Skip to main content
Log in

Block chain-based decentralized public auditing for cloud storage with improved EIGAMAL encryption model

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

With the growing relevance of data integrity, public auditing mechanisms for cloud storage models are intensively researched. In public auditing systems, a third person is used to ensure the outsourced data’s integrity on the user’s behalf. A lot of public verification models regarding blockchain are developed to combat cruel trusted Third Public Auditors (TPAs). Conventional models for auditing are based on TPA and are prone to an auditor enticing who colludes with the hostile block-chain to provide prejudiced results for auditing. This research work plans to propose a blockchain-based public auditing scheme to verify data integrity in cloud storage. The first people upload the data to the cloud and retrieve the data when they need it. The data must be encrypted and private among the second people and DO, since both DO and the second person do not believe each other. Therefore, the DO encrypts his/her data using the Improved EI-GAMAL (IEI-GAMAL) encryption algorithm and uploads the encrypted data to the Cloud Service Provider (CSP) via the blocks of the blockchain. For preserving the privacy of the data, the key for data encryption as well as decryption is generated using the new hybrid optimization model. The DO selects one TPA to audit the data on behalf of the DO. Generally, a TPA concentrates the data of numerous DOs and offers the audit for DOs. The DO requests a public audition to generate proof of the encrypted block stored in the blockchain when he requires verifying the data present in cloud storage. In order to provide strong updates and lessen the computation expenses, the new hybrid optimization algorithm is used. The new hybrid algorithm is the theoretical unify of the Adaptive Position-based Arithmetic with the Sunflower Optimization Algorithm (APA-SFOA). Several investigations are executed to prove the supremacy of the developed model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

No new data were generated or analysed in support of this research.

References

  1. Li J, Wu J, Jiang G, Srikanthan T (2020) Blockchain-based public auditing for big data in cloud storage. Inf Process Manag 57(6):102382. https://doi.org/10.1016/j.ipm.2020.102382

    Article  Google Scholar 

  2. Yuan H, Chen X, Wang J, Yuan J, Yan H, Susilo W (2020) Blockchain-based public auditing and secure deduplication with fair arbitration. Inf Sci 54:409–425

    Article  MathSciNet  Google Scholar 

  3. Loch WJ, Koslovski GP, Pillon MA, Miers CC, Pasin M (2021) A novel blockchain protocol for selecting microservices providers and auditing contracts. J Syst Softw 180:111030

    Article  Google Scholar 

  4. Yuen TH (2020) PAChain: private, authenticated & auditable consortium blockchain and its implementation. Future Gener Comput Syst 112:913–929

    Article  Google Scholar 

  5. Fan K, Bao Z, Liu M, Vasilakos AV, Shi W (2020) Dredas: decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT. Future Gener Comput Syst 110:665–674

    Article  Google Scholar 

  6. Li S, Liu J, Yang G, Han J (2020) A blockchain-based public auditing scheme for cloud storage environment without trusted auditors. Wirel Commun Mob Comput 2020:1–13

    Google Scholar 

  7. Li H, Guo F, Wang L, Wang J, Wang B, Wu C (2021) A blockchain-based public auditing protocol with self-certified public keys for cloud data. Secur Commun Netw 2021:1–10. https://doi.org/10.1155/2021/6623639

    Article  Google Scholar 

  8. Shu J, Zou X, Jia X, Zhang W, Xie R (2022) Blockchain-based decentralized public auditing for cloud storage. IEEE Trans Cloud Comput 10(4):2366–2380. https://doi.org/10.1109/tcc.2021.3051622

    Article  Google Scholar 

  9. Ermolaev V, Klangberg I, Madhwal Y, Vapper S, Wels S, Yanovich Y (2020) Incorruptible auditing: blockchain-powered graph database management. In: 2020 IEEE international conference on blockchain and cryptocurrency (ICBC), Toronto, ON, Canada, 2020, pp 1–3. https://doi.org/10.1109/ICBC48266.2020.9169431

  10. Xu Y, Zhang C, Wang G, Qin Z, Zeng Q (2021) A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans Emerg Top Comput 9(3):1421–1432. https://doi.org/10.1109/TETC.2020.3005610

    Article  Google Scholar 

  11. Huang P, Fan K, Yang H, Zhang K, Li H, Yang Y (2020) A collaborative auditing blockchain for trustworthy data integrity in cloud storage system. IEEE Access 8:94780–94794. https://doi.org/10.1109/ACCESS.2020.2993606

