Blockchain-Based Incentive and Arbitrable Data Auditing Scheme

被引:3
作者
Tian, Junfeng [1 ,2 ]
Song, Qianqian [1 ,2 ]
Wang, Haoning [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyberspace Secur, Baoding, Peoples R China
[2] Hebei Univ, Comp Inst, Baoding, Peoples R China
来源
52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022) | 2022年
关键词
Audit; Blockchain; Smart contract; Incentive mechanism;
D O I
10.1109/DSN-W54100.2022.00036
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The private data possession of proof mechanism is an important means to ensure the security of cloud data. Using the private data possession of proof mechanism may cause disputes between users and cloud storage service providers. There is no credible proof to determine the wrong party, it will affect the public's confidence in using cloud storage technology. Therefore, this paper designs an incentive and arbitrable data audit protocol based blockchain. This protocol uses the quadratic residue theorem to achieve efficient auditing. The smart contract is introduced as a fair arbitrator, the blockchain is used as a self-recording channel to provide credible proof for the contradiction between users and cloud storage service providers, avoid disputes and realize dispute-free arbitration. A set of reward and punishment measures are designed using power functions to restrain the malicious behavior of untrusted users and cloud storage service providers. Efficiency analysis and experiments show that the proposed scheme has lower computational and communication overhead.
引用
收藏
页码:170 / 177
页数:8
相关论文
共 28 条
[1]  
Aalmoes J, 2022, DIKAIOS PRIVACY AUDI
[2]  
Aalmoes J, DIKAIOS PRIVACY AUDI, P2022
[3]   Provable Multicopy Dynamic Data Possession in Cloud Computing Systems [J].
Barsoum, Ayad F. ;
Hasan, M. Anwar .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :485-497
[4]  
Bian G, 2020, IEEE ACCESS, P1
[5]   Distributed auditing protocol for blockchain-based transactions using a distributed signature [J].
Far, Saeed Banaeian ;
Rad, Azadeh Imani .
SECURITY AND PRIVACY, 2021, 4 (03)
[6]  
Feng Deng-Guo, 2011, Journal of Software, V22, P71, DOI 10.3724/SP.J.1001.2011.03958
[7]   Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement [J].
Fu, Zhangjie ;
Wu, Xinle ;
Guan, Chaowen ;
Sun, Xingming ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) :2706-2716
[8]   Identity-based remote data checking with a designated verifier [J].
Ji, Yanyan ;
Shao, Bilin ;
Chang, Jinyong ;
Xu, Maozhi ;
Xue, Rui .
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2022, 11 (01)
[9]   A privacy preserving three-factor authentication protocol for e-Health clouds [J].
Jiang, Qi ;
Khan, Muhammad Khurram ;
Lu, Xiang ;
Ma, Jianfeng ;
He, Debiao .
JOURNAL OF SUPERCOMPUTING, 2016, 72 (10) :3826-3849
[10]  
Jin H., 2016, Proc. IEEE Power Energy Soc. Gen. Meeting, P1