Volume 30 Issue 6
Nov.  2021
Turn off MathJax
Article Contents
FAN Kefeng, LI Fei, YU Haiyang, et al., “A Blockchain-Based Flexible Data Auditing Scheme for the Cloud Service,” Chinese Journal of Electronics, vol. 30, no. 6, pp. 1159-1166, 2021, doi: 10.1049/cje.2021.08.011
Citation: FAN Kefeng, LI Fei, YU Haiyang, et al., “A Blockchain-Based Flexible Data Auditing Scheme for the Cloud Service,” Chinese Journal of Electronics, vol. 30, no. 6, pp. 1159-1166, 2021, doi: 10.1049/cje.2021.08.011

A Blockchain-Based Flexible Data Auditing Scheme for the Cloud Service

doi: 10.1049/cje.2021.08.011
Funds:

This work is support by the National Key Research and Development Program of China (No.2019YFB1405503) and 2019 Public Service Platform of Industrial Technology Foundation of MIIT (2019-00895-2-1).

  • Received Date: 2020-12-29
  • Rev Recd Date: 2021-04-24
  • Available Online: 2021-09-23
  • Publish Date: 2021-11-05
  • Nowdays, cloud storage technology has become a hot topic, and an increasing number of users are concerned with the security of their data in the cloud. Many auditing schemes on the cloud are proposed and the introduction of a third-party auditor to assist users in verifying the integrity of cloud data. As a centralized node, the third-party auditor has to communicate with all cloud users and cloud service providers, which becomes the bottleneck of the whole scheme. To solve this problem, we design a blockchain-based flexible cloud data auditing scheme. In our scheme, a decentralized auditing framework is proposed to eliminate the dependency on the thirdparty auditor, which increases the stability, security and performance of the whole scheme. Since the cloud service provider can automatically generates auditing proofs, our scheme can relieve the communication burdens of the cloud service provider. The proposed scheme also adapts the Merkle Hash tree to improve the verification performance. Security analysis and experiments show that the proposed scheme is secure and has better stability and verification efficiency.
  • loading
  • Giuseppe Ateniese, Randal Burns, Reza Curtmola, et al., "Provable data possession at untrusted stores", Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.598-609, 2007.
    Ari Juels and Burton S. Kaliski Jr., "PORs:Proofs of retrievability for large files", Proceedings of the 14th ACM Conference on Computer and Communications Security, pp.584-597, 2007.
    Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, et al., "Scalable and efficient provable data possession", Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, pp.1-10, 2008.
    C. Chris Erway, Alptekin Küpçü, Charalampos Papamanthou, et al., "Dynamic provable data possession", ACM Transactions on Information and System Security (TISSEC), pp.1-29, 2015
    Qian Wang, Cong Wang, Jin Li, et al., "Enabling public verifiability and data dynamics for storage security in cloud computing", European Symposium on Research in Computer Security, Springer, Berlin, Heidelberg, pp.355-370, 2009.
    Boneh Dan, Ben Lynn and Hovav Shacham, "Short signatures from the Weil pairing", International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, Heidelberg, pp.514-532, 2001.
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn, et al., "Cooperative provable data possession for integrity verification in multicloud storage", IEEE Transactions on Parallel and Distributed Systems, Vol.23, No.12, pp.2231-2244, 2012.
    Kan Yang and Xiaohua Jia, "An efficient and secure dynamic auditing protocol for data storage in cloud computing", IEEE Transactions on Parallel and Ddistributed Systems, Vol.24, No.9, pp.1717-1726, 2012.
    Wang Cong, Seerman S. M., Wang Qian, et al., "Privacypreserving public auditing for secure cloud storage", IEEE Transactions on Computers, Vol.62, No.2, pp.362-375, 2013.
    Reza Curtmola, Osama Khan, Randal Burns, et al., "MRPDP:Multiple-replica provable data possession", 2008 the 28th International Conference on Distributed Computing Systems, IEEE, pp.411-420, 2008.
    R. Mukundan, S. Madria and M. Linderman, "Replicated data integrity verification in cloud", IEEE Data Eng. Bull., Vol.35, No.4, pp.55-64, 2012.
    Ayad F. Barsoum and M. Anwar Hasan, "On verifying dynamic multiple data copies over cloud servers", IACR Cryptol. Eprint Arch., https://eprint.iacr.org/2011/447.pdf,2011-8-15.