    Article  Google Scholar 

  12. Ahmad A, Saad M, Kim J, Nyang D, Mohaisen D (2021) Performance evaluation of consensus protocols in blockchain-based audit systems. In: 2021 International conference on information networking (ICOIN), Jeju Island, Korea (South), pp 654–656. https://doi.org/10.1109/ICOIN50884.2021.9333867

  13. Malhotra D, Srivastava D, Saini P, Singh AK (2021) Blockchain based audit trailing of XAI decisions: storing on IPFS and ethereum blockchain. In: 2021 international conference on COMmunication systems & networks (COMSNETS), Bangalore, India, pp 1–5. https://doi.org/10.1109/COMSNETS51098.2021.9352908

  14. Antipova T (2018) Using blockchain technology for government auditing. In: 2018 13th Iberian conference on information systems and technologies (CISTI), Caceres, Spain, pp 1–6. https://doi.org/10.23919/CISTI.2018.8399439

  15. Lu Y, Qi Y, Qi S, Li Y, Song H, Liu Y (2022) Say no to price discrimination: decentralized and automated incentives for price auditing in ride-hailing services. IEEE Trans Mob Comput 21:663–680. https://doi.org/10.1109/TMC.2020.3008315

    Article  Google Scholar 

  16. Cha S, Yeh K (2018) An ISO/IEC 15408-2 compliant security auditing system with blockchain technology. In: 2018 IEEE conference on communications and network security (CNS), Beijing, China, pp 1–2. https://doi.org/10.1109/CNS.2018.8433185

  17. Lu Y et al (2023) Safety warning! Decentralised and automated incentives for disqualified drivers auditing in ride-hailing services. IEEE Trans Mob Comput 22:1748–1762. https://doi.org/10.1109/TMC.2021.3108012

    Article  Google Scholar 

  18. Huang L et al (2020) IPANM: incentive public auditing scheme for non-manager groups in clouds. IEEE Trans Depend Secur Comput. https://doi.org/10.1109/TDSC.2020.3004827

    Article  Google Scholar 

  19. Tian G et al (2022) Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans Depend Secur Comput. https://doi.org/10.1109/TDSC.2021.3114160

    Article  Google Scholar 

  20. Felipe Munoz M, Zhang K, Shahzad A, Ouhimmou M (2021) LogLog: a blockchain solution for tracking and certifying wood volumes. In: 2021 IEEE international conference on blockchain and cryptocurrency (ICBC), Sydney, Australia, pp 1–9. https://doi.org/10.1109/ICBC51069.2021.9461153

  21. Baofu H, Hui L, Chuansi W (2021) Blockchain-based distributed data integrity auditing scheme. In: 2021 IEEE 6th international conference on big data analytics (ICBDA), Xiamen, China, pp 143–149. https://doi.org/10.1109/ICBDA51983.2021.9403079

  22. Zhang Y, Xu C, Lin X, Shen X (2021) Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans Cloud Comput 9(3):923–937. https://doi.org/10.1109/TCC.2019.2908400

    Article  Google Scholar 

  23. Shimosawa T, Sato T, Oshima S (2020) BCVerifier: a tool to verify hyperledger fabric ledgers. In: 2020 IEEE international conference on blockchain (blockchain), Rhodes, Greece, pp 291–299. https://doi.org/10.1109/Blockchain50366.2020.00043

  24. Mendonça BDA, Matias P (2021) Auditchain: a mechanism for ensuring logs integrity based on proof of existence in a public blockchain. In: 2021 11th IFIP international conference on new technologies, mobility and security (NTMS), Paris, France, pp 1–5. https://doi.org/10.1109/NTMS49979.2021.9432639

  25. López-Pimentel JC, Rojas O, Monroy R (2020) Blockchain and off-chain: a solution for audit issues in supply chain systems. In: 2020 IEEE International conference on blockchain (blockchain), Rhodes, Greece, pp 126–133. https://doi.org/10.1109/Blockchain50366.2020.00023

  26. Lemieux V, Voskobojnikov A, Kang M (2021) Addressing audit and accountability issues in self-sovereign identity blockchain systems using archival science principles. In: 2021 IEEE 45th annual computers, software, and applications conference (COMPSAC), Madrid, Spain, pp 1210–1216. https://doi.org/10.1109/COMPSAC51774.2021.00167

  27. Gong F, Li D, Han N, Tian S (2020) A highly trusted demand response system based on block-chain. In: 2020 Asia energy and electrical engineering symposium (AEEES), Chengdu, China, pp 1024–1027. https://doi.org/10.1109/AEEES48850.2020.9121488

