Abstract
A cloud platform provides users with shared data storage services. While the cloud protects the privacy of users, it is inevitable that malicious users illegally use shared data. Currently, the audit scheme in which managing users access records by group managers is widely adopted, and this scheme realizes the protection of users’ identity privacy and the traceability of users’ identities. However, this kind of scheme disregards the hidden danger of group managers and has certain limitations. This paper proposes a public audit scheme of shared data based on the blockchain (BBSD). First, by introducing the blockchain technology, this paper realizes the sharing of records information, avoids the hidden security risks of group managers, and simultaneously makes the user identity traceable. Second, this paper constructs a novel audit algorithm to preprocess users’ revocation, which adopts a new resignature algorithm to make management more secure and reliable. Then, this paper introduces an outsourcing algorithm to reduce the computational burden of users. Finally, the theoretical analysis and experimental verification show that BBSD is secure and efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hao, Y., Li, J.G., Han, J.G., Zhang, Y.C.: A novel efficient remote data possession checking protocol in cloud storage. IEEE Trans. Inf. Forensics Secur. 12, 78–88 (2016)
Li, Y., Yao, G., Lei, L.N., Wang, H.Q., Lin, C.L.: Large branching tree based dynamic provable data possession scheme. J. Inf. Sci. Eng. 33, 653–673 (2017)
Wang, F., Xu, L., Wang, H.Q., Chen, Z.D.: Identity-based non-repudiable dynamic provable data possession in cloud storage. Comput. Electr. Eng. 69, 521–533 (2018)
Wang, B.Y., Li, B.C., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2, 43–56 (2014)
Worku, S.G., Xu, C.X., Zhao, J.N., He, X.H.: Secure and efficient privacy-preserving public auditing scheme for cloud storage. Comput. Electr. Eng. 40, 1703–1713 (2014)
Shen, W.T., Yu, J., Xia, H., Zhang, H.L., Lu, X.Q., Hao, R.: Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82, 56–64 (2017)
Wang, B.Y., Li, B.C., Li, H.: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8, 92–106 (2015)
Jiang, T., Chen, X.F., Ma, J.F.: Public integrity auditing for shared dynamic cloud data with group user revocation. EEE Trans. Comput. 65, 2363–2373 (2016)
Yuan, J.W., Yu, S.C.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of the 2014 IEEE Conference on Computer Communications, Toronto, Canada 27 April 2014–2 May 2014
Luo, Y.C., Xu, M., Huang, K., Wang, D.S., Fu, S.J.: Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. Comput. Secur. 73, 492–506 (2018)
Fu, A.M., Qin, N.Y., Song, J.Y., Su, M.: Privacy-preserving public auditing for multiple managers shared data in the cloud. J. Comput. Res. Dev. 52, 2353–2362 (2015)
Yang, G.Y., Yu, J., Shen, W.T., Su, Q.Q., Fu, Z.J., Hao, R.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)
Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October 2007–11 December 2007
Erway, C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the ACM Transactions on Information and System Security (TISSEC), Chicago, IL, USA, 9 November 2009–13 November 2009
Juels, A., Kaliski Jr., B.S.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October 2007–2 November 2007
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_7
Mastering Bitcoin. Homepage. http://book.8btc.com/books/1/master_bitcoin/_book/. Accessed 13 Dec 2018
Zhang, X.P., Xu, C.X., Zhang, X.J., Gu, T.Z., Geng, Z., Liu, G.P.: Efficient dynamic integrity verification for big data supporting users revocability. Information 7, 31 (2016)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17, 297–319 (2004)
Shen, W.T., Yu, J., Yang, G.Y., Cheng, X.G., Hao, R.: Cloud storage integrity checking scheme with private key recovery capability. J. Softw. 27, 1451–1462 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tian, J., Jing, X., Guo, R. (2019). Public Audit Scheme of Shared Data Based on Blockchain. In: Shen, B., Wang, B., Han, J., Yu, Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science, vol 1105. Springer, Singapore. https://doi.org/10.1007/978-981-15-0818-9_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-0818-9_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0817-2
Online ISBN: 978-981-15-0818-9
eBook Packages: Computer ScienceComputer Science (R0)