Blockchain assisted blind signature algorithm with data integrity verification scheme

被引:0
作者
Shrivastava, Pranav [1 ]
Alam, Bashir [1 ]
Alam, Mansaf [1 ]
机构
[1] Jamia Millia Islamia, Dept Comp Engn, Delhi 110025, India
关键词
blind signature algorithm; blockchain; data integrity verification; evidence generation; lattice cryptography; puzzle optimization algorithm; upgraded Merkle tree; vacuum filter; STORAGE MECHANISM; EFFICIENT; SECURE;
D O I
10.1002/cpe.8071
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As the demand for cloud storage systems increases, ensuring the security and integrity of cloud data becomes a challenge. Data uploaded to cloud systems are vulnerable to numerous sorts of assaults, which must be handled appropriately to avoid data tampering issues. In addition, quantum computers are expected to be introduced soon, which may face multiple security issues by destroying all traditional cryptosystems. This work introduces a quantum-resistant blockchain centered data integrity verification system with the use of several techniques. Initially, the keys and signatures are generated by the users with the help of the lattice-based blind signature algorithm (L_BSA), which is a combination of lattice cryptography and a blind signature algorithm. From the generated random keys, the most optimal key is then selected by the Puzzle Optimization Algorithm (POA), which is then made available to the encryption phase. Then, the upgraded Merkle tree-assisted vacuum filter (Vac-UMT) algorithm is executed to accomplish the encryption task. Then the data are converted into blocks using blockchain technology and uploaded to the cloud. When receiving the audit requests, the verification process is carried out, and the evidence report is generated for the users. The proposed work is simulated in JAVA and assessed with the UNSW-NB15 dataset, and the outcomes demonstrated that the system is highly efficient and secure.
引用
收藏
页数:19
相关论文
共 43 条
  • [1] BLAZE: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications
    Alkadri, Nabil Alkeilani
    El Bansarkhani, Rachid
    Buchmann, Johannes
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12059 : 484 - 502
  • [2] Atieh A. T., 2021, ResearchBerg Review of Science and Technology, V1
  • [3] BPIIoT: A Light-Weighted Blockchain-Based Platform for Industrial IoT
    Bai, Li
    Hu, Mi
    Liu, Min
    Wang, Jingwei
    [J]. IEEE ACCESS, 2019, 7 : 58381 - 58393
  • [4] Boneh D., 2001, LNCS, P514, DOI DOI 10.1007/3-540-45682-1_30
  • [5] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
  • [6] Blockchain-based random auditor committee for integrity verification
    Chen, Lanxiang
    Fu, Qingxiao
    Mu, Yi
    Zeng, Lingfang
    Rezaeibagha, Fatemeh
    Hwang, Min-Shiang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 183 - 193
  • [7] Cui H., TRUSTLESS GQ MULTI S
  • [8] A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems
    Deebak, B. D.
    Memon, Fida Hussain
    Khowaja, Sunder Ali
    Dev, Kapal
    Wang, Weizheng
    Qureshi, Nawab Muhammad Faseeh
    Su, Chunhua
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (08): : 6652 - 6660
  • [9] Blockchain-based delegated Quantum Cloud architecture for medical big data security
    El Azzaoui, Abir
    Sharma, Pradip Kumar
    Park, Jong Hyuk
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 198
  • [10] Amplifying victim vulnerability: Unanticipated harm and consequence in data breach notification policy
    Gibson, Dennis
    Harfield, Clive
    [J]. INTERNATIONAL REVIEW OF VICTIMOLOGY, 2023, 29 (03) : 341 - 365