nav emailalert searchbtn searchbox tablepage yinyongbenwen piczone journalimg journalInfo journalinfonormal searchdiv searchzone qikanlogo popupnotification paper paperNew
Abstract:

The communication method in which both parties could modify certain types of shared resources without attracting the attention of other users was called covert communication. As a detrusted, traceable and tamper-resistant distributed data sharing technology platform, blockchain and related technologies have been explored to build hidden communication with the expansion of relevant fields. The feasibility of this direction has been proved through research in recent years. The related concepts and technology classification of covert communication technology were introduced, and then the blockchain covert channel was divided into block-based structure, external carrier, business operation time and system mechanism based on the existing research. Various technical characteristics were sorted out in detail, and corresponding detection methods were introduced for various types of covert channel. Finally, the future development trend of the hidden communication and detection method of blockchain were explored, which could provide certain reference value for relevant research.

References

[1] BERNSTEIN D J,HENINGER N,LOU P,et al.Post-quantum RSA[M].Cham:Springer International Publishing,2017:311-329.

[2] BORDERS K,PRAKASH A.Web tap:detecting covert web traffic[C]//ACM Conference on Computer & Communications Security.New York:ACM Press,2004:110-120.

[3] 李彦峰,丁丽萍,吴敬征,等.网络隐蔽信道关键技术研究综述[J].软件学报,2019,30(8):2470-2490.LI Y F,DING L P,WU J Z,et al.Survey on key issues in networks covert channel[J].Journal of software,2019,30(8):2470-2490.

[4] JOHNSON N F,JAJODIA S.Exploring steganography:seeing the unseen[J].Computer,1998,31(2):26-34.

[5] JOINSON A N.Self-disclosure in computer-mediated communication:the role of self-awareness and visual anonymity[J].European journal of social psychology,2001,31(2):177-192.

[6] PETITCOLAS F A P,ANDERSON R J.Evaluation of copyright marking systems[C]//Proceedings IEEE International Conference on Multimedia Computing and Systems.Florence:IEEE Press,1999:574-579.

[7] SATOSHI N.Bitcoin:a Peer-to-Peer electronic cash syste.[EB/OL].[2021-12-20].https://bitcoin.org/bitcoin.pdf.

[8] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta automatica sinica,2016,42(4):481-494.

[9] 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.ZHU L H,GAO F,SHEN M,et al.Survey on privacy preserving techniques for blockchain technology[J].Journal of computer research and development,2017,54(10):2170-2186.

[10] SIMMONS G J.The prisoners′ problem and the subliminal channel[EB/OL].[2021-12-23].https://link.springer.com/chapter/10.1007/978-1-4684-4730-9_5.

[11] GOLDWASSER S,MICALI S,RACKOFF C.The knowledge complexity of interactive proof-systems (extended abstract)[C]//Proceedings of the 17th Annual ACM Symposium on Theory of Computing,Providence,New York:ACM Press,1985:291-304.

[12] RIVEST R L,ADLEMAN L M,DERTOUZOS M L.On data banks and privacy homomorphisms[EB/OL].[2021-12-23].https://www.researchgate.net/publication/242584149_On_Data_Banks_and_Privacy_Homomorphisms.

[13] YAO A C.Protocols for secure computations[C]//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science.Chicago:IEEE Press,1982:160-164.

[14] BRASSARD G,CHAUM D,CRéPEAU C.Minimum disclosure proofs of knowledge[J].Journal of computer and system sciences,1988,37(2):156-189.

[15] RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[EB/OL].(2001-12-09)[2021-12-23].https://www.zhangqiaokeyan.com/academic-conference-foreign_7th-international-conference-theory-application-cryptology_thesis/020511450482.html.

[16] DWORK C,ROTH A.The algorithmic foundations of differential privacy[J].Foundations and trends? in theoretical computer science,2013,9(3/4):211-407.

[17] MILLEN J K.Covert channel capacity[C]//1987 IEEE Symposium on Security and Privacy.Piscataway:IEEE Press,1987:60.

[18] PARTALA J.Provably secure covert communication on blockchain[J].Cryptography,2018,2(3):18.

[19] 刘明达,陈左宁,拾以娟,等.区块链在数据安全领域的研究进展[J].计算机学报,2021,44(1):1-27.LIU M D,CHEN Z N,SHI Y J,et al.Research progress of blockchain in data security[J].Chinese journal of computers,2021,44(1):1-27.

