Themis: An accountable blockchain-based P2P cloud storage scheme

Cloud storage is an effective way for data owners to outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services. In traditional cloud storage systems, cloud data integrity verification relies on centralized entities and data is stored in a small number of storage servicers. However, these centralized entities and storage servicers may be untrustworthy, and malicious servicers may even refuse to perform a user’s query or update request. Though a few blockchain-based themes have been proposed to address some of these problems, they do not achieve decentralization, accountability, flexibility and practicability simultaneously. In this paper, we present Themis, an accountable P2P cloud storage scheme with smart contracts on Ethereum. Our scheme has the following advantages: First, cloud data integrity verification is decentralized and implemented by miners on blockchain without any trusted third party. Second, by carefully setting up the reward and punishment mechanism within a smart storage contract, all rational nodes will participate in the storage service following an accountable rule. Third, based on reliable information published on the blockchain, users are free to choose appropriate storage servicers who want to share idle storage, making storage service decentralized and flexible. Fourth, compared with the existing related systems, by adopting a payment at maturity method, the malicious behavior of breaking the contract after the servicer obtains some revenue is prevented, and the availability of user data within the specified period is enhanced. Fourthermore, we implement a prototype of Themis on Rinkeby, an Ethereum test network. Extensive experimental results demonstrate that our scheme is able to support a PB-level data storage in a single P2P storage service at a low cost and is feasible for practical deployment. And the entire decentralized arbitration process takes only 40 to 110 seconds.

[1]  Yi Mu,et al.  Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation , 2017, IEEE Transactions on Information Forensics and Security.

[2]  Sunghyuck Hong,et al.  P2P networking based internet of things (IoT) sensor node authentication by Blockchain , 2019, Peer-to-Peer Networking and Applications.

[3]  Elaine Shi,et al.  Practical dynamic proofs of retrievability , 2013, CCS.

[4]  Adrian-Tudor Panescu,et al.  Smart Contracts for Research Data Rights Management over the Ethereum Blockchain Network , 2018 .

[5]  Aggelos Kiayias,et al.  SoK: A Consensus Taxonomy in the Blockchain Era , 2020, IACR Cryptol. ePrint Arch..

[6]  Hui Li,et al.  An improved P2P file system scheme based on IPFS and Blockchain , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[7]  Aruna Seneviratne,et al.  A Delay-Tolerant Payment Scheme Based on the Ethereum Blockchain , 2018, IEEE Access.

[8]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[9]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[10]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[11]  Yong Yu,et al.  Secure Pub-Sub: Blockchain-Based Fair Payment With Reputation for Reliable Cyber Physical Systems , 2018, IEEE Access.

[12]  Abhi Shelat,et al.  Analysis of the Blockchain Protocol in Asynchronous Networks , 2017, EUROCRYPT.

[13]  David Cash,et al.  Dynamic Proofs of Retrievability Via Oblivious RAM , 2013, Journal of Cryptology.

[14]  Aggelos Kiayias,et al.  The Bitcoin Backbone Protocol: Analysis and Applications , 2015, EUROCRYPT.

[15]  Elaine Shi,et al.  Cloud Data Protection for the Masses , 2012, Computer.

[16]  Jiangtao Wen,et al.  The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.

[17]  Nick Szabo,et al.  Formalizing and Securing Relationships on Public Networks , 1997, First Monday.

[18]  Eli Ben-Sasson,et al.  SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge , 2013, CRYPTO.

[19]  Tao Li,et al.  Towards Lightweight and Swift Storage Resource Management in Big Data Cloud Era , 2015, ICS.

[20]  Weimin Lang,et al.  Research on the Cloud Storage Security in Big Data Era , 2015 .

[21]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.