Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

被引:1
作者
Yan, Hao [1 ,2 ]
Liu, Yanan [1 ]
Qiu, Shuo [1 ]
Hu, Shengzhou [3 ]
Zhang, Weijian [4 ]
Xia, Jinyue [5 ]
机构
[1] Jinling Inst Technol, Sch Network Secur, Nanjing 211169, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[3] Gannan Normal Univ, Dept Math & Comp Sci, Ganzhou 341000, Peoples R China
[4] Hohai Univ, Network Secur & Informat Off, Nanjing 210098, Peoples R China
[5] Int Business Machines Corp IBM, New York, NY USA
来源
COMPUTER SYSTEMS SCIENCE AND ENGINEERING | 2022年 / 41卷 / 03期
基金
中国国家自然科学基金;
关键词
Blockchain; cloud-IoT; data integrity checking; homomorphic hash function; batch audition; DATA POSSESSION CHECKING; STORAGE MECHANISM; INTERNET; SCHEME; VERIFICATION; SECURITY; PROTOCOL; THINGS;
D O I
10.32604/csse.2022.022317
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be out sourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third Party Auditor (TPA) which is assumed to be trustful. However, in real-life TPA is not trusted as people thought. Therefore, these schemes suffer from the underlying problem of single-point failure. Moreover, most of the traditional schemes are designed by RSA or bilinear map techniques which consume heavy computation and communication cost. To overcome these shortcomings, we propose a novel data integrity checking scheme for cloud-IoT data based on blockchain technique and homomorphic hash. In our scheme, the tags of all data blocks are computed by a homomorphic hash function and stored in blockchain. Moreover, each step within the process of data integrity checking is signed by the performer, and the signatures are stored in blockchain through smart contracts. As a result, each behavior for data integrity checking in our scheme can be traced and audited which improves the security of the scheme greatly. Furthermore, batch-audition for multiple data challenges is also supported in our scheme. We formalize the system model of our scheme and give the concrete construction. Detailed performance analyses demonstrate that our proposed scheme is efficient and practical without the trust-assumption of TPA.
引用
收藏
页码:1129 / 1142
页数:14
相关论文
共 41 条
  • [1] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [2] Integration of Cloud computing and Internet of Things: A survey
    Botta, Alessio
    de Donato, Walter
    Persico, Valerio
    Pescape, Antonio
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 684 - 700
  • [3] Data dynamics for remote data possession checking in cloud storage
    Chen, Lanxiang
    Zhou, Shuming
    Huang, Xinyi
    Xu, Li
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2413 - 2424
  • [4] Blockchain-Based Dynamic Provable Data Possession for Smart Cities
    Chen, Ruonan
    Li, Yannan
    Yu, Yong
    Li, Huilin
    Chen, Xiaofeng
    Susilo, Willy
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) : 4143 - 4154
  • [5] Stochastic Blockchain for IoT Data Integrity
    Chen, Yu-Jia
    Wang, Li-Chun
    Wang, Shu
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (01): : 373 - 384
  • [6] Dong GF, 2020, 2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), P246, DOI 10.1109/ICBDA49040.2020.9101201
  • [7] THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network
    Fang, Liming
    Li, Yang
    Yun, Xinyu
    Wen, Zhenyu
    Ji, Shouling
    Meng, Weizhi
    Cao, Zehong
    Tanveer, M.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (07): : 5745 - 5759
  • [8] Revocable Attribute-Based Encryption With Data Integrity in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2864 - 2872
  • [9] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [10] Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Ge, Chunpeng
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1214 - 1226