[20] 陈君夫,付章杰,张卫明,等.基于深度学习的图像隐写分析综述[J].软件学报,2021,32(2):551-578.CHEN J F,FU Z J,ZHANG W M,et al.Review of image steganalysis based on deep learning[J].Journal of software,2021,32(2):551-578.

[21] PETITCOLAS F A P,ANDERSON R J,KUHN M G.Information hiding-a survey[J].Proceedings of the IEEE,1999,87(7):1062-1078.

[22] 王翀,王秀利,吕荫润,等.隐蔽信道新型分类方法与威胁限制策略[J].软件学报,2020,31(1):228-245.WANG C,WANG X L,Lü Y R,et al.Categorization of covert channels and its application in threat restriction techniques[J].Journal of software,2020,31(1):228-245.

[23] 付章杰,王帆,孙星明,等.基于深度学习的图像隐写方法研究[J].计算机学报,2020,43(9):1656-1672.FU Z J,WANG F,SUN X M,et al.Research on steganography of digital images based on deep learning[J].Chinese journal of computers,2020,43(9):1656-1672.

[24] CHAN C K,CHENG L M.Hiding data in images by simple LSB substitution[J].Pattern recognition,2004,37(3):469-474.

[25] 陈威兵,杨高波,陈日超,等.数字视频真实性和来源的被动取证[J].通信学报,2011,32(6):177-183.CHEN W B,YANG G B,CHEN R C,et al.Digital video passive forensics for its authenticity and source[J].Journal on communications,2011,32(6):177-183.

[26] 吴国华,龚礼春,袁理锋,等.中文文本信息隐藏研究进展[J].通信学报,2019,40(9):145-156.WU G H,GONG L C,YUAN L F,et al.Review of information hiding on Chinese text[J].Journal on communications,2019,40(9):145-156.

[27] KADLOOR S,KIYAVASH N,VENKITASUBRAMANIAM P.Mitigating timing side channel in shared schedulers[J].IEEE/ACM transactions on networking,2016,24(3):1562-1573.

[28] QI W,DING W F,WANG X Y,et al.Construction and mitigation of user-behavior-based covert channels on smartphones[J].IEEE transactions on mobile computing,2018,17(1):44-57.

[29] MOHAMED E E,MNAOUER A B,BARKA E.PSCAN:a port scanning network covert channel[C]//2016 IEEE 41st Conference on Local Computer Networks.Dubai:IEEE Press,2016:631-634.

[30] GURI M,MONITZ M,MIRSKI Y,et al.BitWhisper:covert signaling channel between air-gapped computers using thermal manipulations[C]//2015 IEEE 28th Computer Security Foundations Symposium.Verona:IEEE Press,2015:276-289.

[31] MASTI R J,RAI D,RANGANATHAN A,et al.Thermal covert channels on multi-core platforms[EB/OL].[2021-12-23].https://arxiv.org/pdf/1503.07000v1.pdf.

[32] TAHMASBI F,MOGHIM N,MAHDAVI M.Code-based timing covert channel in IEEE 802.11[C]//2015 5th International Conference on Computer and Knowledge Engineering.Mashhad:IEEE Press,2015:12-17.

[33] BUTERIN V.A next-generation smart con tract and decentralized application platform [EB/OL].[2021-12-23].https://github.com/ethereum/wiki/wiki/WhitePaper.

[34] 马春光,安婧,毕伟,等.区块链中的智能合约[J].信息网络安全,2018,(11):8-17.MA C G,AN J,BI W,et al.Smart Contract in Blockchain[J].Netinfo Security,2018,(11):8-17.

[35] 佘维,白孟龙,刘炜,等.能源区块链的架构、应用与发展趋势[J].郑州大学学报(理学版),2021,53(4):1-21.SHE W,BAI M L,LIU W,et al.The architecture,application and development trend of energy blockchain[J].Journal of Zhengzhou university (natural science edition),2021,53(4):1-21.

[36] 刘敖迪,杜学绘,王娜,等.区块链技术及其在信息安全领域的研究进展[J].软件学报,2018,29(7):2092-2115.LIU A D,DU X H,WANG N,et al.Research progress of blockchain technology and its application in information security[J].Journal of software,2018,29(7):2092-2115.

