Blockchain-based public auditing for big data in cloud storage

被引:80
作者
Li, Jiaxing [1 ]
Wu, Jigang [1 ]
Jiang, Guiyuan [2 ]
Srikanthan, Thambipillai [2 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou, Peoples R China
[2] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Blockchain; Dynamic public auditing; Cloud storage; Data integrity; Big data; SCHEME; EDGE;
D O I
10.1016/j.ipm.2020.102382
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage enables applications to efficiently manage their remote data but facing the risk of being tampered with. This paper utilizes blockchain technique to develop a novel public auditing scheme for verifying data integrity in cloud storage. In the proposed scheme, different from the existing works that involve three participatory entities, only two predefined entities (i.e. data owner and cloud service provider) who may not trust each other are involved, and the third party auditor for data auditing is removed. Specifically, data owners store the lightweight verification tags on the blockchain and generate a proof by constructing the Merkle Hash Tree using the hashtags to reduce the overhead of computation and communication for integrity verification. Besides, this work is able to achieve 100% confidence of auditing theoretically, as the hashtag of each data block is utilized to build the Merkle Hash Tree for the data integrity verification. Security analysis shows that the proposed scheme can defend against malicious entities and the 51% attack. Experimental results demonstrate the significant improvements on computation and communication.
引用
收藏
页数:17
相关论文
共 51 条
[1]  
Ateniese G, 2008, P 4 INT C SEC PRIV C, P1, DOI 10.1145/1460877.1460889
[2]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[3]   Big data adoption: State of the art and research challenges [J].
Baig, Maria Ijaz ;
Shuib, Liyana ;
Yadegaridehkordi, Elaheh .
INFORMATION PROCESSING & MANAGEMENT, 2019, 56 (06)
[4]   Record-aware Two-level Compression for Big Textual Data Analysis Acceleration [J].
Dong, Dapeng ;
Herbert, John .
2015 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2015, :9-16
[5]   Dynamic Provable Data Possession [J].
Erway, C. Chris ;
Kupcu, Alptekin ;
Papamanthou, Charalampos ;
Tamassia, Roberto .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 17 (04)
[6]   NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users [J].
Fu, Anmin ;
Yu, Shui ;
Zhang, Yuqing ;
Wang, Huaqun ;
Huang, Chanying .
IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (01) :14-24
[7]   Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks [J].
Gai, Keke ;
Wu, Yulu ;
Zhu, Liehuang ;
Xu, Lei ;
Zhang, Yan .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :7992-8004
[8]  
Gligoroski Danilo, 2010, INT C ICT INN, P5, DOI DOI 10.1007/978-3-642-19325-5_2
[9]   A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability [J].
Hao, Zhuo ;
Zhong, Sheng ;
Yu, Nenghai .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) :1432-1437
[10]  
Jia Wang, 2019, Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST 284), P378, DOI 10.1007/978-3-030-21373-2_29