Abstract
As online sources are becoming more prevalent in journalism and scientific literature, the ephemeral nature of the World Wide Web is becoming an increasingly serious issue for their verifiability, replicability, and reproducibility. The architecture of Webchain, a new system enabling source and reference verifiability on the Web, is combining distributed ledger technologies with secure timestamping to ensure the history of creation, ownership, and referential integrity of online resources. We present the architecture and system extensions, conduct a security analysis, and evaluate the Webchain system based on a comprehensive prototype implementation. The results confirm the feasibility and robustness of our approach.
- R. Arends, R. Austein, M. Larson, D. Massey, and S. Rose. 2005. DNS Security Introduction and Requirements. RFC 4033 (Proposed Standard). Retrieved from https://www.rfc-editor.org/rfc/rfc4033.txt. DOI:https://doi.org/10.17487/RFC4033Google Scholar
- Dominik Aronsky, Sina Madani, Randy J. Carnevale, Stephany Duda, and Michael T. Feyder. 2007. The prevalence and inaccessibility of Internet references in the biomedical literature at the time of publication. J. Amer. Med. Info. Assoc. 14, 2 (2007), 232--234.Google Scholar
Cross Ref
- Mohamed Aturban, Michael L. Nelson, and Michele C. Weigle. 2017. Difficulties of timestamping archived web pages. CoRR abs/1712.03140 (2017). arXiv:1712.03140Google Scholar
- Juan Benet. 2014. IPFS—Content addressed, versioned, P2P file system. CoRR abs/1407.3561 (2014). arXiv:1407.3561Google Scholar
- Daniel J. Bernstein. 2006. Curve25519: New Diffie-Hellman speed records. In Proceedings of the 9th International Conference on Theory and Practice of Public-Key Cryptography (PKC’06). 207--228.Google Scholar
Digital Library
- Daniel J. Bernstein. 2008. The Salsa20 family of stream ciphers. In New Stream Cipher Designs—The eSTREAM Finalists. 84--97.Google Scholar
- Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. 2012. High-speed high-security signatures. J. Cryptogr. Eng. 2, 2 (2012), 77--89. DOI:https://doi.org/10.1007/s13389-012-0027-1Google Scholar
Cross Ref
- BTC.com. 2018. Pool Distribution. Retrieved from https://btc.com/stats/pool?pool_mode̍week.Google Scholar
- Michael J. Bugeja and Daniela Dimitrova. 2005. Exploring the half-life of Internet footnotes. Iowa J. Commun. 37, 1 (2005), 77.Google Scholar
- J. Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer. 2007. OpenPGP Message Format. RFC 4880 (Proposed Standard). Retrieved from https://www.rfc-editor.org/rfc/rfc4880.txt. DOI:https://doi.org/10.17487/RFC4880Google Scholar
- D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard). Retrieved from https://www.rfc-editor.org/rfc/rfc5280.txt. DOI:https://doi.org/10.17487/RFC5280Google Scholar
- Robert P. Dellavalle, Eric J. Hester, Lauren F. Heilig, Amanda L. Drake, Jeff W. Kuntzman, Marla Graber, and Lisa M. Schilling. 2003. Going, going, gone: Lost Internet references. Science 302, 5646 (2003), 787--788.Google Scholar
- Gunther Eysenbach and Mathieu Trudel. 2005. Going, going, still there: Using the WebCite service to permanently archive cited web pages. JMIR 7, 5 (Dec. 2005).Google Scholar
- Michael Factor, Ealan Henis, Dalit Naor, Simona Rabinovici-Cohen, Petra Reshef, Shahar Ronen, Giovanni Michetti, and Maria Guercio. 2009. Authenticity and provenance in long term digital preservation: Modeling and implementation in preservation aware storage. In Proceedings of the 1st Workshop on the Theory and Practice of Provenance (TaPP’09).Google Scholar
- Federal Inf. Process. Stds. (NIST FIPS). 2015. FIPS PUB 180-4. Secure hash standard. Retrieved from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf.Google Scholar
- Conner Fromknecht, Dragos Velicanu, and Sophia Yakoubov. 2014. A decentralized public key infrastructure with identity retention. IACR Cryptol. ePrint Arch. 2014 (2014), 803.Google Scholar
- Christina Garman, Matthew Green, and Ian Miers. 2014. Decentralized anonymous credentials. In Proceedings of the Network and Distributed System Security Symposium (NDSS’14).Google Scholar
