Identity-based public auditing for cloud storage systems against malicious auditors via blockchain

被引:85
作者
Xue, Jingting [1 ]
Xu, Chunxiang [1 ]
Zhao, Jining [1 ,2 ]
Ma, Jianfeng [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Ctr Cyber Secur, Chengdu 611731, Sichuan, Peoples R China
[2] Emory Univ, Dept Math & Comp Sci, Atlanta, GA 30322 USA
[3] Xidian Univ, Sch Comp Sci, Xian 710071, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
cloud storage; public integrity auditing; identity-based cryptography; blockchain; security analysis; EFFICIENT; VERIFICATION; SECURITY; SCHEME;
D O I
10.1007/s11432-018-9462-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage systems provide users with convenient data storage services, which allow users to access and update outsourced data remotely. However, these cloud storage services do not guarantee the integrity of the data that users store in the cloud. Thus, public auditing is necessary, in which a third-party auditor (TPA) is delegated to audit the integrity of the outsourced data. This system allows users to enjoy on-demand cloud storage services without the burden of continually auditing their data integrity. However, certain TPAs might deviate from the public auditing protocol and/or collude with the cloud servers. In this article, we propose an identity-based public auditing (IBPA) scheme for cloud storage systems. In IBPA, the nonces in a blockchain are employed to construct unpredictable and easily verified challenge messages, thereby preventing the forging of auditing results by malicious TPAs to deceive users. Users need only to verify the TPAs' auditing results in batches to ensure the integrity of their data that are stored in the cloud. A detailed security analysis shows that IBPA can preserve data integrity against various attacks. In addition, a comprehensive performance evaluation demonstrates that IBPA is feasible and efficient.
引用
收藏
页数:16
相关论文
共 33 条
[1]   Outsourced Proofs of Retrievability [J].
Armknecht, Frederik ;
Bohli, Jens-Matthias ;
Karame, Ghassan O. ;
Liu, Zongren ;
Reuter, Christian A. .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :831-843
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Buterin V., 2015, On public and private blockchains
[4]   Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation [J].
Jiang, Tao ;
Chen, Xiaofeng ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) :2363-2373
[5]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[6]   Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems [J].
Li, Yannan ;
Yu, Yong ;
Min, Geyong ;
Susilo, Willy ;
Ni, Jianbing ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) :72-83
[7]   Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates [J].
Liu, Chang ;
Chen, Jinjun ;
Yang, Laurence T. ;
Zhang, Xuyun ;
Yang, Chi ;
Ranjan, Rajiv ;
Kotagiri, Ramamohanarao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2234-2244
[8]  
Liu XM, 2013, LECT NOTES COMPUT SC, V8223, P238, DOI 10.1007/978-3-642-41428-2_19
[9]  
Nakamoto S., 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
[10]   On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage [J].
Ni, Jianbing ;
Yu, Yong ;
Mu, Yi ;
Xia, Qi .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (10) :2760-2761