An arbitrable outsourcing data audit scheme supporting credit reward and punishment and multi-user sharing

被引:1
|
作者
Tian, Junfeng [1 ,2 ]
Yang, Qian [1 ,2 ]
机构
[1] Hebei Univ, Sch Cyber Secur & Comp, Baoding 071000, Peoples R China
[2] Hebei Univ, Key Lab High Trusted Informat Syst Hebei Prov, Baoding 071000, Peoples R China
关键词
Provable Data Possession; Cloud storage; Arbitrable audit; Data integrity; Credit reward and punishment; BLOCKCHAIN; EFFICIENT;
D O I
10.1016/j.jpdc.2023.04.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the era of the Internet of Things, cloud storage allows users to outsource their data without retaining a local copy. However, a serious problem caused by this pattern is that the data owner loses control of the data. In this case, to ensure outsourced storage data integrity, researchers proposed Provable Data Possession. However, most systems cannot deal with disagreements between entities throughout the process. Due to this, we propose an auditing system for outsourced data. By using undeniable blockchain information, it solves disputes between entities and avoids accounting delays by third-party auditors. A credit chain based on the public blockchain is designed. A novel dynamic credit calculation algorithm is adopted in the credit chain to realize an effective reward and punishment mechanism. Security proofs are provided in detail for the proposed scheme. Evaluation experiments show that compared with existing similar schemes, the scheme achieves arbitrable audit and has a lower computational cost.(c) 2023 Elsevier Inc. All rights reserved.
引用
收藏
页码:100 / 111
页数:12
相关论文
共 31 条
  • [1] Blockchain searchable encryption scheme for multi-user power data sharing
    Yang, Rui
    Zhang, Ruiting
    Zhai, Sheping
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2024, 52 (22): : 116 - 128
  • [2] An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing
    Zhang, Jianhong
    Li, Pengyan
    Mao, Jian
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 996 - 1002
  • [3] File sharing scheme for multi-user in cloud environment
    Wang, Zhonghua
    Han, Zhen
    Liu, Jiqiang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (12): : 2614 - 2622
  • [4] A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario
    Wang, Miaomiao
    Rui, Lanlan
    Xu, Siya
    Gao, Zhipeng
    Liu, Huiyong
    Guo, Shaoyong
    COMPUTER NETWORKS, 2023, 237
  • [5] Multi-user Data Sharing in Radar Sensor Networks
    Li, Ming
    Yan, Tingxin
    Ganesan, Deepak
    Lyons, Eric
    Shenoy, Prashant
    Venkataramani, Arun
    Zink, Michael
    SENSYS'07: PROCEEDINGS OF THE 5TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2007, : 377 - 378
  • [6] Opportunities and challenges in data sharing at multi-user facilities
    Chen, Sophia
    Hauser, Nick
    Hester, James
    Kanner, Jonah
    Lassila-Perini, Kati
    Lausi, Andrea
    Simon, Charles
    Taylor, Jon
    NATURE REVIEWS PHYSICS, 2023, 5 (02) : 83 - 86
  • [7] Multi-user Data Sharing in Radar Sensor Networks
    Li, Ming
    Yan, Tingxin
    Ganesan, Deepak
    Lyons, Eric
    Shenoy, Prashant
    Venkataramani, Arun
    Zink, Michael
    SENSYS'07: PROCEEDINGS OF THE 5TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2007, : 247 - 260
  • [8] Opportunities and challenges in data sharing at multi-user facilities
    Sophia Chen
    Nick Hauser
    James Hester
    Jonah Kanner
    Kati Lassila-Perini
    Andrea Lausi
    Charles Simon
    Jon Taylor
    Nature Reviews Physics, 2023, 5 : 83 - 86
  • [9] Improvement of Multi-user Searchable Encrypted Data Scheme
    Tran Thao Phuong
    Omote, Kazumasa
    Nguyen Gia Luyen
    Nguyen Dinh Thuc
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 396 - 401
  • [10] Efficient Encrypted Keyword Search for Multi-user Data Sharing
    Kiayias, Aggelos
    Oksuz, Ozgur
    Russell, Alexander
    Tang, Qiang
    Wang, Bing
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 173 - 195