[37] 宋上,彭伟.BLOCCE+:一种改进的基于区块链的隐蔽通信方法[J].重庆理工大学学报(自然科学),2020,34(9):238-244.SONG S,PENG W.BLOCCE+:an improved blockchain-based covert communication approach[J].Journal of Chongqing university of technology (natural science),2020,34(9):238-244.

[38] ZHANG L J,ZHANG Z J,WANG W Z,et al.A covert communication method using special bitcoin addresses generated by vanitygen[J].Computers,materials & continua,2020,65(1):597-616.

[39] MATZUTT R,HILLER J,HENZE M,et al.A quantitative analysis of the impact of arbitrary blockchain content on bitcoin[EB/OL].(2018-12-07) [2021-12-23].https://link.springer.com/chapter/10.1007/978-3-662-58387-6_23.

[40] XU M T,WU H Z,FENG G R,et al.Broadcasting steganography in the blockchain[C]//Digital Forensics and Watermarking.Cham:Springer International Publishing,2019:256-267.

[41] TORKI O,ASHOURI-TALOUKI M,MAHDAVI M.Blockchain for steganography:advantages,new algorithms and open challenges[EB/OL].[2021-12-23].https://arxiv.org/abs/2101.03103.

[42] 张涛,伍前红,唐宗勋.基于比特币区块链的隐蔽信息传输研究[J].网络与信息安全学报,2021,7(1):84-92.ZHANG T,WU Q H,TANG Z X.Bitcoin blockchain based information convert transmission[J].Chinese journal of network and information security,2021,7(1):84-92.

[43] GUO Z Z,SHI L C,XU M Z,et al.MRCC:a practical covert channel over monero with provable security[J].IEEE access,2021,9:31816-31825.

[44] 蓝怡琴,张方国,田海博.利用门罗币实现隐蔽通信[J].西安电子科技大学学报,2020,47(5):19-27.LAN Y Q,ZHANG F G,TIAN H B.Using Monero to realize covert communication[J].Journal of xidian university,2020,47(5):19-27.

[45] KUMAR A,FISCHER C,TOPLE S,et al.A traceability analysis of monero's blockchain[M].Computer Security-ESORICS 2017.Cham:Springer International Publishing,2017:153-173.

[46] TIAN J,GOU G P,LIU C,et al.DLchain:a covert channel over blockchain based on dynamic labels[C]//Information and Communications Security.Cham:Springer,2019:814-830.

[47] 司成祥,高峰,祝烈煌,等.一种支持动态标签的区块链数据隐蔽传输机制[J].西安电子科技大学学报,2020,47(5):94-102.SI C X,GAO F,ZHU L H,et al.Covert data transmission mechanism based on dynamic label in blockchain[J].Journal of xidian university,2020,47(5):94-102.

[48] GAO F,ZHU L H,GAI K K,et al.Achieving a covert channel over an open blockchain network[J].IEEE network,2020,34(2):6-13.

[49] YOUNG A L,YUNG M.Kleptography:Using cryptography against cryptography[EB/OL].[2021-12-25].https://dl.acm.org/doi/10.5555/1754542.1754551.

[50] FRKAT D,ANNESSI R,ZSEBY T.ChainChannels:private botnet communication over public blockchains[C]//2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,Physical and Social Computing (CPSCom) and IEEE Smart Data.Halifax:IEEE Press,2018:1244-1252.

[51] SHE W,HUO L J,TIAN Z,et al.A double steganography model combining blockchain and interplanetary file system[J].Peer-to-peer networking and applications,2021,14(5):3029-3042.

[52] 夏冬,韦早裕,徐科,等.基于图像信息隐藏的能源区块链私钥存储算法[J].电力系统及其自动化学报,2019,31(1):7-11.XIA D,WEI Z Y,XU K,et al.Energy blockchain private key storage algorithm based on image information hiding[J].Proceedings of the CSU-EPSA,2019,31(1):7-11.

[53] SHENSA M J.The discrete wavelet transform:wedding the a trous and Mallat algorithms[J].IEEE transactions on signal processing,1992,40(10):2464-2482.

