SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain

被引:0
作者
Korlapati, Ajay Chandra [1 ]
Nayak, Sanjeet Kumar [1 ]
Chakraborty, Partha Sarathi [2 ]
Tripathy, Somanath [2 ]
机构
[1] IIITDM Kancheepuram, Dept Comp Sci & Engn, Chennai, Tamil Nadu, India
[2] IIT Patna, Dept Comp Sci & Engn, Patna, Bihar, India
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023 | 2023年 / 14341卷
关键词
Integrity Verification; Auditing; Cloud Storage; Blockchain; Outsourced Data; Security;
D O I
10.1007/978-981-99-7032-2_35
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Storing large volumes of data is a bottleneck on edge devices. Thus, Cloud Storage Technologies have emerged as a viable alternative for large-scale data storage. However, the data owner loses control of the file (once uploaded), which may lead to data integrity issues. Even though there are existing schemes to check the integrity of the files using a thirdparty auditor, they rely on the unrealistic assumption that the auditors are completely trustworthy. It has been reported in many works of literature that auditors sometimes collude with the cloud server to cheat the system. In this paper, we propose a scheme named secure integrity verification of outsourced data in cloud storage using blockchain (SIOCEN) which protects the system from entity collusion. Using smart contract, we enforce the incentive mechanism in the scheme, which is the most appealing feature of the SIOCEN that increases fairness. The security of the proposed scheme is analysed and proved to be secure. We implement the SIOCEN system on Ethereum network and do a performance analysis, showing the effectiveness of the proposed system.
引用
收藏
页码:595 / 613
页数:19
相关论文
共 28 条
  • [1] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [2] Bentov I, 2014, LECT NOTES COMPUT SC, V8617, P421, DOI 10.1007/978-3-662-44381-1_24
  • [3] Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System
    Bodi, Bodi
    Chiu, Wei-Yang
    Meng, Weizhi
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 3 - 20
  • [4] Blockchain-Based Dynamic Provable Data Possession for Smart Cities
    Chen, Ruonan
    Li, Yannan
    Yu, Yong
    Li, Huilin
    Chen, Xiaofeng
    Susilo, Willy
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4143 - 4154
  • [5] Blockchain-based System for Secure Data Storage with Private Keyword Search
    Do, Hoang Giang
    Ng, Wee Keong
    [J]. 2017 13TH IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2017, : 90 - 93
  • [6] FairSwap: How to Fairly Exchange Digital Goods
    Dziembowski, Stefan
    Eckey, Lisa
    Faust, Sebastian
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 967 - 984
  • [7] Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT
    Fan, Kuan
    Bao, Zijian
    Liu, Mingxi
    Vasilakos, Athanasios V.
    Shi, Wenbo
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 665 - 674
  • [8] Golle P, 2003, LECT NOTES COMPUT SC, V2357, P120
  • [9] A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System
    Huang, Pei
    Fan, Kai
    Yang, Hanzhe
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    [J]. IEEE ACCESS, 2020, 8 (94780-94794) : 94780 - 94794
  • [10] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584