3670 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 15, NO. 6, JUNE 2019
Building Redactable Consortium Blockchain
for Industrial Internet-of-Things
Ke Huang , Xiaosong Zhang ,YiMu , Senior Member, IEEE, Xiaofen Wang,
Guomin Yang
, Senior Member, IEEE, Xiaojiang Du , Senior Member, IEEE,
Fatemeh Rezaeibagha
,QiXia , and Mohsen Guizani , Fellow, IEEE
Abstract—Applying consortium blockchain as a trust
layer for heterogeneous industrial Internet-of-Things de-
vices is cost-effective. However, with an increase in com-
puting power, some powerful attacks (e.g., the 51% attack)
are inevitable and will cause severe consequences. Re-
cent studies also confirm that anonymity and immutability
of blockchain have been abused to facilitate black market
trades, etc. To operate controllable blockchain for IIoT de-
vices, it is necessary to rewrite blockchain history back to a
normal state once the chain is breached. Ateniese et al. pro-
posed redactable blockchain by using chameleon hash (CH)
to replace traditional hash function, it allows blockchain his-
tory to be written when needed (EuroS&P 2017). However,
we cannot apply this idea directly to IIoT without solving
the following problems: (1) achieve a decentralized design
of CH; (2) update the signatures accordingly to authenticate
the redacted contents; (3) satisfy the low-computing need
of the individual IIoT device. In this paper, we overcome the
above issues by proposing the first threshold chameleon
hash (TCH) and accountable-and-sanitizable chameleon
signature (ASCS) schemes. Based on them, we build a
redactable consortium blockchain which is efficient for IIoT
devices to operate. It allows a group of authorized sensors
to write and rewrite blockchain without causing any hard
Manuscript received January 27, 2019; accepted February 17, 2019.
Date of publication February 22, 2019; date of current version June 12,
2019. This work was supported in part by the National Key R&D Program
of China under Grant 2017YFB0802300, in part by the National Natural
Science Foundation of China under Grants U1833122, 61572115, and
61872087, in part by the Sichuan Provincial Major Frontier Issues under
Grant 2016JY0007, and in part by the foundation from the State Key
Laboratory of Integrated Services Networks, Xidian University (ISN18-
09). Paper no. TII-19-0278. (Corresponding author: Ke Huang.)
K. Huang, X. Zhang, X. Wang, and Q. Xia are with the Center for
Cyber Security, the College of Computer Science and Engineering, Uni-
versity of Electronic Science and Technology of China, Chengdu 611731,
China (e-mail:, kh936@uowmail.edu.au; johnsonzxs@uestc.edu.cn;
wangxuedou@sina.com; xiaqi@uestc.edu.cn).
Y. Mu is with the Fujian Provincial Key Laboratory of Network Security
and Cryptology, College of Mathematics and Informatics, Fujian Normal
University, Fuzhou 350007, China (e-mail:, ymu.ieee@gmail.com).
G. Yang is with the Institute of Cybersecurity and Cryptology, School
of Computing and Information Technology, University of Wollongong,
Wollongong 2519, Australia (e-mail:, gyang@uow.edu.au).
X. Du is with the Department of Computer and Information Sciences,
Temple University Philadelphia, PA 19122 USA (e-mail:,dxj@ieee.org).
F. Rezaeibagha is with the SMART Infrastructure, University of Wol-
longong, Wollongong 2519, Australia (e-mail:, fr683@uowmail.edu.au).
M. Guizani is with the Department of Electrical and Computer
Engineering, University of Idaho, Moscow, ID 83843 USA (e-mail:,
mguizani@ieee.org).
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TII.2019.2901011
forks. Basically, TCH is the first TCH and ASCS is a public-
key signature supporting file-level and block-level modifica-
tions of signatures without impairing authentications. Ad-
ditionally, ASCS achieves accountability to avoid abuse of
redaction. While security analysis validates our proposals,
the simulation results show that redaction is acceptably ef-
ficient if it is executed at a small scale or if we adopt a
coarse-grained redaction while sacrificing some securities.
Index Terms—Chameleon hash (CH), chameleon signa-
ture (CS), consortium blockchain, industrial Internet-of-
Things (IIoT), sanitization.
I. INTRODUCTION
T
HE industrial Internet-of-Things (IIoT) envisions connec-
tions and interactions of massive heterogeneous devices
for a smarter and more autonomous industry [1], [2]. Gener-
ally, IIoT devices are geographically distributed, computation-
ally limited and adopt different techniques. This requires a de-
centralized, efficient, and cross-platform trust layer to connect
all IIoT devices [3], [4]. However, there is no conventional net-
work structure which can achieve these features efficiently. The
blockchain proposed by Nakamoto [5] is considered as a prefer-
able answer as it provides a public, decentralized, and immutable
trust layer [6], [7]. While integrating blockchain with IIoT net-
work, efficiency and security are two crucial aspects to consider
[7], [8]. For efficiency, it is suggested to adopt lightweight cryp-
tographic schemes as most IIoT devices have limited computing
resources. For security, the underlying cryptographic schemes
such as SHA-256 and elliptic curve discrete signature algorithm
(ECDSA) [9] were well studied. Noticeably, public blockchain
has recently been accused of abusing anonymity and immutabil-
ity to facilitate black market trades, finance terrorists and dis-
tribute illegal contents, etc [10]. Meanwhile, attacks against
blockchain are evolving to become stronger and more powerful
(the well known 51% attack has already been witnessed [11]),
they pose significant threats to those relying on blockchain to
build trust, especially for industries where valuable, sensitive,
and real-time activities are taking place.
To repair blockchain from corruptions, Ateniese et al. [10]
proposed the notion of “redactable blockchain” by enabling
chameleon hash (CH) [12] to rewrite blockchain history. How-
ever, this idea cannot be applied to a typical IIoT scenario due to
1) lack of a threshold version of CH;
2) no authentication to validate redaction; and
1551-3203 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications
standards/publications/rights/index.html for m ore information.
Authorized licensed use limited to: University of Electronic Science and Tech of China. Downloaded on March 21,2020 at 15:53:16 UTC from IEEE Xplore. Restrictions apply.