Blockchain based Data Integrity Service Framework for IoT data

被引:239
作者
Liu, Bin [1 ,2 ]
Yu, Xiao Liang [2 ]
Chen, Shiping [1 ,2 ]
Xu, Xiwei [2 ]
Zhu, Liming [1 ,2 ]
机构
[1] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW, Australia
[2] CSIRO, Data61, Canberra, ACT, Australia
来源
2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017) | 2017年
关键词
Blockchain; IoT; Data Integrity Verification; DATA POSSESSION; BIG DATA; STORAGE;
D O I
10.1109/ICWS.2017.54
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is a challenge to ensure data integrity for cloud-based Internet of Things (IoT) applications because of the inherently dynamic nature of IoT data. The available frameworks of data integrity verification with public auditability cannot avoid the Third Party Auditors (TPAs). However, in a dynamic environment, such as the IoT, the reliability of the TPA-based frameworks is far from being satisfactory. In this paper, we propose a blockchain-based framework for Data Integrity Service. Under such framework, a more reliable data integrity verification can be provided for both the Data Owners and the Data Consumers, without relying on any Third Party Auditor (TPA). In this paper, the relevant protocols and a subsequent prototype system, which is implemented to evaluate the feasibility of our proposals, are presented. The performance evaluation of the implemented prototype system is conducted, and the test results are discussed. The work lays a foundation for our future work on dynamic data integrity verification in a fully decentralized environment.
引用
收藏
页码:468 / 475
页数:8
相关论文
共 21 条
  • [1] Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
  • [2] [Anonymous], 2016, INT C BUS PROC MAN
  • [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [4] Benet J., 2014, CORRABS14073561
  • [5] RAID - HIGH-PERFORMANCE, RELIABLE SECONDARY STORAGE
    CHEN, PM
    LEE, EK
    GIBSON, GA
    KATZ, RH
    PATTERSON, DA
    [J]. ACM COMPUTING SURVEYS, 1994, 26 (02) : 145 - 185
  • [6] MR-PDP: Multiple-Replica Provable Data Possession
    Curtmola, Reza
    Khan, Osama
    Burns, Randal
    Ateniese, Giuseppe
    [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 411 - +
  • [7] Gray J., 1981, P VLDB, P144
  • [8] Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
    Jiang, Tao
    Chen, Xiaofeng
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2363 - 2373
  • [9] Jinhui Yao, 2010, Proceedings 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGrid), P600, DOI 10.1109/CCGRID.2010.17
  • [10] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584