Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage

被引:6
作者
Zhang, Qingyang [1 ]
Zhang, Zhiming [1 ]
Cui, Jie [1 ]
Zhong, Hong [1 ]
Li, Yang [2 ]
Gu, Chengjie [3 ]
He, Debiao [4 ,5 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Key Lab Intelligent Comp & Signal Proc, Anhui Engn Lab IoT Secur Technol,Minist Educ, Hefei 230039, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Anhui, Peoples R China
[3] Anhui Univ Sci & Technol, Sch Publ Secur & Emergency Management, Hefei 231131, Peoples R China
[4] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[5] Matrix Elements Technol, Shanghai Key Lab Privacy Preserving Computat, Shanghai 201204, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Blockchains; Cloud computing; Data integrity; Indexes; Smart contracts; Public key; Metadata; Multi-copy; data auditing; efficiency; blockchain; decentralized storage; polynomial commitment; CHALLENGES;
D O I
10.1109/TPDS.2023.3323155
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the disruptor of cloud storage, decentralized storage could lead to a major shift in how organizations store data in the future. To ensure data availability, users generally encrypt the data and distribute it to multiple storage service providers. It is necessary to study data integrity verification in decentralized storage. Although some recent studies have proposed the using blockchain technology to assist auditing work in decentralized storage networks, the on-chain overhead still increases linearly with an increase in audit requests. Blockchain networks will inevitably be overloaded. In this study, we propose an efficient data integrity auditing scheme for multiple copies in decentralized storage. Particularly, using different polynomial commitment schemes, we first propose a basic scheme for verifying multiple copies of a single file, and then we propose an efficient batch auditing scheme for multiple copies of multiple files. Our scheme can significantly reduce the computation overhead of storage service providers while keeping the on-chain storage overhead constant. Security analysis and performance analysis show that our scheme is efficient and practical.
引用
收藏
页码:3162 / 3173
页数:12
相关论文
共 30 条
  • [11] Gabizon Ariel., 2020, Report 2020/081
  • [12] On the Size of Pairing-Based Non-interactive Arguments
    Groth, Jens
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 305 - 326
  • [13] Kate A, 2010, LECT NOTES COMPUT SC, V6477, P177, DOI 10.1007/978-3-642-17373-8_11
  • [14] Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
    Li, Jiguo
    Yan, Hao
    Zhang, Yichen
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 356 - 365
  • [15] Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings
    Maller, Mary
    Bowe, Sean
    Kohlweiss, Markulf
    Meiklejohn, Sarah
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2111 - 2128
  • [16] Nakamoto S, 2019, BITCOIN PEER TO PEER, DOI DOI 10.2139/SSRN.3440802
  • [17] Reinsel D., 2018, DIGITISATION WORLD R
  • [18] Shacham H, 2008, LECT NOTES COMPUT SC, V5350, P90, DOI 10.1007/978-3-540-89255-7_7
  • [19] Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage
    Tian, Guohua
    Hu, Yunhan
    Wei, Jianghong
    Liu, Zheli
    Huang, Xinyi
    Chen, Xiaofeng
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3941 - 3954
  • [20] Wang C, 2010, IEEE INFOCOM SER