    Yafang Zhang, Jianbing Ni, Xiaoling Tao, et al., "Provable multiple replication data possession with full dynamics for secure cloud storage", Concurrency and Computation:Practice and Experience, Vol.28, No.4, pp.1161-1173, 2016.
    Chang Liu, Rajiv Ranjan, Chi Yang, et al., "MuR-DPA:Topdown levelled multi-replica merkle Hash tree based secure public auditing for dynamic big data storage on cloud", IEEE Trans. on Computers, Vol.64, No.9, pp.2609-2622, 2014.
    Xueping Liang, Sachin Shetty, Deepak Tosh, et al., "Provchain:A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability", 201717thIEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), IEEE, pp.468-477, 2017.
    Xumin Huang, Dongdong Ye, Rong Ye, et al., "Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design", IEEE/CAA Journal of Automatica Sinica, Vol.7, No.2, pp.426-441, 2020.
    Jiaxing Li, Jigang Wu, Guiyuan Jiang, et al., "Blockchainbased public auditing for big data in cloud storage", Information Processing & Management, Vol.57, No.6, Article No.102382, 2020.
    Lei Liu, Jie Feng, Qingqi Pei, et al., "Blockchain-enabled secure data sharing scheme in mobile edge computing:An asynchronous advantage actor-critic learning approach", IEEE Internet of Things Journal, DOI:10. 1109/JIOT. 2020. 3048345, 2020.
    Tan Shuang, He Li, Chen Zhikun, et al., "A method of provable data integrity based on lattice in cloud storage", Journal of Computer Research and Development, Vol.52, No.8, DOI:10. 7544/issn1000-1239. 2015. 20140610, 2015.
    Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, et al., "Verifiable auditing for outsourced database in cloud computing", IEEE Transactions on Computers, Vol.64, No.11, pp.3293-3303, 2015.
    Shen Shiuan-Tzuo, Hsiao-Ying Lin and Wen-Guey Tzeng, "An effective integrity check scheme for secure erasure code-based storage systems", IEEE Transactions on Reliability, Vol.64, No.3, pp.840-851, 2015.
    Solomon Guadie Worku, Chunxiang Xu and Jining Zhao, "Cloud data auditing with designated verifier", Frontiers of Computer Science, Vol.8, No.3, pp.503-512, 2014.
    Yihua Zhang and Marina Blanton, "Efficient dynamic provable possession of remote data via update trees", ACM Transactions on Storage, Vol.12, No.2, pp.1-45, 2016.
    Jining Zhao, Chunxiang Xu, Fagen Li, et al., "Identitybased public verification with privacy-preserving for data storage security in cloud computing", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.96, No.12, pp.2709-2716, 2013.
    Huaqun Wang, Qianhong Wu, bo bo Qin, et al., "Identitybased remote data possession checking in public clouds", IET Information Security, Vol.8, No.2, pp.114-121, 2014.
    Huaqun Wang, "Identity-based distributed provable data possession in multicloud storage", IEEE Transactions on Services Computing, Vol.8, No.2, pp.328-340, 2014.
    Jianhong Zhang, Pengyan Li and Jian Mao, "IPad:IDbased public auditing for the outsourced data in the standard model", Cluster Computing, Vol.19, No.1, pp.127-138, 2016.
    Jianhong Zhang and Qiaocui Dong, "Efficient ID-based public auditing for the outsourced data in cloud storage", Information Sciences, Vol.343-344, pp.1-14, DOI:10. 1016/j. ins. 2015. 12. 043, 2016.
    Yong Yu, Yafang Zhang, Yi Mu, et al., "Provably secure identity based provable data possession", International Conference on Provable Security, Springer, Cham, pp.310-325, 2015.
    Yong Yu, Liang Xue, Man Ho Au, et al., "Cloud data integrity checking with an identity-based auditing mechanism from RSA", Future Generation Computer Systems, Vol.62, pp.85-91, 2016.
    Yong Yu, Man Ho Allen Au, Giuseppe Ateniese, et al., "Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage", IEEE Transactions on Information Forensics and Security, Vol.12, No.4, pp.767-778, 2016.
    Huaqun Wang, Debiao He and Shaohua Tang, "Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud", IEEE Transactions on Information Forensics and Security, Vol.11, No.6, pp.1165-1176, 2016.
    Hovav Shacham and Brent Waters, "Compact proofs of retrievability", Journal of Cryptology, Vol.26, No.3, pp.442-483, 2013.
    Ayad F. Barsoum and M. Anwar Hasan, "Provable multicopy dynamic data possession in cloud computing systems", IEEE Transactions on Information Forensics and Security, Vol.10, No.3, pp.485-497, 2014.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (479) PDF downloads(35) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return