Skip to main content
Log in

Identity-based public data integrity verification scheme in cloud storage system via blockchain

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Almost all existing data integrity verification schemes upload outsourced files and tags set to the CSP simultaneously. Thus, in this paper, we provide a novel idea to construct the integrity verification scheme via blockchain. The construction of the proposed scheme is based on identity-based encryption (IBE) which avoids the complex certificate management caused by the public key infrastructure (PKI). Our scheme decides to upload tags set to the blockchain to achieve the separate storage of the tags set and files. The characteristics of the blockchain determine that the tags set will not be forged. But separate storage may cause the information returned by the three parties participating in the public auditing to be out of sync; thus, a small data structure—audit log is introduced to solve this problem. The advantages of audit log can not only guarantee the correct and smooth implementation of the proposed scheme, but also prove the TPA’s innocence when necessary. Moreover, the security of our scheme is strictly proved. Finally, a series of performance evaluations demonstrate that our scheme is efficient and feasible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, and Song D (2007) Provable data possession at untrusted stores. In: Proc. 14th ACM Conference on Computer and Communications Security. pp. 598–609

  2. Ateniese G, Dipietro R, Mancini LV, and Tsudik G (2008) Scalable and efficient provable data possession. In: Proc. 4th International Conference on Security and Privacy in Communication Netowrks, pp. 1–10

  3. Ateniese G, Burns R, Curtmola R, Joseph H, Osama K, Lea K, Zachary P, Song D (2011) Remote data checking using provable data possession. ACM Trans Inform Syst Security 14(1):1–34

    Article  Google Scholar 

  4. Erway CC, Kupcu A, Papamanthou C, and Tamassia R (2009) Dynamic provable data possession. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 213–222

  5. Juels Aand Kaliski BS (2007) PORs: Proofs of Retrievability for Large Files. In: Proc. 14th ACM Conference on Computer and Communications Security, pp. 584–597

  6. Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483

    Article  MathSciNet  Google Scholar 

  7. Barsoum AF, Hasan MA (2015) Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans Inf Forensics Secur 10(3):485–497

    Article  Google Scholar 

  8. Wang H (2013) Proxy provable data possession in public clouds. IEEE Trans Service Comput 6(4):551–559

    Article  Google Scholar 

  9. Wang YJ, Wu QH, Tang SH, Willy S (2017) Online-offline provable data possession. IEEE Trans Inf Forensics Secur 12(5):1182–1194

    Article  Google Scholar 

  10. Guo W, Zhang H, Qin SJ, Gao F, Jin ZP, Li WM, Wen QY (2019) Outsourced dynamic provable data possession with batch update for secure cloud storage. Futur Gener Comput Syst 95:309–322

    Article  Google Scholar 

  11. Wang C, Chow SM, Wang Q, Ren K, Lou WJ (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375

    Article  MathSciNet  Google Scholar 

  12. Yu J, Ren K, Wang C, Varadharajan V (2016) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10(6):1167–1179

    Google Scholar 

  13. Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system http://www.cryptovest.co.uk/resources/Bitcoin

  14. Yuan Y, Wang FY (2016) Blockchain: the state of the art and future trends. Acta Automatica Sinica 42(4):481–494

    Google Scholar 

  15. Zheng ZB, Xie SA, Dai HN, Chen XP and Wang HM (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: Proc 2017 IEEE International Congress on Big Data (BigData Congress)

  16. Kumar A, Fischer C, Tople S, Saxena P (2017) A traceability analysis of Moneros blockchain. In: Proc ESORICS, pp. 153–173

  17. Sun SF, Au MH, Liu JK, Yuen TH (2017) RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Scheme for Blockchain Cryptocurrency Monero. In: Proc ESORICS, pp. 456–474

  18. Sasson E, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: Decentralized anonymous payments from bitcoin. In: Proc 2014 IEEE Symposium on Security and Privacy, pp. 459–474

  19. Li XQ, Jiang P, Chen T, Luo XP, Wen QY (2020) A survey on the security of blockchain systems. Futur Gener Comput Syst 107:841–853

    Article  Google Scholar 

  20. Zhang R, Xue R and Liu L (2019) Security and privacy on Blockchain. In: ACM Computing Surveys. 52:3.

  21. Bach LM, Mihaljevic B and Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: Proc International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

  22. Xiong ZH, Zhang Y, Niyato D, Wang P, Han Z (2018) When mobile Blockchain meets edge computing. IEEE Commun Mag 56(8):33–39

