{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:16:52Z","timestamp":1761621412683,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502048"],"award-info":[{"award-number":["61502048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Blockchain-enabled Internet of Things (IoT) systems have received extensive attention from academia and industry. Most previous constructions face the risk of leaking sensitive information since the servers can obtain plaintext data from the devices. To address this issue, in this paper, we propose a decentralized outsourcing computation (DOC) scheme, where the servers can perform fully homomorphic computations on encrypted data from the data owner according to the request of the data owner. In this process, the servers cannot obtain any plaintext data, and dishonest servers can be detected by the data owner. Then, we apply the DOC scheme in the IoT scenario to achieve a confidential blockchain-enabled IoT system, called BeeKeeper 2.0. To the best of our knowledge, this is the first work in which servers of a blockchain-enabled IoT system can perform any-degree homomorphic multiplications and any number of additions on encrypted data from devices according to the requests of the devices without obtaining any plaintext data of the devices. Finally, we provide a detailed performance evaluation for the BeeKeeper 2.0 system by deploying it on Hyperledger Fabric and using Hyperledger Caliper for performance testing. According to our tests, the time consumed between the request stage and recover stage is no more than 3.3 s, which theoretically satisfies the production needs.<\/jats:p>","DOI":"10.3390\/s18113785","type":"journal-article","created":{"date-parts":[[2018,11,7]],"date-time":"2018-11-07T03:45:22Z","timestamp":1541562322000},"page":"3785","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7792-2669","authenticated-orcid":false,"given":"Lijing","family":"Zhou","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Licheng","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6763-4129","authenticated-orcid":false,"given":"Tianyi","family":"Ai","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Yiru","family":"Sun","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., and Jurdak, R. (2017, January 18\u201321). Towards an optimized blockchain for IoT. Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (IoTDI 2017), Pittsburgh, PA, USA.","DOI":"10.1145\/3054977.3055003"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"De Montjoye, Y.A., Shmueli, E., Wang, S.S., and Pentland, A.S. (2014). Openpds: Protecting the privacy of metadata through safeanswers. PLoS ONE, 9.","DOI":"10.1371\/journal.pone.0098790"},{"key":"ref_3","unstructured":"(2016, October 14). Top Strategic Predictions for 2017 and beyond: Surviving the Storm Winds of Digital Disruption. Available online: https:\/\/www.gartner.com\/doc\/3471568?ref=unauthreader."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain Challenges and Opportunities: A Survey","volume":"14","author":"Zheng","year":"2017","journal-title":"Int. J. Web Grid Serv."},{"key":"ref_5","unstructured":"Nakamoto, S. (2008, October 31). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"ref_6","unstructured":"Wood, G. (2018, February 03). Ethereum: A Secure Decentralised Generalised Transaction Ledger. Available online: http:\/\/gavwood.com\/Paper.pdf."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Rahulamathavan, Y., Phan, R.C.-W., Rajarajan, M., Misra, S., and Kondoz, A.M. (2017, January 17\u201320). Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption. Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS 2017), Bhubaneswar, India.","DOI":"10.1109\/ANTS.2017.8384164"},{"key":"ref_8","unstructured":"Krishnan, M.A., Shankar, C.G., Raj, S.A., and Ragavan, A. (2017, April 30). Peer to Peer File Sharing by Blockchain Using IOT. Available online: http:\/\/ijsrset.com\/IJSRSET173253."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Conoscenti, M., Vetr\u00f2, A., and De Martin, J.C. (2017, January 20\u201328). Peer to Peer for Privacy and Decentralization in the Internet of Things. Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, Argentina.","DOI":"10.1109\/ICSE-C.2017.60"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Liu, B., Yu, X.L., Chen, S., Xu, X., and Zhu, L. (2017, January 25\u201330). Blockchain Based Data Integrity Service Framework for IoT Data. Proceedings of the 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA.","DOI":"10.1109\/ICWS.2017.54"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Wu, L., Du, X., Wang, W., and Lin, B. (2018, January 5\u20138). An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology. Proceedings of the 2018 International Conference on Computing, Networking and Communications (ICNC 2018), Maui, HI, USA.","DOI":"10.1109\/ICCNC.2018.8390280"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ouaddah, A., Elkalam, A.A., and Ouahman, A.A. (2017). Towards a novel privacy-preserving access control model based on blockchain technology in IoT. Europe and MENA Cooperation Advances in Information and Communication Technologies, Springer.","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Sonnino, A., Al-Bassam, M., Bano, S., and Danezis, G. (arXiv, 2018). Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers, arXiv.","DOI":"10.14722\/ndss.2019.23272"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Huh, S., Cho, S., and Kim, S. (2017, January 19\u201322). Managing IoT devices using blockchain platform. Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Bongpyeong, Korea.","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"93","DOI":"10.22161\/ijaers.4.4.12","article-title":"A smart waste management system using IoT and blockchain technology","volume":"4","author":"Lamichhane","year":"2017","journal-title":"Int. J. Adv. Eng. Res. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Dorri, A., Kanhere, S.S., Jurdak, R., and Gauravaram, P. (2017, January 13\u201317). Blockchain for IoT security and privacy: The case study of a smart home. Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA.","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Salleras, X., Signorini, M., and Waisbard, E. (2018, January 13\u201315). A blockchain-based Trust System for the Internet of Things. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies (SACMAT 2018), Indianapolis, IN, USA.","DOI":"10.1145\/3205977.3205993"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1109\/ACCESS.2017.2757955","article-title":"A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT","volume":"6","author":"Sharma","year":"2018","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Pahl, C., El Ioini, N., and Helmer, S. (2018, January 19\u201321). A Decision Framework for Blockchain Platforms for IoT and Edge Computing. Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security (IoTBDS 2018), Funchal, Portugal.","DOI":"10.5220\/0006688601050113"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"43472","DOI":"10.1109\/ACCESS.2018.2847632","article-title":"BeeKeeper: A Blockchain-based IoT System with Secure Storage and Homomorphic Computation","volume":"6","author":"Zhou","year":"2018","journal-title":"IEEE Access"},{"key":"ref_21","unstructured":"(2013, June 14). PBC Library. Available online: https:\/\/crypto.stanford.edu\/pbc\/download.html."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., and Manevich, Y. (2018, January 23\u201326). Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. Proceedings of the Thirteenth EuroSys Conference (EuroSys 2018), Porto, Portugal.","DOI":"10.1145\/3190508.3190538"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhou, L., Wang, L., Ai, T., and Sun, Y. (2018, September 20). AntNest: Fully Non-interactive Secure Multi-party Computation. Available online: https:\/\/eprint.iacr.org\/2018\/735.pdf.","DOI":"10.1109\/ACCESS.2018.2883775"},{"key":"ref_24","unstructured":"Barreto, P.S., and Naehrig, M. (2005, January 11\u201312). Pairing-friendly elliptic curves of prime order. Proceedings of the 12th International Workshop on Selected Areas in Cryptography (SAC 2005), Kingston, ON, Canada."},{"key":"ref_25","unstructured":"(2018, April 15). Join GitHub Today. Available online: https:\/\/github.com\/aleaxit\/gmpy."},{"key":"ref_26","unstructured":"(2017, November 08). A Defunct and Ancient Set of Python Bindings for Pairing Based Cryptography. Available online: https:\/\/github.com\/debatem1\/pypbc."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The elliptic curve digital signature algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Smart, N.P. (2001, January 17\u201319). The exact security of ECIES in the generic group model. Proceedings of the 8th IMA International Conference on Cryptography and Coding, Cirencester, UK.","DOI":"10.1007\/3-540-45325-3_8"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Gilbert, H., and Handschuh, H. (2003, January 14\u201315). Security Analysis of SHA-256 and Sisters. Proceedings of the 10th Annual International Workshop on Selected Areas in Cryptography (SAC 2003), Ottawa, ON, Canada.","DOI":"10.1007\/978-3-540-24654-1_13"},{"key":"ref_30","unstructured":"(2016, December 22). Hyperledger Caliper. Available online: https:\/\/www.hyperledger.org\/projects\/caliper."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/3785\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:28:07Z","timestamp":1760196487000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/3785"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":30,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["s18113785"],"URL":"https:\/\/doi.org\/10.3390\/s18113785","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,11,5]]}}}