Decentralized Data Integrity Verification Model in Untrusted Environment

被引:10
作者
Hao, Kun [1 ]
Xin, Junchang [1 ,2 ]
Wang, Zhiqiong [3 ]
Jiang, Zhuochen [4 ]
Wang, Guoren [5 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Liaoning, Peoples R China
[2] Key Lab Big Data Management & Analyt, Shenyang, Liaoning, Peoples R China
[3] Northeastern Univ, Sch Sino Dutch Biomed & Informat Engn, Shenyang, Liaoning, Peoples R China
[4] Jilin Univ, Coll Comp Sci & Technol, Changchun, Jilin, Peoples R China
[5] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
来源
WEB AND BIG DATA (APWEB-WAIM 2018), PT II | 2018年 / 10988卷
基金
中国国家自然科学基金;
关键词
Decentralized; Collaborative; Blockchain; Data integrity; Untrusted environment;
D O I
10.1007/978-3-319-96893-3_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourced data, as an significant component of cloud service, has been widely used due to its convince, low overhead and high flexibility. To guarantee the integrity of outsourced data and reduce the computational overhead, data owner (DO) usually adopts a third party auditor (TPA) to execute verification scheme. However, handing over the verification of data to TPA may lead to security vulnerabilities since the TPA is not fully trusted. In this paper, we propose a novel solution for data integrity verification in untrusted outsourced environment. Firstly, we design a decentralized model based on blockchain, consisting by some collaborative verification peers (VPs). Based on our purposed model, we present an advanced data integrity verification algorithm, allowing DO stores and checks verification results by writing and retrieving the blockchain. Moreover, each VP maintains a replication of the entire blockchain to avoid maliciously tampering with. We evaluate our proposed approach on real outsourced data service scenario. Experimental results demonstrate that our proposed approach is efficient and effective.
引用
收藏
页码:410 / 424
页数:15
相关论文
共 50 条
[41]   Data Integrity Verification in Column-Oriented NoSQL Databases [J].
Weintraub, Grisha ;
Gudes, Ehud .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 :165-181
[42]   Integrity verification protocol based on privacy homomorphism data aggregation [J].
Li, Xing ;
Li, Chun-Yan ;
Wang, Liang-Min .
Tongxin Xuebao/Journal on Communications, 2014, 35 :256-260
[43]   Мethod of Data Service Integrity Verification Based on Remote Attestation [J].
Zhang, Su ;
Zhang, Ying ;
Zhang, Wei ;
Huang, Gang .
Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11) :4949-4972
[44]   Establishing Data Integrity in a Large Decentralized School District to Support Research on Equity in Computer Science Enrollments [J].
Stoneking, Jennifer ;
Bievenue, Lisa .
PROCEEDINGS OF THE 2019 RESEARCH ON EQUITY AND SUSTAINED PARTICIPATION IN ENGINEERING, COMPUTING, AND TECHNOLOGY (RESPECT), 2019,
[45]   LBT-based cloud data integrity verification scheme [J].
Li Y. ;
Yao G. ;
Lei L. ;
Zhang X. ;
Yang K. .
Qinghua Daxue Xuebao/Journal of Tsinghua University, 2016, 56 (05) :504-510
[46]   Lightweight integrity verification scheme for cloud based group data [J].
Liu Y.-F. ;
Wang Y.-J. ;
Fu S.-J. .
Tongxin Xuebao/Journal on Communications, 2016, 37 :140-146
[47]   Performance of Merkle Signature Scheme in Data Integrity Verification at Client [J].
Mary, D. Sophia Navis ;
Gopinathan, S. .
INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2020, 15 (04) :1285-1293
[48]   A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain [J].
Lu, Yin ;
Xue, Yongtao ;
Li, Qingyuan ;
Wu, Luocheng ;
Li, Taosen ;
Yang, Peipei ;
Zhu, Hongbo .
CHINA COMMUNICATIONS, 2024, 21 (03) :137-148
[49]   A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage [J].
Zhang, Yiran ;
Geng, Huizheng ;
Su, Li ;
Lu, Li .
IEEE ACCESS, 2022, 10 :105920-105929
[50]   DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract [J].
He, Siqi ;
Xing, Xiaofei ;
Wang, Guojun .
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, :1290-1295