[54] LIU S,LIU Y X,FENG C,et al.Blockchain privacy data protection method based on HEVC video steganography[C]//2020 3rd International Conference on Smart BlockChain (SmartBlock).Zhengzhou:IEEE Press,2020:1-6.

[55] LIU Y X,LIU S Y,ZHAO H G,et al.A new data hiding method for H.265/HEVC video streams without intra-frame distortion drift[J].Multimedia tools and applications,2019,78(6):6459-6486.

[56] 李彦峰,丁丽萍,吴敬征,等.区块链环境下的新型网络隐蔽信道模型研究[J].通信学报,2019,40(5):67-78.LI Y F,DING L P,WU J Z,et al.Research on a new network covert channel model in blockchain environment[J].Journal on communications,2019,40(5):67-78.

[57] 吕婧淑,操晓春.基于比特币系统的隐蔽通信技术[J].信息安全学报,2021,6(2):143-152.LV J S,CAO X C.Covert communication technology based on bitcoin[J].Journal of cyber security,2021,6(2):143-152.

[58] TALEBY AHVANOOEY M,LI Q M,HOU J,et al.Modern text hiding,text steganalysis,and applications:a comparative analysis[J].Entropy,2019,21(4):355.

[59] 梁竣.网络存储隐蔽信道检测的改进与优化仿真[J].计算机仿真,2017,34(2):406-409.LIANG J.The improvement and optimization of the network storage covert channel test simulation[J].Computer simulation,2017,34(2):406-409.

[60] 刘佳,柯彦,雷雨,等.生成对抗网络在图像隐写中的应用[J].武汉大学学报(理学版),2019,65(2):139-152.LIU J,KE Y,LEI Y,et al.Application of generative adversarial network in image steganography[J].Journal of Wuhan university (natural science edition),2019,65(2):139-152.

[61] 黄思远,张敏情,柯彦,等.基于显著性检测的图像隐写分析方法[J].计算机应用,2021,41(2):441-448.HUANG S Y,ZHANG M Q,KE Y,et al.Image steganalysis method based on saliency detection[J].Journal of computer applications,2021,41(2):441-448.

[62] ARCHIBALD R,GHOSAL D.A comparative analysis of detection metrics for covert timing channels[J].Computers & security,2014,45:284-292.

[63] GILES J,HAJEK B.An information-theoretic and game-theoretic study of timing channels[J].IEEE transactions on information theory,2002,48(9):2455-2477.

[64] KANG M H,MOSKOWITZ I S.A pump for rapid,reliable,secure communication[EB/OL].(1993-12-01)[2021-12-25].https://dl.acm.org/doi/10.1145/168588.168604.

[65] 张焕国,韩文报,来学嘉,等.网络空间安全综述[J].中国科学:信息科学,2016,46(2):125-164.ZHANG H G,HAN W B,LAI X J,et al.Survey on cyberspace security[J].Scientia sinica(informationis),2016,46(2):125-164.

[66] 王飞跃,袁勇,王帅,等.军事区块链:从不对称的战争到对称的和平[J].指挥与控制学报,2018,4(3):175-182.WANG F Y,YUAN Y,WANG S,et al.Military blockchain:from asymmetric warfare to symmetric peace[J].Journal of command and control,2018,4(3):175-182.

Basic Information:

DOI:10.13705/j.issn.1671-6841.2022083

China Classification Code:TP311.13;TN918

Citation Information:

[1]SHE Wei,RONG Xinpeng,JIA Jun ,et al.Technology Development and Research Status of Blockchain Covert Communication and Detection Methods[J].Journal of Zhengzhou University(Natural Science Edition),2022,54(06):1-11.DOI:10.13705/j.issn.1671-6841.2022083.

Fund Information:

国家自然科学基金项目(62176239); 河南省高校科技创新人才支持计划项目(21HASTIT031); 河南省重点研发与推广专项(212102310039,212102310554); 河南省重大公益专项(201300210300); 郑州大学教育教学改革研究与实践项目(2021ZZUJGLX168)

Received:  

2022-04-10

Received Year:  

2022

Accepted:  

2022-09-01

Accepted Year:  

2022

Revised:  

2022-06-24

Review Duration(Year):  

1

Published:  

2022-07-05

Publication Date:  

2022-07-05

Online:  

2022-07-05

quote

GB/T 7714-2015
MLA
APA
Search Advanced Search