  28. Yu H, Yang Z, Sinnott RO (2019) Decentralized big data auditing for smart city environments leveraging blockchain technology. IEEE Access 7:6288–6296. https://doi.org/10.1109/ACCESS.2018.2888940

    Article  Google Scholar 

  29. Ardagna CA, Anisetti M, Carminati B, Damiani E, Ferrari E, Rondanini C (2020) A blockchain-based trustworthy certification process for composite services. In: 2020 IEEE international conference on services computing (SCC), Beijing, China, pp 422–429. https://doi.org/10.1109/SCC49832.2020.00062

  30. Gao S, Zheng D, Guo R, Jing C, Hu C (2019) An anti-quantum e-voting protocol in blockchain with audit function. IEEE Access 7:115304–115316. https://doi.org/10.1109/ACCESS.2019.2935895

    Article  Google Scholar 

  31. Tesfamicael AD, Liu V, Mckague M, Caelli W (2021) An architecture to facilitate security assurance and legal compliance for call auditing in the wholesale electricity market. IEEE Access 9:146437–146453. https://doi.org/10.1109/ACCESS.2021.3122518

    Article  Google Scholar 

  32. Anwar S, Shukla VK, Rao SS, Sharma BK, Sharma P (2019) Framework for financial auditing process through blockchain technology, using identity based cryptography. In: 2019 sixth HCT information technology trends (ITT), Ras Al Khaimah, United Arab Emirates, pp 99–103. https://doi.org/10.1109/ITT48889.2019.9075120

  33. Suzuki S, Murai J (2017) Blockchain as an audit-able communication channel. In: 2017 IEEE 41st annual computer software and applications conference (COMPSAC), pp 516–522. https://doi.org/10.1109/COMPSAC.2017.72

  34. Abualigaha L, Diabatb A, Mirjalilid S, Elaziz MA, Gandomih AH (2021) The arithmetic optimization algorithm. Comput Methods Appl Mech Eng 376:113609

    Article  MathSciNet  ADS  Google Scholar 

  35. Gomes GF, da Cunha Jr. SS, Ancelotti Jr. AC (2019) A sunflower optimization (SFO) algorithm applied to damage identification on laminated composite plates. Eng Comput 35:619–626

    Article  Google Scholar 

  36. Zaki Diab AA, Tolba MA, El-Rifaie AM, Denis KA (2022) Photovoltaic parameter estimation using honey badger algorithm and African vulture optimization algorithm. Energy Rep 8:384–393

    Article  Google Scholar 

  37. Gawali MB, Gawali SS (2021) Optimized skill knowledge transfer model using hybrid chicken swarm plus deer hunting optimization for human to robot interaction. Knowl Based Syst 220:106945

    Article  Google Scholar 

  38. Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6(2):182–197

    Article  Google Scholar 

  39. Seo J-H, Im C-H, Heo C-G, Kim J-K, Jung H-K, Lee C-G (2006) Multimodal function optimization based on particle swarm optimization. IEEE Trans Magn 42(4):1095–1098

    Article  ADS  Google Scholar 

  40. Singh U, Kumar H, Kamal TS (2010) Design of Yagi-Uda antenna using biogeography based optimization. IEEE Trans Antennas Propag 58(10):3375–3379

    Article  ADS  Google Scholar 

  41. Li K, Tan Z (2019) An improved flower pollination optimizer algorithm for multilevel image thresholding. IEEE Access 7:165571–165582

    Article  Google Scholar 

  42. Chaman-Motlagh A (2015) Superdefect photonic crystal filter optimization using grey wolf optimizer. IEEE Photon Technol Lett 27(22):2355–2358

    Article  ADS  CAS  Google Scholar 

  43. Senthilnath J, Kulkarni S, Benediktsson JA, Yang XS (2016) A novel approach for multispectral satellite image classification based on the bat algorithm. IEEE Geosci Remote Sens Lett 13(4):599–603

    Article  ADS  Google Scholar 

  44. Marichelvam MK, Prabaharan T, Yang XS (2014) A discrete firefly algorithm for the multi-objective hybrid flowshop scheduling problems. IEEE Trans Evol Comput 18(2):301–305

    Article  Google Scholar 

  45. Li X, Ma S, Yang G (2017) Synthesis of difference patterns for monopulse antennas by an improved cuckoo search algorithm. IEEE Antennas Wirel Propag Lett 16:141–144

    Article  ADS  Google Scholar 

  46. Li C, Niu Z, Song Z, Li B, Fan J, Liu PX (2018) A double evolutionary learning moth-flame optimization for real-parameter global optimization problems. IEEE Access 6:76700–76727

