Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage

被引:13
作者
Zhang, Qingyang [1 ]
Zhang, Zhiming [1 ]
Cui, Jie [1 ]
Zhong, Hong [1 ]
Li, Yang [2 ]
Gu, Chengjie [3 ]
He, Debiao [4 ,5 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Key Lab Intelligent Comp & Signal Proc, Anhui Engn Lab IoT Secur Technol,Minist Educ, Hefei 230039, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Anhui, Peoples R China
[3] Anhui Univ Sci & Technol, Sch Publ Secur & Emergency Management, Hefei 231131, Peoples R China
[4] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[5] Matrix Elements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Blockchains; Cloud computing; Data integrity; Indexes; Smart contracts; Public key; Metadata; Multi-copy; data auditing; efficiency; blockchain; decentralized storage; polynomial commitment; CHALLENGES;
D O I
10.1109/TPDS.2023.3323155
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the disruptor of cloud storage, decentralized storage could lead to a major shift in how organizations store data in the future. To ensure data availability, users generally encrypt the data and distribute it to multiple storage service providers. It is necessary to study data integrity verification in decentralized storage. Although some recent studies have proposed the using blockchain technology to assist auditing work in decentralized storage networks, the on-chain overhead still increases linearly with an increase in audit requests. Blockchain networks will inevitably be overloaded. In this study, we propose an efficient data integrity auditing scheme for multiple copies in decentralized storage. Particularly, using different polynomial commitment schemes, we first propose a basic scheme for verifying multiple copies of a single file, and then we propose an efficient batch auditing scheme for multiple copies of multiple files. Our scheme can significantly reduce the computation overhead of storage service providers while keeping the on-chain storage overhead constant. Security analysis and performance analysis show that our scheme is efficient and practical.
引用
收藏
页码:3162 / 3173
页数:12
相关论文
共 30 条
[1]   Blockchain technology in the energy sector: A systematic review of challenges and opportunities [J].
Andoni, Merlinda ;
Robu, Valentin ;
Flynn, David ;
Abram, Simone ;
Geach, Dale ;
Jenkins, David ;
McCallum, Peter ;
Peacock, Andrew .
RENEWABLE & SUSTAINABLE ENERGY REVIEWS, 2019, 100 :143-174
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Barsoum A. F., 2010, Report, V32
[4]  
Benet Juan., 2018, PROTOC LABS, P1
[5]  
Benet Juan, 2014, arXiv
[6]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[7]  
Boneh D., 2020, Cryptology ePrint Archive
[8]   MR-PDP: Multiple-Replica Provable Data Possession [J].
Curtmola, Reza ;
Khan, Osama ;
Burns, Randal ;
Ateniese, Giuseppe .
28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, :411-+
[9]  
Du Y., 2022, IEEE Trans. Dependable Secure Comput., V19, P30380
[10]   The Algebraic Group Model and its Applications [J].
Fuchsbauer, Georg ;
Kiltz, Eike ;
Loss, Julian .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 :33-62