Cross Ref
- Arthur Gervais, Ghassan Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security (CCS’16).Google Scholar
Digital Library
- Stevyn Gibson. 2004. Open source intelligence: An intelligence lifeline. RUSI J. 149, 1 (2004), 16--22.Google Scholar
Cross Ref
- Gregory Grefenstette and Pasi Tapanainen. 1994. What is a word, what is a sentence?: Problems of tokenisation.Google Scholar
- Stuart Haber and W. Scott Stornetta. 1990. How to time-stamp a digital document. In Proceedings of the 10th Conference on Advances in Cryptology (CRYPTO’90), Alfred Menezes and Scott A. Vanstone (Eds.). 437--455.Google Scholar
- Ragib Hasan, Radu Sion, and Marianne Winslett. 2009. Preventing history forgery with secure provenance. Trans. Stor. 5, 4 (2009), 12:1--12:43.Google Scholar
- Javier C. Hernandez. 2017. Leading Western Publisher Bows to Chinese Censorship. Retrieved from https://nyti.ms/2z3K5aZ.Google Scholar
- P. Hoffman and J. Schlyter. 2012. The DNS-based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA. RFC 6698 (Proposed Standard). Retrieved from https://www.rfc-editor.org/rfc/rfc6698.txt. DOI:https://doi.org/10.17487/RFC6698Google Scholar
- Trung Dong Huynh and Luc Moreau. 2014. ProvStore: A public provenance repository. In Proceedings of the 5th International Provenance and Annotation Workshop (IPAW’14). 275--277.Google Scholar
- Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nick Briggs, and Rebecca Braynard. 2012. Networking named content. Commun. ACM 55, 1 (2012), 117--124.Google Scholar
Digital Library
- David Karpf. 2012. Social science research methods in Internet time. Info. Commun. Soc. 15, 5 (2012), 639--661.Google Scholar
Cross Ref
- Wallace Koehler. 2004. A longitudinal study of Web pages continued: A consideration of document persistence. Info. Res. 9, 2 (2004), 9--2.Google Scholar
- Tobias Kuhn and Michel Dumontier. 2015. Making digital artifacts on the web verifiable and reliable. IEEE Trans. Knowl. Data Eng. 27, 9 (2015), 2390--2400.Google Scholar
Digital Library
- The Go Programming Language. 2019. Website. Retrieved from https://golang.org.Google Scholar
- Bob Lantz, Brandon Heller, and Nick McKeown. 2010. A network in a laptop: Rapid prototyping for software-defined networks. In Proceedings of the 9th ACM Workshop on Hot Topics in Networks (HotNets’10). 19.Google Scholar
Digital Library
- Xueping Liang, Sachin Shetty, Deepak K. Tosh, Charles A. Kamhoua, Kevin A. Kwiat, and Laurent Njilla. 2017. ProvChain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID’17). 468--477.Google Scholar
Digital Library
- Internet Archive: Wayback Machine. 2019. Website. Retrieved from https://archive.org/web/.Google Scholar
- Petros Maniatis, Mema Roussopoulos, Thomas J. Giuli, David S. H. Rosenthal, and Mary Baker. 2005. The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. 23, 1 (2005), 2--50.Google Scholar
Digital Library
- Petar Maymounkov and David Mazières. 2002. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02). 53--65.Google Scholar
Digital Library
- Nick McKeown, Thomas E. Anderson, Hari Balakrishnan, Guru M. Parulkar, Larry L. Peterson, Jennifer Rexford, Scott Shenker, and Jonathan S. Turner. 2008. OpenFlow: Enabling innovation in campus networks. Comput. Commun. Rev. 38, 2 (2008), 69--74.Google Scholar
Digital Library
- Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, and Michael J. Freedman. 2015. CONIKS: Bringing key transparency to end users. In Proceedings of the 24th USENIX Security Symposium (USENIX Security’15). 383--398.Google Scholar
- Ralph C. Merkle. 1987. A digital signature based on a conventional encryption function. In Proceedings of the 7th Conference on Advances in Cryptology (CRYPTO’87). 369--378.Google Scholar
- Luc Moreau. 2017. A canonical form for PROV documents and its application to equality, signature, and validation. ACM Trans. Internet Techn. 17, 4 (2017), 35:1--35:21.Google Scholar
Digital Library
