Outsourced data integrity verification based on blockchain in untrusted environment

被引:1
|
作者
Kun Hao
Junchang Xin
Zhiqiong Wang
Guoren Wang
机构
[1] Northeastern University,School of Computer Science and Engineering
[2] Key Laboratory of Big Data Management and Analytics,College of Medicine and Biological Information Engineering
[3] Northeastern University,School of Computer Science and Technology
[4] Neusoft Research of Intelligent Healthcare Technology,undefined
[5] Co. Ltd.,undefined
[6] Beijing Institute of Technology,undefined
来源
World Wide Web | 2020年 / 23卷
关键词
Blockchain; Outsourced data; Data integrity; Collaborative; Untrusted environment;
D O I
暂无
中图分类号
学科分类号
摘要
Outsourced data, as the significant component of cloud service, has been widely used due to its convenience, low overhead, and high flexibility. To guarantee the integrity of outsourced data, data owner (DO) usually adopts a third party auditor (TPA) to execute the data integrity verification scheme. However, during the verification process, DO cannot fully confirm the reliability of the TPA, and handing over the verification of data integrity to the untrusted TPA may lead to data security threats. In this paper, we focus on the problem of integrity verification of outsourced data in untrusted environment, that is, how to improve the security and efficiency of data integrity verification without utilizing untrusted TPA. To address the problem, we design a decentralized model based on blockchain consisting of some collaborative verification peers (VPs), each of which maintains a replication of the entire blockchain to avoid maliciously tampering with. Based on the model, we present an advanced data integrity verification algorithm which allows DO to store and check the verification information by writing and retrieving the blockchain. In addition, in order to improve the concurrent performance, we extend the algorithm by introducing the verification group (VG) constituting by some VPs organized by Inner-Group and Inter-Group consensus protocols. We conduct a completed security analysis as well as extensive experiments of our proposed approach, and the evaluation results demonstrate that our proposed approaches achieve superior performance.
引用
下载
收藏
页码:2215 / 2238
页数:23
相关论文
共 50 条
  • [11] Data Integrity and Availability Verification Game in Untrusted Cloud Storage
    Djebaili, Brahim
    Kiennert, Christophe
    Leneutre, Jean
    Chen, Lin
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, 2014, 8840 : 287 - 306
  • [12] Blockchain-Based Data Integrity Verification Scheme in AIoT Cloud-Edge Computing Environment
    Li, Yi
    Shen, Jian
    Ji, Sai
    Lai, Ying-Hsun
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 12556 - 12565
  • [13] Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage
    Huang, Longxia
    Zhou, Junlong
    Zhang, Gongxuan
    Sun, Jin
    Wang, Tian
    Vajdi, Ahmadreza
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (11)
  • [14] Blockchain Based Data Integrity Verification for Large-Scale IoT Data
    Wang, Haiyan
    Zhang, Jiawei
    IEEE ACCESS, 2019, 7 : 164996 - 165006
  • [15] Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage
    Ni, Jianbing
    Lin, Xiaodong
    Zhang, Kuan
    Yu, Yong
    Shen, Xuemin
    2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [16] A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
    Lu Yin
    Xue Yongtao
    Li Qingyuan
    Wu Luocheng
    Li Taosen
    Yang Peipei
    Zhu Hongbo
    China Communications, 2024, 21 (03) : 137 - 148
  • [17] A General Framework for Intelligent IoT Data Acquisition and Sharing in an Untrusted Environment Based on Blockchain
    Lu, Yin
    Xue, Yongtao
    Li, Qingyuan
    Wu, Luocheng
    Li, Taosen
    Yang, Peipei
    Zhu, Hongbo
    CHINA COMMUNICATIONS, 2024, 21 (03) : 137 - 148
  • [18] Data Authentication and Integrity Verification Techniques for Trusted/Untrusted Cloud Servers
    Kavuri, Satheesh K. S. V. A.
    Kancherla, Gangadhara Rao
    Bobba, Basaveswara Rao
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 2590 - 2596
  • [19] Data integrity verification scheme with designated verifiers for dynamic outsourced databases
    Wang, Xiaoming
    Lin, Yanchun
    Yao, Guoxiang
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2293 - 2301
  • [20] Dynamic List Based Data Integrity Verification in Cloud Environment
    Akshay K.C.
    Muniyal B.
    Journal of Cyber Security and Mobility, 2022, 11 (03): : 433 - 460