A Blockchain-Based Flexible Data Auditing Scheme for the Cloud Service

被引:15
作者
Fan Kefeng [1 ]
Li Fei [2 ]
Yu Haiyang [3 ]
Yang Zhen [3 ]
机构
[1] China Elect Standardizat Inst, Beijing 100007, Peoples R China
[2] Guangzhou SequoiaDB Co, Guangzhou 510006, Peoples R China
[3] Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
关键词
Cloud storage; Data integrity; Flexible auditing; Blockchain; Merkle Hash tree; DATA POSSESSION; DATA-STORAGE; VERIFICATION; CHECKING;
D O I
10.1049/cje.2021.08.011
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowdays, cloud storage technology has become a hot topic, and an increasing number of users are concerned with the security of their data in the cloud. Many auditing schemes on the cloud are proposed and the introduction of a third-party auditor to assist users in verifying the integrity of cloud data. As a centralized node, the third-party auditor has to communicate with all cloud users and cloud service providers, which becomes the bottleneck of the whole scheme. To solve this problem, we design a blockchain-based flexible cloud data auditing scheme. In our scheme, a decentralized auditing framework is proposed to eliminate the dependency on the third-party auditor, which increases the stability, security and performance of the whole scheme. Since the cloud service provider can automatically generates auditing proofs, our scheme can relieve the communication burdens of the cloud service provider. The proposed scheme also adapts the Merkle Hash tree to improve the verification performance. Security analysis and experiments show that the proposed scheme is secure and has better stability and verification efficiency.
引用
收藏
页码:1159 / 1166
页数:8
相关论文
共 34 条
  • [1] Ateniese G., 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
  • [2] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
  • [3] Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
    Barsoum, Ayad F.
    Hasan, M. Anwar
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 485 - 497
  • [4] Barsoum AyadF., VERIFYING DYNAMIC MU
  • [5] Short signatures from the Weil pairing
    Boneh, D
    Lynn, B
    Shacham, H
    [J]. JOURNAL OF CRYPTOLOGY, 2004, 17 (04) : 297 - 319
  • [6] MR-PDP: Multiple-Replica Provable Data Possession
    Curtmola, Reza
    Khan, Osama
    Burns, Randal
    Ateniese, Giuseppe
    [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 411 - +
  • [7] Dynamic Provable Data Possession
    Erway, C. Chris
    Kupcu, Alptekin
    Papamanthou, Charalampos
    Tamassia, Roberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
  • [8] Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design
    Huang, Xumin
    Ye, Dongdong
    Yu, Rong
    Shu, Lei
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2020, 7 (02) : 426 - 441
  • [9] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584
  • [10] Blockchain-based public auditing for big data in cloud storage
    Li, Jiaxing
    Wu, Jigang
    Jiang, Guiyuan
    Srikanthan, Thambipillai
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2020, 57 (06)