorporation of the skyline operator into practical database systems necessitates an efficient and effective cardinality estimation module. ... 25 Scalable skyline computation using object-based space partitioning Shiming Zhang, Nikos Mamoulis, David W. Cheung Jun. 2009 Proceedings of the 35th SIGMOD international conference on Management of data The skyline operator returns from a set of multi-dimensional objects a subset of superior objects that are not dominated by others. This operation is considered very important in multi-objective analysis of large datasets. Although a large ...

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值