Skip to main content

Public Audit Scheme of Shared Data Based on Blockchain

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1105))

Abstract

A cloud platform provides users with shared data storage services. While the cloud protects the privacy of users, it is inevitable that malicious users illegally use shared data. Currently, the audit scheme in which managing users access records by group managers is widely adopted, and this scheme realizes the protection of users’ identity privacy and the traceability of users’ identities. However, this kind of scheme disregards the hidden danger of group managers and has certain limitations. This paper proposes a public audit scheme of shared data based on the blockchain (BBSD). First, by introducing the blockchain technology, this paper realizes the sharing of records information, avoids the hidden security risks of group managers, and simultaneously makes the user identity traceable. Second, this paper constructs a novel audit algorithm to preprocess users’ revocation, which adopts a new resignature algorithm to make management more secure and reliable. Then, this paper introduces an outsourcing algorithm to reduce the computational burden of users. Finally, the theoretical analysis and experimental verification show that BBSD is secure and efficient.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hao, Y., Li, J.G., Han, J.G., Zhang, Y.C.: A novel efficient remote data possession checking protocol in cloud storage. IEEE Trans. Inf. Forensics Secur. 12, 78–88 (2016)

    Google Scholar 

  2. Li, Y., Yao, G., Lei, L.N., Wang, H.Q., Lin, C.L.: Large branching tree based dynamic provable data possession scheme. J. Inf. Sci. Eng. 33, 653–673 (2017)

    MathSciNet  Google Scholar 

  3. Wang, F., Xu, L., Wang, H.Q., Chen, Z.D.: Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69, 521–533 (2018)

    Article  Google Scholar 

  4. Wang, B.Y., Li, B.C., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2, 43–56 (2014)

    Article  Google Scholar 

  5. Worku, S.G., Xu, C.X., Zhao, J.N., He, X.H.: Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40, 1703–1713 (2014)

    Article  Google Scholar 

  6. Shen, W.T., Yu, J., Xia, H., Zhang, H.L., Lu, X.Q., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)

    Article  Google Scholar 

  7. Wang, B.Y., Li, B.C., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8, 92–106 (2015)

    Article  Google Scholar 

  8. Jiang, T., Chen, X.F., Ma, J.F.: Public integrity auditing for shared dynamic cloud data with group user revocation. EEE Trans. Comput. 65, 2363–2373 (2016)

    Article  MathSciNet  Google Scholar 

  9. Yuan, J.W., Yu, S.C.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the 2014 IEEE Conference on Computer Communications, Toronto, Canada 27 April 2014–2 May 2014

    Google Scholar 

  10. Luo, Y.C., Xu, M., Huang, K., Wang, D.S., Fu, S.J.: Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Comput. Secur. 73, 492–506 (2018)

    Article  Google Scholar 

  11. Fu, A.M., Qin, N.Y., Song, J.Y., Su, M.: Privacy-preserving public auditing for multiple managers shared data in the cloud. J. Comput. Res. Dev. 52, 2353–2362 (2015)

    Google Scholar 

  12. Yang, G.Y., Yu, J., Shen, W.T., Su, Q.Q., Fu, Z.J., Hao, R.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)

    Article  Google Scholar 

  13. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October 2007–11 December 2007

    Google Scholar 

  14. Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the ACM Transactions on Information and System Security (TISSEC), Chicago, IL, USA, 9 November 2009–13 November 2009

    Google Scholar 

  15. Juels, A., Kaliski Jr., B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October 2007–2 November 2007

    Google Scholar 

  16. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_7

    Chapter  Google Scholar 

  17. Mastering Bitcoin. Homepage. http://book.8btc.com/books/1/master_bitcoin/_book/. Accessed 13 Dec 2018

  18. Zhang, X.P., Xu, C.X., Zhang, X.J., Gu, T.Z., Geng, Z., Liu, G.P.: Efficient dynamic integrity verification for big data supporting users revocability. Information 7, 31 (2016)

    Article  Google Scholar 

  19. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17, 297–319 (2004)

    Article  MathSciNet  Google Scholar 

  20. Shen, W.T., Yu, J., Yang, G.Y., Cheng, X.G., Hao, R.: Cloud storage integrity checking scheme with private key recovery capability. J. Softw. 27, 1451–1462 (2016)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Jing .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tian, J., Jing, X., Guo, R. (2019). Public Audit Scheme of Shared Data Based on Blockchain. In: Shen, B., Wang, B., Han, J., Yu, Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://doi.org/10.1007/978-981-15-0818-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0818-9_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0817-2

  • Online ISBN: 978-981-15-0818-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics