A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services

被引:133
作者
Xu, Yang [1 ]
Zhang, Cheng [2 ]
Wang, Guojun [3 ]
Qin, Zheng [1 ]
Zeng, Quanrun [2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Scalability; Protocols; Data integrity; Cryptography; Monitoring; Network storage; deduplication; data auditing; blockchain; CHALLENGES; PROOFS;
D O I
10.1109/TETC.2020.3005610
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since network storage services achieve widespread adoption, security and performance issues are becoming primary concerns, affecting the scalability of storage systems. Countermeasures like data auditing mechanisms and deduplication techniques are widely studied. However, the existing data auditing mechanism with deduplication cannot solve the problems such as high cost and reliance on trusted third parties in traditional approaches, and it also faces the problem of repeated auditing of data shared by multiple-tenant. This article proposes a blockchain-based deduplicatable data auditing mechanism. We first design a client-side data deduplication scheme based on bilinear-pair techniques to reduce the burden on users and service providers. On this basis, we achieve a trustworthy and efficient data auditing mechanism that helps to check data integrity by using both the blockchain technique and bilinear pairing cryptosystem. The blockchain system is used to record the behaviors of entities in both data outsourcing and auditing processes so that the corresponding immutable records can be used to not only ensure the credibility of audit results but also help to monitor unreliable third-party auditors. Finally, theoretical analysis and experiments reveal the effectiveness and performance of our scheme.
引用
收藏
页码:1421 / 1432
页数:12
相关论文
共 35 条
[1]  
[Anonymous], 2014, ASIAN J INF TECHNOL
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]  
Bao F, 2003, LECT NOTES COMPUT SC, V2836, P301
[4]  
Barsoum A., 2010, Provable Possession and Replication of Data over Cloud Servers
[5]   Cooperative and Distributed Computation Offloading for Blockchain-Empowered Industrial Internet of Things [J].
Chen, Wuhui ;
Zhang, Zhen ;
Hong, Zicong ;
Chen, Chuan ;
Wu, Jiajing ;
Maharjan, Sabita ;
Zheng, Zibin ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8433-8446
[6]   Blockchain for Internet of Things: A Survey [J].
Dai, Hong-Ning ;
Zheng, Zibin ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8076-8094
[7]  
Deswarte Y., 2004, Working Conference on Integrity and Internal Control in Information Systems, P1
[8]  
Gantt J, 2010, PALG MAC TRANSNAT H, P1, DOI 10.1057/9780230250451
[9]   Proofs of Ownership in Remote Storage Systems [J].
Halevi, Shai ;
Harnik, Danny ;
Pinkas, Benny ;
shulman-peleg, Alexandra .
PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, :491-500
[10]   DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments [J].
He, Kun ;
Chen, Jing ;
Du, Ruiying ;
Wu, Qianhong ;
Xue, Guoliang ;
Zhang, Xiang .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (12) :3631-3645