    Article  Google Scholar 

  23. Fotiou N, SirisGeorge VA, Polyzos C (2018) Interacting with the internet of things using smart contracts and Blockchain technologies. Proc on Security, Privacy and Anonym Comput Commun Storage 11342:443–452

    Google Scholar 

  24. Zhang YH, Deng RH, Liu XM, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277

    Article  MathSciNet  Google Scholar 

  25. Xu X, Chen Y, Yuan Y, Huang T, Zhang XY, Qi LY (2020) Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multimed Tools and Appl 79:9819–9844

    Article  Google Scholar 

  26. Shamir A (1984) Identity-based cryptosystems and signature schemes. Cryptology 196:47–53

    Article  MathSciNet  Google Scholar 

  27. Boneh D, Franklin M (2001) Identity-based encryption from the weil-pairing. Cryptology 2139:213–229

    MathSciNet  MATH  Google Scholar 

  28. Paterson KG (2002) ID-based signatures from pairing on elliptic curves. Electrics Letters 38(8):1025–1026

    Article  MathSciNet  Google Scholar 

  29. Xun Y (2003) An identity-based signature scheme from the Weil pairing. IEEE Commun Lett 7(2):76–78

    Article  Google Scholar 

  30. Cha JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. Proc Int Workshop on Public Key Cryptograp 2567:18–30

    MathSciNet  MATH  Google Scholar 

  31. Shen WT, Qin J, Yu J, Hao R, Hu JK (2019) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Foren Secur 14(2):331–346

    Article  Google Scholar 

  32. Wang HQ, He DB, Tang SH (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176

    Article  Google Scholar 

  33. Li YN, Yu Y, Min GY, Susilo W, Ni JB, Choo KR (2019) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secure Comput 16(1):72–83

    Article  Google Scholar 

  34. Yu Y, Au MH, Ateniese G, Huang XY, Susilo W, Dai YS, Min GM (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767–778

    Article  Google Scholar 

  35. Zou X, Deng XT, Wu T, Chen C (2020) A collusion attack on identity-based public auditing scheme via Blockchain. Proc Intell Inform Hiding and Multimed Sig Process 156:97–105

    Google Scholar 

  36. Wang HQ, Wang QH and He DB (2019) Blockchain-based private provable data possession. In: IEEE Transactions on Dependable and Secure Computing

  37. Zhang Y, Xu CX, Lin XD and Shen XS (2019) Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. In: IEEE Transactions on Cloud Computing

  38. Wang H, Qin H, Zhao MH, Wei XC, Shen H, Susilo W (2020) Blockchain-based fair payment smart contract for public cloud storage auditing. Inf Sci 519:348–362

    Article  MathSciNet  Google Scholar 

  39. Wei PC, Wang DH, Zhao Y, Tyagi SKS, Kumard N (2020) Blockchain data-based cloud data integrity protection mechanism. Futur Gener Comput Syst 102:902–911

    Article  Google Scholar 

  40. Sutton A, Samavi R (2017) Blockchain enabled privacy audit logs. Proc International Semantic Web Conference 10587:645–660

    Google Scholar 

  41. Zhao QY, Chen SY, Liu ZL, Baker T and Zhang Y (2020) Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. In: Information Processing & Management, 57(6)

  42. Yuan HR, Chen XF, Wang JF, Yuan JM, Yan HY, Susilo W (2020) Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci 541:409–425

    Article  MathSciNet  Google Scholar 

  43. Miao Y, Huang Q, Xiao MY, Li HB (2020) Decentralized and privacy-preserving public auditing for cloud storage based on Blockchain. IEEE Access 8:139813–139826

    Article  Google Scholar 

  44. Wang Q, Wang C, Ren K, Lou WJ, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859

    Article  Google Scholar 

  45. Hao Z, Zhong Sand YuNH (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437

    Article  Google Scholar 

  46. Xue JT, Xu CX, Zhao JN and Ma JF (2019) Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. In: Science China Information Sciences, 62

Download references

Acknowledgments

This work was supported in part by the Supported by Natural Science Foundation of Beijing Municipality under Grant M21039.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianbiao Zhang.

Ethics declarations

Conflict of interest

The authors have no conflict of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yuan, Y., Zhang, J., Xu, W. et al. Identity-based public data integrity verification scheme in cloud storage system via blockchain. J Supercomput 78, 8509–8530 (2022). https://doi.org/10.1007/s11227-021-04193-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04193-6

Keywords

Navigation