Abstract
Cloud computing has attracted wide attention because that it can provide the data storage and computation to us. However, when the users outsource the data to the cloud server, the users lost the control over the data, so the data auditing is very important to protect users’ data. To reduce computation and communication costs of the users, the existing schemes utilized a trusted third party (TPA) to conduct verification on behalf of users. However, TPA is a centralized party, which is vulnerable to external attacks and internal faults. In this paper, we present a decentralized public auditing scheme for cloud storage based on blockchain, which improves the reliability and stability of auditing result. In the proposed scheme, the cloud service providers works together to perform data verification without TPA. Finally, the security analysis shows that the scheme can resist a variety of attacks, and the experimental results demonstrate that proposed scheme has enhanced security and reliability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Cao, S., Zhang, G., Liu, P., Zhang, X., Neri, F.: Cloud-assisted secure ehealth systems for tamper-proofing EHR via blockchain. Inf. Sci. 485, 427–440 (2019)
Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1–29 (2015)
Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539–556 (2002)
Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)
Markandey, A., Dhamdhere, P., Gajmal, Y.: Data access security in cloud computing: a review. In: 2018 International Conference on Computing, Power and Communication Technologies (GUCON), pp. 633–636. IEEE (2018)
Nakamoto, S.: Bitcoin a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
Qureshi, K.N., Bashir, F., Iqbal, S.: Cloud computing model for vehicular ad hoc networks. In: 2018 IEEE 7th International Conference on Cloud Networking (CloudNet), pp. 1–3. IEEE (2018)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_7
Xue, J., Xu, C., Zhao, J., Ma, J.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci. China Inf. Sci. 62(3), 1–16 (2019). https://doi.org/10.1007/s11432-018-9462-0
Yu, L., Cai, Z.: Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, pp. 1–9. IEEE (2016)
Yu, L., Shen, H., Cai, Z., Liu, L., Pu, C.: Towards bandwidth guarantee for virtual clusters under demand uncertainty in multi-tenant clouds. IEEE Trans. Parallel Distrib. Syst. 29(2), 450–465 (2017)
Acknowledgment
This research was supported partially by the Fundamental Research Funds for the Central Universities (2019CDQYRJ006), the National Natural Science Foundation of China(61702062), the Chongqing Research Program of Basic Research and Frontier Technology with Grant (cstc2018jcyjAX0334), Key Project of Technology Innovation and Application Development of Chongqing (cstc2019jscx-mbdxX0044), and Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing (cx2018015).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, Y., Ruan, C., Hu, C. (2020). A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_40
Download citation
DOI: https://doi.org/10.1007/978-3-030-59016-1_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59015-4
Online ISBN: 978-3-030-59016-1
eBook Packages: Computer ScienceComputer Science (R0)