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Retrieved from https://bitcoin.org/bitcoin.pdf.Google Scholar
- Namecoin. 2019. Website. Retrieved from https://namecoin.info.Google Scholar
- Y. Nir and A. Langley. 2015. ChaCha20 and Poly1305 for IETF Protocols. RFC 7539 (Informational). Retrieved from https://www.rfc-editor.org/rfc/rfc7539.txt. DOI:https://doi.org/10.17487/RFC7539Google Scholar
- U.S. National Library of Medicine National Institutes of Health. 2019. PubMed Website. Retrieved from https://www.ncbi.nlm.nih.gov/pubmed/.Google Scholar
- OpenTimestamps. 2019. Website. Retrieved from https://opentimestamps.org.Google Scholar
- David D. Palmer and Marti A. Hearst. 1997. Adaptive multilingual sentence boundary disambiguation. Comput. Linguist. 23, 2 (1997), 241--267.Google Scholar
Digital Library
- Perma.cc. 2019. Website. Retrieved from https://perma.cc.Google Scholar
- Jeffrey C. Reynar and Adwait Ratnaparkhi. 1997. A maximum entropy approach to identifying sentence boundaries. In Proceedings of the 5th Applied Natural Language Processing Conference (ANLP’97). 16--19.Google Scholar
- Richard Rogers. 2015. Digital methods for web research. Emerging Trends in the Social and Behavioral Sciences: An Interdisciplinary, Searchable, and Linkable Resource. John Wiley 8 Sons, New Jersey, 1--22.Google Scholar
- Elias Rohrer, Steffen Heidel, and Florian Tschorsch. 2018. Webchain: Verifiable citations and references for the world wide web. In Proceedings of the IEEE International Conference on Blockchain (BLOCKCHAIN’18).Google Scholar
Cross Ref
- Elias Rohrer and Florian Tschorsch. 2019. Kadcast: A structured approach to broadcast in blockchain networks. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies (ATF’19).Google Scholar
Digital Library
- João Santos, Nuno Santos, and David Dias. 2019. DClaims: A censorship resistant web annotations system using IPFS and Ethereum. Retrieved from arxiv:1912.03388.Google Scholar
- LibP2P. A Modular Networking Stack.2019. Website. Retrieved from https://libp2p.io.Google Scholar
- Ion Stoica, Robert Tappan Morris, David R. Karger, M. Frans Kaashoek, and Hari Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’01). 149--160.Google Scholar
Digital Library
- Bregtje Van der Haak, Michael Parks, and Manuel Castells. 2012. The future of journalism: Networked journalism. Int. J. Commun. 6 (2012), 16.Google Scholar
- Vue.js. 2020. Website. Retrieved from https://vuejs.org/.Google Scholar
- W3C. 2020. PROV-Overview. Retrieved from https://www.w3.org/TR/prov-overview/.Google Scholar
- W3C. 2020. Web Annotation Working Group. Retrieved from https://www.w3.org/annotation/.Google Scholar
- WordPress. 2019. Website. Retrieved from https://wordpress.org.Google Scholar
- P. Wouters. 2016. DNS-based Authentication of Named Entities (DANE) Bindings for OpenPGP. RFC 7929 (Experimental). Retrieved from https://www.rfc-editor.org/rfc/rfc7929.txt. DOI:https://doi.org/10.17487/RFC7929Google Scholar
Index Terms
Enabling Reference Verifiability for the World Wide Web with Webchain
Recommendations
World Wide Web courseware
There is an increasing demand for online courses. The so called, <i>virtual university</i>, shows how big the general public's demand for online distant education is. With rapid advance in the development of the Internet, especially the World Wide Web, ...
Data Preparation for Mining World Wide Web Browsing Patterns
The World Wide Web (WWW) continues to grow at an astounding rate in both the sheer volume of traffic and the size and complexity of Web sites. The complexity of tasks such as Web site design, Web server design, and of simply navigating through a Web ...
Usability testing of world wide web sites
CHI EA '97: CHI '97 Extended Abstracts on Human Factors in Computing SystemsWorld Wide Web (Web) site usability - for better or worse - affects millions of users on a daily basis. As the capabilities of the Web continue to expand through HTML extensions, VRML, Java, and ActiveX, site designers are becoming overwhelmed by a ...






Comments