Blockchain-Based Public Auditing Scheme for Shared Data

With the rapid development of cloud computing, an increasing number of organizations and individuals store and share their data on untrusted clouds. Therefore, shared data auditing has become an important issue in the field of cloud storage, attracting the attention of researchers. However, the state-of-the-art schemes can not fully meet the performance and security requirements. Therefore, in this paper we propose a public audit shared data protocol for cloud storage by using blockchain and Rank-based Merkle AVL tree (RB-MHT) to achieve privacy preserving and batch auditing to reduce system overhead as well as keeping the security of modification record in this blockchain-based scheme. For privacy-perserving, the auditing signature is only related to group management during the audit process and data will be blind by a random value. Furthermore, we prove the security of our scheme and evaluate the performance of it through implementation. The results demonstrate that the proposed scheme is provably secure and efficient.

[1]  Feng Gao,et al.  Scalable and Privacy-Preserving Data Sharing Based on Blockchain , 2018, Journal of Computer Science and Technology.

[2]  Chin-Chen Chang,et al.  Public auditing for shared cloud data with efficient and secure group management , 2019, Inf. Sci..

[3]  Baochun Li,et al.  Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud , 2014, IEEE Trans. Cloud Comput..

[4]  Anmin Fu,et al.  SeShare: Secure cloud data sharing based on blockchain and public auditing , 2019, Concurr. Comput. Pract. Exp..

[5]  Arvind Narayanan,et al.  Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .

[6]  Hui Li,et al.  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[7]  Yining Qi,et al.  Enabling Efficient Verification of Dynamic Data Possession and Batch Updating in Cloud Storage , 2018, KSII Trans. Internet Inf. Syst..

[8]  Cong Wang,et al.  Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[9]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[10]  Athanasios V. Vasilakos,et al.  IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.

[11]  Fuchun Guo,et al.  Searchain: Blockchain-based private keyword search in decentralized storage , 2017, Future Gener. Comput. Syst..

[12]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[13]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[14]  Bahman Javadi,et al.  Cloud storage reliability for Big Data applications: A state of the art survey , 2017, J. Netw. Comput. Appl..

[15]  Kumar Bhaskaran,et al.  Double-Blind Consent-Driven Data Sharing on Blockchain , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).

[16]  Yuqing Zhang,et al.  Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.

[17]  Wenting Shen,et al.  Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability , 2016, J. Syst. Softw..