Skip to main content

A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

Abstract

Cloud computing has attracted wide attention because that it can provide the data storage and computation to us. However, when the users outsource the data to the cloud server, the users lost the control over the data, so the data auditing is very important to protect users’ data. To reduce computation and communication costs of the users, the existing schemes utilized a trusted third party (TPA) to conduct verification on behalf of users. However, TPA is a centralized party, which is vulnerable to external attacks and internal faults. In this paper, we present a decentralized public auditing scheme for cloud storage based on blockchain, which improves the reliability and stability of auditing result. In the proposed scheme, the cloud service providers works together to perform data verification without TPA. Finally, the security analysis shows that the scheme can resist a variety of attacks, and the experimental results demonstrate that proposed scheme has enhanced security and reliability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  2. Cao, S., Zhang, G., Liu, P., Zhang, X., Neri, F.: Cloud-assisted secure ehealth systems for tamper-proofing EHR via blockchain. Inf. Sci. 485, 427–440 (2019)

    Article  Google Scholar 

  3. Erway, C.C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. (TISSEC) 17(4), 1–29 (2015)

    Article  Google Scholar 

  4. Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Secur. 21(6), 539–556 (2002)

    Article  Google Scholar 

  5. Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)

    Google Scholar 

  6. Markandey, A., Dhamdhere, P., Gajmal, Y.: Data access security in cloud computing: a review. In: 2018 International Conference on Computing, Power and Communication Technologies (GUCON), pp. 633–636. IEEE (2018)

    Google Scholar 

  7. Nakamoto, S.: Bitcoin a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  8. Qureshi, K.N., Bashir, F., Iqbal, S.: Cloud computing model for vehicular ad hoc networks. In: 2018 IEEE 7th International Conference on Cloud Networking (CloudNet), pp. 1–3. IEEE (2018)

    Google Scholar 

  9. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_7

    Chapter  Google Scholar 

  10. Xue, J., Xu, C., Zhao, J., Ma, J.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci. China Inf. Sci. 62(3), 1–16 (2019). https://doi.org/10.1007/s11432-018-9462-0

    Article  Google Scholar 

  11. Yu, L., Cai, Z.: Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, pp. 1–9. IEEE (2016)

    Google Scholar 

  12. Yu, L., Shen, H., Cai, Z., Liu, L., Pu, C.: Towards bandwidth guarantee for virtual clusters under demand uncertainty in multi-tenant clouds. IEEE Trans. Parallel Distrib. Syst. 29(2), 450–465 (2017)

    Article  Google Scholar 

Download references

Acknowledgment

This research was supported partially by the Fundamental Research Funds for the Central Universities (2019CDQYRJ006), the National Natural Science Foundation of China(61702062), the Chongqing Research Program of Basic Research and Frontier Technology with Grant (cstc2018jcyjAX0334), Key Project of Technology Innovation and Application Development of Chongqing (cstc2019jscx-mbdxX0044), and Overseas Returnees Innovation and Entrepreneurship Support Program of Chongqing (cx2018015).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Conghao Ruan or Chunqiang Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Ruan, C., Hu, C. (2020). A Blockchain-Based Decentralized Public Auditing Scheme for Cloud Storage. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics