Decentralized Data Integrity Verification Model in Untrusted Environment

被引:10
作者
Hao, Kun [1 ]
Xin, Junchang [1 ,2 ]
Wang, Zhiqiong [3 ]
Jiang, Zhuochen [4 ]
Wang, Guoren [5 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Liaoning, Peoples R China
[2] Key Lab Big Data Management & Analyt, Shenyang, Liaoning, Peoples R China
[3] Northeastern Univ, Sch Sino Dutch Biomed & Informat Engn, Shenyang, Liaoning, Peoples R China
[4] Jilin Univ, Coll Comp Sci & Technol, Changchun, Jilin, Peoples R China
[5] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
来源
WEB AND BIG DATA (APWEB-WAIM 2018), PT II | 2018年 / 10988卷
基金
中国国家自然科学基金;
关键词
Decentralized; Collaborative; Blockchain; Data integrity; Untrusted environment;
D O I
10.1007/978-3-319-96893-3_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourced data, as an significant component of cloud service, has been widely used due to its convince, low overhead and high flexibility. To guarantee the integrity of outsourced data and reduce the computational overhead, data owner (DO) usually adopts a third party auditor (TPA) to execute verification scheme. However, handing over the verification of data to TPA may lead to security vulnerabilities since the TPA is not fully trusted. In this paper, we propose a novel solution for data integrity verification in untrusted outsourced environment. Firstly, we design a decentralized model based on blockchain, consisting by some collaborative verification peers (VPs). Based on our purposed model, we present an advanced data integrity verification algorithm, allowing DO stores and checks verification results by writing and retrieving the blockchain. Moreover, each VP maintains a replication of the entire blockchain to avoid maliciously tampering with. We evaluate our proposed approach on real outsourced data service scenario. Experimental results demonstrate that our proposed approach is efficient and effective.
引用
收藏
页码:410 / 424
页数:15
相关论文
共 50 条
  • [21] Accountable data trading scheme supporting data integrity verification
    Chen L.
    Li X.
    Gao J.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2022, 44 (04): : 1364 - 1371
  • [22] SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline
    Oktian, Yustus Eko
    Heo, Shinwook
    Kim, Howon
    IEEE ACCESS, 2022, 10 : 89714 - 89731
  • [23] Double-Layer Blockchain-Based Decentralized Integrity Verification for Multi-chain Cross-Chain Data
    Wei, Weiwei
    Zhou, Yuqian
    Li, Dan
    Hong, Xina
    NEURAL INFORMATION PROCESSING, ICONIP 2023, PT VI, 2024, 14452 : 264 - 279
  • [24] Decentralized Data Integrity Inspection Offloading in Edge Computing Systems Using Potential Games
    Seyedi, Zahra
    Rahmati, Farhad
    Ali, Mohammad
    Liu, Ximeng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (05) : 3950 - 3961
  • [25] Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
    Ramachandran, A.
    Ramadevi, P.
    Alkhayyat, Ahmed
    Yousif, Yousif Kerrar
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (02) : 2055 - 2070
  • [26] Integrity Verification for Shared Data in Group with User Revocation
    Suguna, M.
    Shalinie, S. Mercy
    Sivaranjani, R.
    WIRELESS COMMUNICATION NETWORKS AND INTERNET OF THINGS, VOL VI, 2019, 493 : 41 - 49
  • [27] Generic Dynamic Data Outsourcing Framework for Integrity Verification
    Etemad, Mohammad
    Kupcu, Alptekin
    ACM COMPUTING SURVEYS, 2020, 53 (01)
  • [28] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [29] Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage
    Zhang, Qingyang
    Zhang, Zhiming
    Cui, Jie
    Zhong, Hong
    Li, Yang
    Gu, Chengjie
    He, Debiao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (12) : 3162 - 3173
  • [30] Verifiable credential proof generation and verification model for decentralized ssi-based credit scoring data
    Cho K.W.
    Jeong B.-G.
    Shin S.U.
    IEICE Transactions on Information and Systems, 2021, (11) : 1857 - 1868