
@Article{cmc.2020.010949,
AUTHOR = {Ning Hu, Shi Yin, Shen Su, Xudong Jia, Qiao Xiang, Hao Liu},
TITLE = {Blockzone: A Decentralized and Trustworthy Data Plane for DNS},
JOURNAL = {Computers, Materials \& Continua},
VOLUME = {65},
YEAR = {2020},
NUMBER = {2},
PAGES = {1531--1557},
URL = {http://www.techscience.com/cmc/v65n2/39892},
ISSN = {1546-2226},
ABSTRACT = {The domain name system (DNS) provides a mapping service between 
memorable names and numerical internet protocol addresses, and it is a critical 
infrastructure of the Internet. The authenticity of DNS resolution results is crucial for 
ensuring the accessibility of Internet services. Hundreds of supplementary specifications 
of protocols have been proposed to compensate for the security flaws of DNS. However, 
DNS security incidents still occur frequently. Although DNS is a distributed system, for a 
specified domain name, only authorized authoritative servers can resolve it. Other servers 
must obtain the resolution result through a recursive or iterative resolving procedure, 
which renders DNS vulnerable to various attacks, such as DNS cache poisoning and 
distributed denial of service (DDoS) attacks. This paper proposes a novel decentralized 
architecture for a DNS data plane, which is called Blockzone. First, Blockzone utilizes 
novel mechanisms, which include on-chain authorization and off-chain storage, to 
implement a decentralized and trustworthy DNS data plane. Second, in contrast to the 
hierarchical authentication and recursive query of traditional DNS, Blockzone 
implements a decentralized operation model. This model significantly increases the 
efficiency of domain name resolution and verification and enhances the security of DNS 
against DDoS and cache poisoning attacks. In addition, Blockzone is fully compatible 
with the traditional DNS implementation and can be incrementally deployed as a plug-in 
service of DNS without changing the DNS protocol or system architecture. The 
Blockzone scheme can also be generalized to address security issues in other areas, such 
as the Internet of things and edge computing.},
DOI = {10.32604/cmc.2020.010949}
}



