A Cloud Data Integrity Verification Scheme Based on Blockchain

被引:4
|
作者
Bai, Yi [1 ,2 ]
Zhou, Zequan [1 ]
Luo, Xiling [2 ,3 ]
Wang, Xiaochao [1 ,2 ]
Liu, Feng [1 ]
Xu, Yifu [1 ]
机构
[1] BeiHang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[2] BeiHang Univ, Beihang Hangzhou Innovat Inst Yuhang, Beijing, Peoples R China
[3] BeiHang Univ, Res Inst Frontier Sci, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
D O I
10.1109/SWC50871.2021.00055
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud storage saves a lot of storage overheads for users to manage data. However, it also brings data integrity challenges. Relying only on message authentication codes (MAC) and hash functions introduces serious communication overheads. Existing integrity verification schemes usually rely on third-party auditors (TPAs) to reduce users' audit burden. However, malicious TPAs not only extract raw data from repeated audit processes but also collude with a cloud server to launch collusive attacks. Recently, some integrity verification schemes based on blockchain are presented to solve challenges of raw data extraction and collusive attacks. These schemes cannot realize large-scale data processing on a blockchain as well as dynamic data operations. To address the above issues, we propose a blockchain-based cloud data integrity verification scheme (BCD-IV) that removes TPAs by using chain-code that solves collusive attacks. Furthermore, we construct a new homomorphic verification tag (HVT) based on the signature proposed by Zhang, Safavi, and Susilo (ZSS), which supports blockless verification. The proposed scheme realizes full dynamic operations with auxiliary information that stores on a blockchain. Mathematical analysis shows that our scheme has lower complexity in terms of communication and computation overhead, which are both O(c). Finally, we conduct experiments on Hyperledger Fabric V2.2 to demonstrate that the computation efficiency of audit is the highest compared to the state-of-the-art and the storage overhead is negligible.
引用
收藏
页码:357 / 363
页数:7
相关论文
共 50 条
  • [1] Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency
    Xie, Gaopeng
    Liu, Yuling
    Xin, Guojiang
    Yang, Qiuwei
    Zhou, Zhili
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [2] A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage
    Zhang, Yiran
    Geng, Huizheng
    Su, Li
    Lu, Li
    [J]. IEEE ACCESS, 2022, 10 : 105920 - 105929
  • [3] Data Integrity Verification Scheme Based on Blockchain Smart Contract
    Zhang, Kai
    Xiao, He
    Liu, Qiuming
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 857 - 863
  • [4] An Edge Cloud Data Integrity Protection Scheme Based on Blockchain
    Duan, Weihua
    Jiang, Yu
    Xu, Xiaolong
    Zhang, Ziming
    Liu, Guanpei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Blockchain-Based Data Integrity Verification Scheme in AIoT Cloud-Edge Computing Environment
    Li, Yi
    Shen, Jian
    Ji, Sai
    Lai, Ying-Hsun
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 12556 - 12565
  • [6] Identity-based public data integrity verification scheme in cloud storage system via blockchain
    Yilin Yuan
    Jianbiao Zhang
    Wanshan Xu
    Zheng Li
    [J]. The Journal of Supercomputing, 2022, 78 : 8509 - 8530
  • [7] Identity-based public data integrity verification scheme in cloud storage system via blockchain
    Yuan, Yilin
    Zhang, Jianbiao
    Xu, Wanshan
    Li, Zheng
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (06): : 8509 - 8530
  • [8] An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature
    Luo, Xiling
    Zhou, Zequan
    Zhong, Lin
    Mao, Jian
    Chen, Chaoyong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] A Scalable Blockchain-Based Integrity Verification Scheme
    Zhou, Zequan
    Luo, Xiling
    Bai, Yi
    Wang, Xiaochao
    Liu, Feng
    Liu, Gang
    Xu, Yifu
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [10] Cloud data integrity verification scheme for associated tags
    Tian, Junfeng
    Jing, Xuan
    [J]. COMPUTERS & SECURITY, 2020, 95