Public Audit Scheme of Shared Data Based on Blockchain

  • Junfeng Tian
  • Xuan JingEmail author
  • Ruifang Guo
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1105)


A cloud platform provides users with shared data storage services. While the cloud protects the privacy of users, it is inevitable that malicious users illegally use shared data. Currently, the audit scheme in which managing users access records by group managers is widely adopted, and this scheme realizes the protection of users’ identity privacy and the traceability of users’ identities. However, this kind of scheme disregards the hidden danger of group managers and has certain limitations. This paper proposes a public audit scheme of shared data based on the blockchain (BBSD). First, by introducing the blockchain technology, this paper realizes the sharing of records information, avoids the hidden security risks of group managers, and simultaneously makes the user identity traceable. Second, this paper constructs a novel audit algorithm to preprocess users’ revocation, which adopts a new resignature algorithm to make management more secure and reliable. Then, this paper introduces an outsourcing algorithm to reduce the computational burden of users. Finally, the theoretical analysis and experimental verification show that BBSD is secure and efficient.


Shared data Blockchain Resignature algorithm Outsourcing algorithm 


  1. 1.
    Hao, Y., Li, J.G., Han, J.G., Zhang, Y.C.: A novel efficient remote data possession checking protocol in cloud storage. IEEE Trans. Inf. Forensics Secur. 12, 78–88 (2016)Google Scholar
  2. 2.
    Li, Y., Yao, G., Lei, L.N., Wang, H.Q., Lin, C.L.: Large branching tree based dynamic provable data possession scheme. J. Inf. Sci. Eng. 33, 653–673 (2017)MathSciNetGoogle Scholar
  3. 3.
    Wang, F., Xu, L., Wang, H.Q., Chen, Z.D.: Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69, 521–533 (2018)CrossRefGoogle Scholar
  4. 4.
    Wang, B.Y., Li, B.C., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2, 43–56 (2014)CrossRefGoogle Scholar
  5. 5.
    Worku, S.G., Xu, C.X., Zhao, J.N., He, X.H.: Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40, 1703–1713 (2014)CrossRefGoogle Scholar
  6. 6.
    Shen, W.T., Yu, J., Xia, H., Zhang, H.L., Lu, X.Q., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)CrossRefGoogle Scholar
  7. 7.
    Wang, B.Y., Li, B.C., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8, 92–106 (2015)CrossRefGoogle Scholar
  8. 8.
    Jiang, T., Chen, X.F., Ma, J.F.: Public integrity auditing for shared dynamic cloud data with group user revocation. EEE Trans. Comput. 65, 2363–2373 (2016)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Yuan, J.W., Yu, S.C.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the 2014 IEEE Conference on Computer Communications, Toronto, Canada 27 April 2014–2 May 2014Google Scholar
  10. 10.
    Luo, Y.C., Xu, M., Huang, K., Wang, D.S., Fu, S.J.: Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Comput. Secur. 73, 492–506 (2018)CrossRefGoogle Scholar
  11. 11.
    Fu, A.M., Qin, N.Y., Song, J.Y., Su, M.: Privacy-preserving public auditing for multiple managers shared data in the cloud. J. Comput. Res. Dev. 52, 2353–2362 (2015)Google Scholar
  12. 12.
    Yang, G.Y., Yu, J., Shen, W.T., Su, Q.Q., Fu, Z.J., Hao, R.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)CrossRefGoogle Scholar
  13. 13.
    Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October 2007–11 December 2007Google Scholar
  14. 14.
    Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the ACM Transactions on Information and System Security (TISSEC), Chicago, IL, USA, 9 November 2009–13 November 2009Google Scholar
  15. 15.
    Juels, A., Kaliski Jr., B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October 2007–2 November 2007Google Scholar
  16. 16.
    Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). Scholar
  17. 17.
    Mastering Bitcoin. Homepage. Accessed 13 Dec 2018
  18. 18.
    Zhang, X.P., Xu, C.X., Zhang, X.J., Gu, T.Z., Geng, Z., Liu, G.P.: Efficient dynamic integrity verification for big data supporting users revocability. Information 7, 31 (2016)CrossRefGoogle Scholar
  19. 19.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17, 297–319 (2004)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Shen, W.T., Yu, J., Yang, G.Y., Cheng, X.G., Hao, R.: Cloud storage integrity checking scheme with private key recovery capability. J. Softw. 27, 1451–1462 (2016)MathSciNetzbMATHGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Cyberspace Security and Computer CollegeHebei UniversityBaodingChina
  2. 2.Key Laboratory on High Trusted Information System in Hebei ProvinceBaodingChina

Personalised recommendations