Abstract
Almost all existing data integrity verification schemes upload outsourced files and tags set to the CSP simultaneously. Thus, in this paper, we provide a novel idea to construct the integrity verification scheme via blockchain. The construction of the proposed scheme is based on identity-based encryption (IBE) which avoids the complex certificate management caused by the public key infrastructure (PKI). Our scheme decides to upload tags set to the blockchain to achieve the separate storage of the tags set and files. The characteristics of the blockchain determine that the tags set will not be forged. But separate storage may cause the information returned by the three parties participating in the public auditing to be out of sync; thus, a small data structure—audit log is introduced to solve this problem. The advantages of audit log can not only guarantee the correct and smooth implementation of the proposed scheme, but also prove the TPA’s innocence when necessary. Moreover, the security of our scheme is strictly proved. Finally, a series of performance evaluations demonstrate that our scheme is efficient and feasible.
Similar content being viewed by others
References
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, and Song D (2007) Provable data possession at untrusted stores. In: Proc. 14th ACM Conference on Computer and Communications Security. pp. 598–609
Ateniese G, Dipietro R, Mancini LV, and Tsudik G (2008) Scalable and efficient provable data possession. In: Proc. 4th International Conference on Security and Privacy in Communication Netowrks, pp. 1–10
Ateniese G, Burns R, Curtmola R, Joseph H, Osama K, Lea K, Zachary P, Song D (2011) Remote data checking using provable data possession. ACM Trans Inform Syst Security 14(1):1–34
Erway CC, Kupcu A, Papamanthou C, and Tamassia R (2009) Dynamic provable data possession. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 213–222
Juels Aand Kaliski BS (2007) PORs: Proofs of Retrievability for Large Files. In: Proc. 14th ACM Conference on Computer and Communications Security, pp. 584–597
Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483
Barsoum AF, Hasan MA (2015) Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans Inf Forensics Secur 10(3):485–497
Wang H (2013) Proxy provable data possession in public clouds. IEEE Trans Service Comput 6(4):551–559
Wang YJ, Wu QH, Tang SH, Willy S (2017) Online-offline provable data possession. IEEE Trans Inf Forensics Secur 12(5):1182–1194
Guo W, Zhang H, Qin SJ, Gao F, Jin ZP, Li WM, Wen QY (2019) Outsourced dynamic provable data possession with batch update for secure cloud storage. Futur Gener Comput Syst 95:309–322
Wang C, Chow SM, Wang Q, Ren K, Lou WJ (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375
Yu J, Ren K, Wang C, Varadharajan V (2016) Enabling cloud storage auditing with key-exposure resistance. IEEE Trans Inf Forensics Secur 10(6):1167–1179
Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system http://www.cryptovest.co.uk/resources/Bitcoin
Yuan Y, Wang FY (2016) Blockchain: the state of the art and future trends. Acta Automatica Sinica 42(4):481–494
Zheng ZB, Xie SA, Dai HN, Chen XP and Wang HM (2017) An overview of blockchain technology: Architecture, consensus, and future trends. In: Proc 2017 IEEE International Congress on Big Data (BigData Congress)
Kumar A, Fischer C, Tople S, Saxena P (2017) A traceability analysis of Moneros blockchain. In: Proc ESORICS, pp. 153–173
Sun SF, Au MH, Liu JK, Yuen TH (2017) RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Scheme for Blockchain Cryptocurrency Monero. In: Proc ESORICS, pp. 456–474
Sasson E, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: Decentralized anonymous payments from bitcoin. In: Proc 2014 IEEE Symposium on Security and Privacy, pp. 459–474
Li XQ, Jiang P, Chen T, Luo XP, Wen QY (2020) A survey on the security of blockchain systems. Futur Gener Comput Syst 107:841–853
Zhang R, Xue R and Liu L (2019) Security and privacy on Blockchain. In: ACM Computing Surveys. 52:3.