    Article  Google Scholar 

  47. Coelho LDS, Mariani VC, Tutkun N, Alotto P (2014) Magnetizer design based on a quasi-oppositional gravitational search algorithm. IEEE Trans Magn 50(2):705–708

    Article  ADS  Google Scholar 

  48. Das S, Abraham A, Konar A (2008) Automatic clustering using an improved differential evolution algorithm. IEEE Trans Syst Man Cybern Part A Syst Hum 38(1):218–237

    Article  Google Scholar 

  49. Huang X, Wang W (2015) A novel and efficient design for an rsa cryptosystem with a very large key size. IEEE Trans Circuits Syst II Express Briefs 62(10):972–976

    Google Scholar 

  50. Jarvinen K, Skytta J (2008) On parallelization of high-speed processors for elliptic curve cryptography. IEEE Trans Very Large Scale Integr (VLSI) Syst 16(9):1162–1175. https://doi.org/10.1109/tvlsi.2008.2000728

    Article  Google Scholar 

  51. Zhou X, Li Y, Wang J, Huang Z (2001) The temperature measurement of the electrothermal-chemical launcher plasma by atomic emission spectroscopy. IEEE Trans Plasma Sci 29(2):360–364

    Article  ADS  CAS  Google Scholar 

  52. Ordonez AJ, Medina RP, Gerardo BD (2018) Modified El Gamal algorithm for multiple senders and single receiver encryption. In: IEEE symposium on computer applications & industrial electronics (ISCAIE), pp 201–205

  53. Bandanadam SR, Prasanna Kumar R (2021) Comprehensive review of blockchain technology and functional impacts in terms of security. Des Eng 3226–3234

  54. Bandanadam SR, Prasanna Kumar R (2022) A methodical literature survey on block chain-based public auditing in cloud: analysis on performance and door towards future scope. In: 2022 International conference on applied artificial intelligence and computing (ICAAIC). IEEE

  55. Kumar P, Shah M (2020) To build scalable and portable blockchain application using docker. In: Soft computing: theories and applications, pp 619–628

  56. Ramesh D, Mishra R, Atrey PK, Edla DR, Misra S, Qi L (2023) Blockchain based efficient tamper-proof EHR storage for decentralized cloud-assisted storage. Alex Eng J 68:205–226

    Article  Google Scholar 

  57. Li Y, Tang M (2023) Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system. Cyber Secur 1:100017

    Google Scholar 

  58. Lei M, Liu S, Luo N, Yang X, Sun C (2022) Trusted-auditing chain: a security blockchain prototype used in agriculture traceability. Heliyon 8:11447

    Article  Google Scholar 

  59. Athanere S, Thakur R (2022) Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing. J King Saud Univ Comput Inf Sci 34:1523–1534

    Google Scholar 

  60. Reddy MR, Akilandeswari R, Priyadarshini S, Karthikeyan B, Ponmani E (2017) A modified cryptographic approach for securing distributed data storage in cloud computing. In: 2017 International conference on networks & advances in computational technologies (NetACT), IEEE. July, pp 131–139

  61. Mishachandar B, Vairamuthu S, Pavithra M (2021) A data security and integrity framework using third-party cloud auditing. Int J Inf Technol 13:2081–2089

    Google Scholar 

  62. Allagi S, Rachh R, Anami B (2021) A hybrid model for data security and preserving anonymity using machine learning. Int J Inf Technol 13:2397–2410

    Google Scholar 

  63. Pabitha P, Chandra Priya J, Praveen R, Jagatheswari S (2023) ModChain: a hybridized secure and scaling blockchain framework for IoT environment. Int J Inf Technol 15:1741–1754

    Google Scholar 

  64. Huang Y, Shen W, Qin J, Hou H (2023) Privacy-preserving certificateless public auditing supporting different auditing frequencies. Comput Secur 128:103181

    Article  Google Scholar 

  65. Gai C, Shen W, Yang M, Yu J (2023) PPADT: privacy-preserving identity-based public auditing with efficient data transfer for cloud-based IoT data. IEEE Internet of Things J (Early Access) 10:20065–20079

    Article  Google Scholar 

  66. Masood R, Pandey N, Rana QP (2023) Towards P2P dynamic-hash-table-based public auditing for cloud data privacy, security and integrity. Int J Cloud Comput 12(1):72–89

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Prasanna Kumar.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, R.P., Bandanadam, S.R. Block chain-based decentralized public auditing for cloud storage with improved EIGAMAL encryption model. Int. j. inf. tecnol. 16, 697–711 (2024). https://doi.org/10.1007/s41870-023-01599-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-023-01599-8

Keywords

Navigation