Blockchain-based random auditor committee for integrity verification

被引:20
作者
Chen, Lanxiang [1 ,3 ]
Fu, Qingxiao [1 ]
Mu, Yi [2 ]
Zeng, Lingfang [3 ]
Rezaeibagha, Fatemeh [4 ]
Hwang, Min-Shiang [5 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] City Univ Macau, Inst Data Sci, Macau, Peoples R China
[3] Zhejiang Lab, Hangzhou, Peoples R China
[4] Murdoch Univ, Discipline Informat Technol, Perth, WA, Australia
[5] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2022年 / 131卷
关键词
Cloud storage; Integrity verification; Random auditor committee; Election algorithm; Blockchain; SYSTEM;
D O I
10.1016/j.future.2022.01.019
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the popularity of cloud storage, integrity verification for outsourced data has attracted more and more attention. The majority of existing research works rely on a unique third-party auditor (TPA) or fixed TPAs to audit the integrity of outsourced data, and thus they are vulnerable to DoS and collusion attacks as the TPA is not completely trusted. To conquer this problem, a blockchain-based random auditor committee is proposed to replace the fixed TPAs for the integrity verification (call BRAC scheme for short). The proposed blockchain consensus algorithm utilizes a verifiable random function (VRF) to select the third-party auditor committee (TPAC) which performs contract verification. The leader of TPAs (LTPA) packs the verification proof into a blockchain called verification chain. The main idea is employing the output of a VRF for leader election to make it probabilistic, such that specific nodes cannot be targeted in advance and a certain fraction of the nodes being malicious can be tolerated. We present rigorous security analysis to demonstrate the security of the proposed scheme. Meanwhile, the comprehensive performance evaluation shows that the proposed scheme improves the performance of data integrity verification effectively. (c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:183 / 193
页数:11
相关论文
共 34 条
  • [1] [Anonymous], 2004, IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), DOI DOI 10.1007/1-4020-7901-X_1
  • [2] Outsourced Proofs of Retrievability
    Armknecht, Frederik
    Bohli, Jens-Matthias
    Karame, Ghassan O.
    Liu, Zongren
    Reuter, Christian A.
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 831 - 843
  • [3] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [4] Benvenuto C.J., 2012, Galois Field in Cryptography
  • [5] Boneh Dan, 2020, AFT '20: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, P12, DOI 10.1145/3419614.3423258
  • [6] Cardano, 2021, MAK WORLD WORK BETT
  • [7] Practical byzantine fault tolerance and proactive recovery
    Castro, M
    Liskov, B
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04): : 398 - 461
  • [8] BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication
    Chen, Dian
    Yuan, Haobo
    Hu, Shengshan
    Wang, Qian
    Wang, Cong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (04) : 786 - 798
  • [9] Using algebraic signatures to check data possession in cloud storage
    Chen, Lanxiang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1709 - 1715
  • [10] Connor D.O., 2011, ACM T MATH SOFTWARE, V1, P1