Decentralized Data Integrity Verification Model in Untrusted Environment

被引:10
|
作者
Hao, Kun [1 ]
Xin, Junchang [1 ,2 ]
Wang, Zhiqiong [3 ]
Jiang, Zhuochen [4 ]
Wang, Guoren [5 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Liaoning, Peoples R China
[2] Key Lab Big Data Management & Analyt, Shenyang, Liaoning, Peoples R China
[3] Northeastern Univ, Sch Sino Dutch Biomed & Informat Engn, Shenyang, Liaoning, Peoples R China
[4] Jilin Univ, Coll Comp Sci & Technol, Changchun, Jilin, Peoples R China
[5] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
来源
WEB AND BIG DATA (APWEB-WAIM 2018), PT II | 2018年 / 10988卷
基金
中国国家自然科学基金;
关键词
Decentralized; Collaborative; Blockchain; Data integrity; Untrusted environment;
D O I
10.1007/978-3-319-96893-3_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourced data, as an significant component of cloud service, has been widely used due to its convince, low overhead and high flexibility. To guarantee the integrity of outsourced data and reduce the computational overhead, data owner (DO) usually adopts a third party auditor (TPA) to execute verification scheme. However, handing over the verification of data to TPA may lead to security vulnerabilities since the TPA is not fully trusted. In this paper, we propose a novel solution for data integrity verification in untrusted outsourced environment. Firstly, we design a decentralized model based on blockchain, consisting by some collaborative verification peers (VPs). Based on our purposed model, we present an advanced data integrity verification algorithm, allowing DO stores and checks verification results by writing and retrieving the blockchain. Moreover, each VP maintains a replication of the entire blockchain to avoid maliciously tampering with. We evaluate our proposed approach on real outsourced data service scenario. Experimental results demonstrate that our proposed approach is efficient and effective.
引用
收藏
页码:410 / 424
页数:15
相关论文
共 50 条
  • [1] Outsourced data integrity verification based on blockchain in untrusted environment
    Hao, Kun
    Xin, Junchang
    Wang, Zhiqiong
    Wang, Guoren
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (04): : 2215 - 2238
  • [2] Outsourced data integrity verification based on blockchain in untrusted environment
    Kun Hao
    Junchang Xin
    Zhiqiong Wang
    Guoren Wang
    World Wide Web, 2020, 23 : 2215 - 2238
  • [3] Data Integrity and Availability Verification Game in Untrusted Cloud Storage
    Djebaili, Brahim
    Kiennert, Christophe
    Leneutre, Jean
    Chen, Lin
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 287 - 306
  • [4] Data Authentication and Integrity Verification Techniques for Trusted/Untrusted Cloud Servers
    Kavuri, Satheesh K. S. V. A.
    Kancherla, Gangadhara Rao
    Bobba, Basaveswara Rao
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2590 - 2596
  • [5] DynaEDI: Decentralized Integrity Verification for Dynamic Edge Data
    He, Qiang
    Yang, Jiyu
    Chen, Feifei
    Tian, Cong
    Li, Yanhui
    Yang, Yun
    SERVICE-ORIENTED COMPUTING, ICSOC 2024, PT I, 2025, 15404 : 263 - 280
  • [6] DWH-DIM: A Blockchain Based Decentralized Integrity Verification Model for Data Warehouses
    Bergers, Jeroen
    Shi, Zeshun
    Korsmit, Ken
    Zhao, Zhiming
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021), 2021, : 221 - 228
  • [7] Trusted audit with untrusted auditors: A decentralized data integrity Crowdauditing approach based on blockchain
    Chen, Haiwen
    Zhou, Huan
    Yu, Jiaping
    Wu, Kui
    Liu, Fang
    Zhou, Tongqing
    Cai, Zhiping
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (11) : 6213 - 6239
  • [8] DCIV: Decentralized cross-chain data integrity verification with blockchain
    Jiang, Jiajia
    Zhang, Yushu
    Zhu, Youwen
    Dong, Xuewen
    Wang, Liangmin
    Xiang, Yong
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (10) : 7988 - 7999
  • [9] Data integrity verification of the outsourced big data in the cloud environment: A survey
    Zhou, Lei
    Fu, Anmin
    Yu, Shui
    Su, Mang
    Kuang, Boyu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 122 : 1 - 15
  • [10] Efficient Verification of Edge Data Integrity in Edge Computing Environment
    Cui, Guangming
    He, Qiang
    Li, Bo
    Xia, Xiaoyu
    Chen, Feifei
    Jin, Hai
    Xiang, Yang
    Yang, Yun
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (06) : 3233 - 3244