the crypto-currency (BTC) without requiring a cen-
tral authority (e.g., a financial institution) to oversee
or validate the transaction (Nakamoto, 2008). In the
Bitcoin platform, a user can have one or more wallets
storing the BTC. Although in practical, there is no
actual storage of coins involved. This is due to how
Bitcoin is implemented.
6.2 Blockchain
Bitcoin is powered by the blockchain technology, a
public ledger of every transaction made on the plat-
form. A transaction is actually a transfer of coins
signed with the recipients public key. Each coin is
associated with an address and a transaction is sim-
ply a trade of coins from one address to another (Pil-
kington, 2016). A wallet on the other hand is actually
the cryptographic key-pair (private-public key). The-
refore, this key-pair can be used to trace how much
spending a wallet has made or how much money it
has received to derive the balance left in a wallet.
A blockchain with one node is basically a simple
linked list data structure. The ingenuity of blockchain
is when multiple nodes are involved to form a decen-
tralized distributed system. Every node in the system
has a copy of the entire blockchain. No central aut-
hority is needed to verify the authenticity of a copy
of the blockchain (Brito and Castillo, 2013). When a
transaction is made, it is broadcasted to the network,
where the mining nodes add them to the block they
are creating. The completed block will then be broad-
casted to the network where the network will agree to
add it to their copy of blockchain based on consensus.
Blockchains can be utilized as smart contracts, which
facilitate and enforce the negotiation of a contract in
the IoT (Xu et al., 2017).
7 CONCLUSION AND FUTURE
WORK
A TUF-based decentralized implementation carries
the benefit of protection against a single point of fai-
lure and DoS attacks. To a certain extent, it also re-
moves the need of a central authority to manage trust
and therefore the user would not need to trust a sin-
gle central authority but leave to a decentralized trus-
tless system in place to manage the trust. However,
such a solution as mentioned in this paper is not wit-
hout its own issues and more research is needed to
strengthen the idea and mitigate these issues. A final
solution is still in the process of being explored that
could either be BitTorrent-like or with combination
of a blockchain. The decentralized trustless system
if successfully implemented, could be used for more
than just for verifying Docker images, but on any ot-
her data types. By conducting performance evalua-
tion through extensive trace-driven simulations, expe-
rimental results illustrate the scalability and efficiency
of the blockchain-based solution.
REFERENCES
Arumugam, R. V., Xu, Q., Shi, H., Cai, Q., and Wen,
Y. (2014). Virt cache: Managing virtual disk per-
formance variation in distributed file systems for the
cloud. In CloudCom, pages 210–217.
Benet, J. (2014). Ipfs-content addressed, versioned, p2p file
system. arXiv preprint arXiv:1407.3561.
Brito, J. and Castillo, A. (2013). Bitcoin: A primer for poli-
cymakers. Mercatus Center at George Mason Univer-
sity.
Bui, T. (2015). Analysis of docker security. arXiv preprint
arXiv:1501.02967.
Datadog (2016). 8 surprising facts about real
docker adoption - datadog. Retrieved from
https://www.datadoghq.com/dockeradoption/.
Khandelwal, S. (2016). Dirty cow critical linux ker-
nel flaw being exploited in the wild. Retrieved
from http://thehackernews.com/2016/10/linux-kernel-
exploit.html.
Matzutt, R., Hohlfeld, O., Henze, M., Rawiel, R., Zie-
geldorf, J. H., and Wehrle, K. (2016). Poster: I
don’t want that content! on the risks of exploiting bit-
coin’s blockchain as a content store. In Proceedings of
the 2016 ACM SIGSAC Conference on Computer and
Communications Security, pages 1769–1771.
Merkel, D. (2014). Docker: lightweight linux containers for
consistent development and deployment. Linux Jour-
nal, 2014(239):2.
Mnica, D. (2015). Introducing docker content trust. Retrie-
ved from https://blog.docker.com/2015/08/content-
trust-docker-1-8/.
mrled (2017). No way to disable trust-on-first-use for ’doc-
ker pull’ with content trust #342. Retrieved from
https://github.com/docker/notary/issues/342.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. URL: http://www.bitcoin.org/bitcoin.pdf.
Pilkington, M. (2016). Blockchain technology: princi-
ples and applications. Research Handbook on Digital
Transformations.
Samuel, J., Mathewson, N., Cappos, J., and Dingledine, R.
(2010). Survivable key compromise in software up-
date systems. In Proceedings of the 17th ACM confe-
rence on Computer and communications security, pa-
ges 61–72.
TUF-spec (2017). The update frame-
work specification. Retrieved from
https://raw.githubusercontent.com/theupdateframework-
/tuf/develop/docs/tuf-spec.txt.
Xu, Q., Aung, K. M. M., Zhu, Y., and Yong, K. L.
(2016). Building a large-scale object-based active
storage platform for data analytics in the internet of
things. The Journal of Supercomputing, 72(7):2796–
2814.
IoTBDS 2017 - 2nd International Conference on Internet of Things, Big Data and Security
436