Title: Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers

Authors: Xueping Liang; Sachin Shetty; Deepak K. Tosh; Peter Foytik; Lingchen Zhang

Addresses: Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China; Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Norfolk, VA, USA ' Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Norfolk, VA, USA ' Department of Computer Science, University of Texas at EL Paso, El Paso, TX, USA ' Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Norfolk, VA, USA ' Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

Abstract: Distributed ledger technology (DLT) provides decentralised services by removing the need of trust among distributed nodes in the distributed system. Transactions across the network are visible to all participants. However, some transactions may contain sensitive information such as business contracts or even personal health records. To protect user privacy, the architecture of distributed multi-channel ledger with membership service as a critical component can be adopted. The proposed multi-channel membership service architecture combines two promising technologies, distributed ledger and Intel Software Guard Extensions (SGX). With SGX remote attestation and isolated execution, each node is enrolled as a trusted entity to the channels, which separate different applications and provide better flexibility. We propose security properties for membership service in distributed ledger and illustrate how SGX help to achieve these properties in each phase. Security analysis and evaluation show that the proposed architecture could enhance the privacy preservation and capabilities against attacks.

Keywords: Intel SGX; distributed ledger; blockchain; membership service; security; privacy; channel.

DOI: 10.1504/IJICS.2021.117395

International Journal of Information and Computer Security, 2021 Vol.16 No.1/2, pp.63 - 83

Received: 04 Nov 2017
Accepted: 07 Sep 2018

Published online: 27 Aug 2021 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article