Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain

被引:37
作者
Yang, Xiaodong [1 ]
Pei, Xizhen [1 ]
Wang, Meiding [1 ]
Li, Ting [1 ]
Wang, Caifen [1 ,2 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
[2] Shenzhen Technol Univ, Coll Big Data & Internet, Shenzhen 518118, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Cloud computing; Servers; Data integrity; Cryptography; Computational modeling; Blockchain; certificateless cryptosystem; cloud storage; data dynamic update; identity tracking; multi-cloud; multi-replica; DATA POSSESSION; USER REVOCATION; SHARED DATA; SECURE; EFFICIENT; CHECKING;
D O I
10.1109/ACCESS.2020.3014510
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage services provide convenient data storage services for individuals and enterprises. Data owners can remotely access and update outsourcing data. But there are still many security problems, such as data integrity. Although the public audit schemes allow users to authorize third-party auditors (TPA) to verify the integrity of cloud data, there are still a series of problems in the existing public audit schemes. First of all, most of the existing schemes are based on the traditional or identity public key infrastructure. There is a problem of certificate management or key escrow. And they do not support dynamic data update and user identity tracking for group users. Then, existing multi-replica data public audit schemes store all replicas on a cloud storage server. Once the cloud server fails, all replicas will be damaged. Finally, most existing schemes require TPA to be trusted. In practice, TPA may deviate from the public audit protocol or collude with cloud servers to deceive users. To solve these problems, we propose a certificateless multi-replica and multi-cloud data public audit scheme based on blockchain technology. In our scheme, the dynamic hash table and modification record table are introduced to achieve dynamic update of group user data and identity tracking. All replicas are stored in different cloud servers, and their integrity can be audited at the same time. In addition, we use the unpredictability of blocks in the blockchain to construct fair challenge information, thereby preventing malicious TPA and cloud servers from colluding to deceive users. Each audit result is written into the blockchain, which is convenient for users to audit the behavior of TPA. The analysis results show that our proposed scheme is secure in the random oracle model and has higher efficiency in communication and computation cost compared with similar schemes.
引用
收藏
页码:144809 / 144822
页数:14
相关论文
共 51 条
[1]  
[Anonymous], 2014, AUTOMAT SOFTW ENG, DOI DOI 10.1007/S10515-014-0142-6
[2]  
[Anonymous], 2007, CCS07 P 14 ACM C
[3]  
[Anonymous], 2003, ADV CRYPTOLOGY ASIAC
[4]  
[Anonymous], 2018, INT CONF INFO SCI
[5]   Outsourced Proofs of Retrievability [J].
Armknecht, Frederik ;
Bohli, Jens-Matthias ;
Karame, Ghassan O. ;
Liu, Zongren ;
Reuter, Christian A. .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :831-843
[6]  
Ateniese G., 2008, P INT WORKSH SEC, P1
[7]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[8]  
Buterin V., 2015, VISIONS 1
[9]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[10]  
Cachin Christian, 2009, SIGACT News, V40, P81, DOI 10.1145/1556154.1556173