Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree

被引:16
作者
He, Kai [1 ,2 ]
Shi, Jiaoli [3 ]
Huang, Chunxiao [1 ]
Hu, Xinrong [1 ,2 ]
机构
[1] Wuhan Text Univ, Sch Math & Comp Sci, Wuhan, Peoples R China
[2] Hubei Clothing Informat Engn Technol Res Ctr, Wuhan, Peoples R China
[3] Jiujiang Univ, Sch Informat Sci & Technol, Jiujiang, Peoples R China
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III | 2020年 / 12454卷
关键词
Cloud storage; Blockchain; Data integrity verification; Blockchain query;
D O I
10.1007/978-3-030-60248-2_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain based verification has recently been studied as a new emerging approach for cloud data integrity protection without a centralized third party auditor. Existing schemes are mostly limited to scalability barrier and search efficiency of blockchain, which restricts their capability to support large-scale application. To address the problem above, we propose a blockchain based integrity verification scheme for large-scale cloud data using T-Merkle Tree. In our design, data tags are generated by ZSS short signature and stored on blockchain, and a new verification method based on ZSS short signature is proposed. The integrity of cloud data can be efficiently and undeniably verified with the property of bilinear pairing by offloading the computation from verifier to prover. Furthermore, a new blockchain storage structure called T-Merkle tree and its search algorithm is designed to improves the storage utilization and supports binary search in a block. Finally, a prototype system based on Hyperledger Fabric is implemented to evaluate our scheme. Theoretic analysis and experimental results demonstrate the security and efficiency of our proposed scheme.
引用
收藏
页码:65 / 80
页数:16
相关论文
共 20 条
[1]  
Amer A, 2014, INT CONF COMPUT NETW, P907, DOI 10.1109/ICCNC.2014.6785458
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
[4]  
Lee P.C., 2015, IEEE T RELIAB, V64, P840
[5]   ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability [J].
Liang, Xueping ;
Shetty, Sachin ;
Tosh, Deepak ;
Kamhoua, Charles ;
Kwiat, Kevin ;
Njilla, Laurent .
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, :468-477
[6]   Blockchain based Data Integrity Service Framework for IoT data [J].
Liu, Bin ;
Yu, Xiao Liang ;
Chen, Shiping ;
Xu, Xiwei ;
Zhu, Liming .
2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, :468-475
[7]   Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates [J].
Liu, Chang ;
Chen, Jinjun ;
Yang, Laurence T. ;
Zhang, Xuyun ;
Yang, Chi ;
Ranjan, Rajiv ;
Kotagiri, Ramamohanarao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2234-2244
[8]  
Nakamoto S., 2008, Bitcoin
[9]   Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud [J].
Wang, Boyang ;
Li, Baochun ;
Li, Hui .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (01) :92-106
[10]   Block Chain-Based Data Audit and Access Control Mechanism in Service Collaboration [J].
Wang, Chao ;
Chen, Shizhan ;
Feng, Zhiyong ;
Jiang, Yanan ;
Xue, Xiao .
2019 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2019), 2019, :214-218