Decentralized data outsourcing auditing protocol based on blockchain

The rapid popularization of cloud computing and ultra-high-speed Internet has promoted the vigorous development of data sharing and collaborative office, especially in Big Data and AI. Aiming at protecting the security of users’ data, researchers developed PDP scheme to verify data. However, existing schemes all rely on semi-trusted Third Party Auditor (TPA) or group management to store verification information. In order to solve this problem, we propose a distributed data integrity audit scheme based on blockchain. This scheme provides a brand-new method, which allows customers to store data safely without relying on any specific TPA and protect users’ privacy at a lower cost. For the new concept, this paper points out the problems of the existing scheme and puts forward system model and security model. Then, a decentralized data integrity audit scheme using blockchain is designed. The proposed private PDP scheme based on blockchain is provably secure. At the same time, the security analysis and efficiency analysis show that the proposed PDP scheme is safe, efficient and practical.

[1]  Roberto Tamassia,et al.  Dynamic provable data possession , 2009, IACR Cryptol. ePrint Arch..

[2]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[3]  Yang Yang,et al.  RLWE-Based ID-DIA Protocols for Cloud Storage , 2019, IEEE Access.

[4]  Yang Yang,et al.  Secure Cloud Storage Based on RLWE Problem , 2019, IEEE Access.

[5]  Anmin Fu,et al.  SeShare: Secure cloud data sharing based on blockchain and public auditing , 2019, Concurr. Comput. Pract. Exp..

[6]  Chin-Chen Chang,et al.  Public auditing for shared cloud data with efficient and secure group management , 2019, Inf. Sci..

[7]  Aleksander Berentsen Aleksander Berentsen Recommends “Bitcoin: A Peer-to-Peer Electronic Cash System” by Satoshi Nakamoto , 2019, 21st Century Economics.

[8]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[9]  Robert H. Deng,et al.  Blockchain based efficient and robust fair payment for outsourcing services in cloud computing , 2018, Inf. Sci..

[10]  Yaghoub Farjami,et al.  MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption , 2020, Journal of Ambient Intelligence and Humanized Computing.

[11]  Hao Xu,et al.  Cloud data integrity checking protocol from lattice , 2015, Int. J. High Perform. Comput. Netw..

[12]  Juan Zhang,et al.  Efficient privacy-preserving third-party auditing for ambient intelligence systems , 2016, J. Ambient Intell. Humaniz. Comput..

[13]  Jianwei Liu,et al.  A Remote Data Integrity Checking Scheme for Big Data Storage , 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC).

[14]  S. P. Balakannan,et al.  A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud , 2019, Journal of Ambient Intelligence and Humanized Computing.

[15]  Hui Li,et al.  Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud , 2015, IEEE Transactions on Services Computing.

[16]  Hui Li,et al.  Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud , 2012, ACNS.

[17]  Chin-Chen Chang,et al.  Privacy-preserving public auditing for secure data storage in fog-to-cloud computing , 2019, J. Netw. Comput. Appl..

[18]  Lei Zhou,et al.  Data integrity verification of the outsourced big data in the cloud environment: A survey , 2018, J. Netw. Comput. Appl..

[19]  Stephen S. Yau,et al.  Dynamic Audit Services for Outsourced Storages in Clouds , 2013, IEEE Transactions on Services Computing.

[20]  Robert H. Deng,et al.  CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing , 2019, IEEE Transactions on Parallel and Distributed Systems.

[21]  Yongfeng Huang,et al.  DIRA: Enabling decentralized data integrity and reputation audit via blockchain , 2018, Science China Technological Sciences.

[22]  Xiaojun Zhang,et al.  Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[23]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[24]  Fagen Li,et al.  Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding , 2019, IEEE Access.

[25]  Feng Gao,et al.  Scalable and Privacy-Preserving Data Sharing Based on Blockchain , 2018, Journal of Computer Science and Technology.

[26]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[27]  John Yearwood,et al.  Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[28]  Mohamed Elhoseny,et al.  The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems , 2017, Journal of Ambient Intelligence and Humanized Computing.

[29]  Hui Li,et al.  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[30]  Arvind Narayanan,et al.  Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .

[31]  Jin Liu,et al.  Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Services Computing.

[32]  Baochun Li,et al.  Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud , 2014, IEEE Trans. Cloud Comput..