A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services

被引:133
作者
Xu, Yang [1 ]
Zhang, Cheng [2 ]
Wang, Guojun [3 ]
Qin, Zheng [1 ]
Zeng, Quanrun [2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
Blockchain; Scalability; Protocols; Data integrity; Cryptography; Monitoring; Network storage; deduplication; data auditing; blockchain; CHALLENGES; PROOFS;
D O I
10.1109/TETC.2020.3005610
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since network storage services achieve widespread adoption, security and performance issues are becoming primary concerns, affecting the scalability of storage systems. Countermeasures like data auditing mechanisms and deduplication techniques are widely studied. However, the existing data auditing mechanism with deduplication cannot solve the problems such as high cost and reliance on trusted third parties in traditional approaches, and it also faces the problem of repeated auditing of data shared by multiple-tenant. This article proposes a blockchain-based deduplicatable data auditing mechanism. We first design a client-side data deduplication scheme based on bilinear-pair techniques to reduce the burden on users and service providers. On this basis, we achieve a trustworthy and efficient data auditing mechanism that helps to check data integrity by using both the blockchain technique and bilinear pairing cryptosystem. The blockchain system is used to record the behaviors of entities in both data outsourcing and auditing processes so that the corresponding immutable records can be used to not only ensure the credibility of audit results but also help to monitor unreliable third-party auditors. Finally, theoretical analysis and experiments reveal the effectiveness and performance of our scheme.
引用
收藏
页码:1421 / 1432
页数:12
相关论文
共 35 条
[31]  
Zheng Qingji., 2012, CODASPY '12: ACM conference on Data and Application Security and Privacy, P1
[32]   An overview on smart contracts: Challenges, advances and platforms [J].
Zheng, Zibin ;
Xie, Shaoan ;
Dai, Hong-Ning ;
Chen, Weili ;
Chen, Xiangping ;
Weng, Jian ;
Imran, Muhammad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 105 :475-491
[33]   Data integrity verification of the outsourced big data in the cloud environment: A survey [J].
Zhou, Lei ;
Fu, Anmin ;
Yu, Shui ;
Su, Mang ;
Kuang, Boyu .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 122 :1-15
[34]   Scalable platforms and advanced algorithms for loT and cyber-enabled applications [J].
Zhou, Xiaokang ;
Xu, Guangquan ;
Ma, Jianhua ;
Ruchkin, Ivan .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 118 :1-4
[35]   Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage [J].
Zhu, Yan ;
Hu, Hongxin ;
Ahn, Gail-Joon ;
Yu, Mengyang .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (12) :2231-2244