Bach LM, Mihaljevic B and Zagar M (2018) Comparative analysis of blockchain consensus algorithms. In: Proc International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
Xiong ZH, Zhang Y, Niyato D, Wang P, Han Z (2018) When mobile Blockchain meets edge computing. IEEE Commun Mag 56(8):33–39
Fotiou N, SirisGeorge VA, Polyzos C (2018) Interacting with the internet of things using smart contracts and Blockchain technologies. Proc on Security, Privacy and Anonym Comput Commun Storage 11342:443–452
Zhang YH, Deng RH, Liu XM, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277
Xu X, Chen Y, Yuan Y, Huang T, Zhang XY, Qi LY (2020) Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing. Multimed Tools and Appl 79:9819–9844
Shamir A (1984) Identity-based cryptosystems and signature schemes. Cryptology 196:47–53
Boneh D, Franklin M (2001) Identity-based encryption from the weil-pairing. Cryptology 2139:213–229
Paterson KG (2002) ID-based signatures from pairing on elliptic curves. Electrics Letters 38(8):1025–1026
Xun Y (2003) An identity-based signature scheme from the Weil pairing. IEEE Commun Lett 7(2):76–78
Cha JC, Cheon JH (2003) An identity-based signature from gap Diffie-Hellman groups. Proc Int Workshop on Public Key Cryptograp 2567:18–30
Shen WT, Qin J, Yu J, Hao R, Hu JK (2019) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Foren Secur 14(2):331–346
Wang HQ, He DB, Tang SH (2016) Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Trans Inf Forensics Secur 11(6):1165–1176
Li YN, Yu Y, Min GY, Susilo W, Ni JB, Choo KR (2019) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Dependable Secure Comput 16(1):72–83
Yu Y, Au MH, Ateniese G, Huang XY, Susilo W, Dai YS, Min GM (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767–778
Zou X, Deng XT, Wu T, Chen C (2020) A collusion attack on identity-based public auditing scheme via Blockchain. Proc Intell Inform Hiding and Multimed Sig Process 156:97–105
Wang HQ, Wang QH and He DB (2019) Blockchain-based private provable data possession. In: IEEE Transactions on Dependable and Secure Computing
Zhang Y, Xu CX, Lin XD and Shen XS (2019) Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. In: IEEE Transactions on Cloud Computing
Wang H, Qin H, Zhao MH, Wei XC, Shen H, Susilo W (2020) Blockchain-based fair payment smart contract for public cloud storage auditing. Inf Sci 519:348–362
Wei PC, Wang DH, Zhao Y, Tyagi SKS, Kumard N (2020) Blockchain data-based cloud data integrity protection mechanism. Futur Gener Comput Syst 102:902–911
Sutton A, Samavi R (2017) Blockchain enabled privacy audit logs. Proc International Semantic Web Conference 10587:645–660
Zhao QY, Chen SY, Liu ZL, Baker T and Zhang Y (2020) Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. In: Information Processing & Management, 57(6)
Yuan HR, Chen XF, Wang JF, Yuan JM, Yan HY, Susilo W (2020) Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci 541:409–425
Miao Y, Huang Q, Xiao MY, Li HB (2020) Decentralized and privacy-preserving public auditing for cloud storage based on Blockchain. IEEE Access 8:139813–139826
Wang Q, Wang C, Ren K, Lou WJ, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Hao Z, Zhong Sand YuNH (2011) A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Trans Knowl Data Eng 23(9):1432–1437
Xue JT, Xu CX, Zhao JN and Ma JF (2019) Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. In: Science China Information Sciences, 62
Acknowledgments
This work was supported in part by the Supported by Natural Science Foundation of Beijing Municipality under Grant M21039.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflict of interest to declare that are relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yuan, Y., Zhang, J., Xu, W. et al. Identity-based public data integrity verification scheme in cloud storage system via blockchain. J Supercomput 78, 8509–8530 (2022). https://doi.org/10.1007/s11227-021-04193-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04193-6