Blockchain-Based Decentralized Public Auditing for Cloud Storage

被引:44
作者
Shu, Jiangang [1 ]
Zou, Xing [2 ]
Jia, Xiaohua [3 ]
Zhang, Weizhe [1 ,4 ]
Xie, Ruitao [5 ]
机构
[1] Cyberspace Secur Res Ctr, Peng Cheng Lab, Shenzhen 518000, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518000, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong 999077, Peoples R China
[4] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
[5] Shenzhen Univ, Coll Comp Sci & Software Engn, Shenzhen 518000, Peoples R China
关键词
Cloud storage; public integrity auditing; identity-based cryptography; blockchain; EFFICIENT; PRIVACY; SCHEME; VERIFICATION; ENCRYPTION; CHECKING; SECURITY;
D O I
10.1109/TCC.2021.3051622
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public auditing schemes for cloud storage systems have been extensively explored with the increasing importance of data integrity. A third-party auditor (TPA) is introduced in public auditing schemes to verify the integrity of outsourced data on behalf of users. To resist malicious TPAs, many blockchain-based public verification schemes have been proposed. However, existing auditing schemes rely on a centralized TPA, and they are vulnerable to tempting auditors who may collude with malicious blockchain miners to produce biased auditing results. In this article, we propose a blockchain-based decentralized public auditing (BDPA) scheme by utilizing a decentralized blockchain network to undertake the responsibility of a centralized TPA, and also mitigate the influence of tempting auditors and malicious blockchain miners by taking the concept of decentralized autonomous organization (DAO). A detailed security analysis shows that BDPA can preserve data integrity against tempting auditors and malicious blockchain miners. A comprehensive performance evaluation demonstrates that BDPA is feasible and scalable.
引用
收藏
页码:2366 / 2380
页数:15
相关论文
共 47 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]   Outsourced Proofs of Retrievability [J].
Armknecht, Frederik ;
Bohli, Jens-Matthias ;
Karame, Ghassan O. ;
Liu, Zongren ;
Reuter, Christian A. .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :831-843
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]  
Catchlove P., 2017, SMART CONTRACTS NEW, DOI [10.2139/ssrn.3090226, DOI 10.2139/SSRN.3090226]
[5]   New Publicly Verifiable Databases with Efficient Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :546-556
[6]  
Chen XF, 2014, LECT NOTES COMPUT SC, V8712, P148, DOI 10.1007/978-3-319-11203-9_9
[7]  
Gentry C, 2006, LECT NOTES COMPUT SC, V4004, P445
[8]   Decentralized E-Voting Systems Based on the Blockchain Technology [J].
Hsiao, Jen-Ho ;
Tso, Raylin ;
Chen, Chien-Ming ;
Wu, Mu-En .
ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 :305-309
[9]   IRBA: An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things [J].
Jia, Xudong ;
Hu, Ning ;
Su, Shen ;
Yin, Shi ;
Zhao, Yan ;
Cheng, Xinda ;
Zhang, Chi .
ELECTRONICS, 2020, 9 (04)
[10]  
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584