DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain

Chengming Yi , Hua Zhang , Weiming Sun , Jun Ding

High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (2) : 100152

PDF (1558KB)
High-Confidence Computing ›› 2024, Vol. 4 ›› Issue (2) : 100152 DOI: 10.1016/j.hcc.2023.100152
Research Articles
research-article

DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain

Author information +
History +
PDF (1558KB)

Abstract

n the scenario of large-scale data ownership transactions, existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication, which greatly affects their practicability. This paper proposes a data integrity audit scheme based on blockchain where data ownership can be traded in batches. A data tag structure which supports data ownership batch transaction is adopted in our scheme. The update process of data tag does not involve the unique information of each data, so that any user can complete ownership transactions of multiple data in a single transaction through a single transaction auxiliary information. At the same time, smart contract is introduced into our scheme to perform data integrity audit belongs to third-party auditors, therefore our scheme can free from potential security risks of malicious third-party auditors. Safety analysis shows that our scheme is proved to be safe under the stochastic prediction model and k-CEIDH hypothesis. Compared with similar schemes, the experiment shows that communication overhead and computing time of data ownership transaction in our scheme is lower. Meanwhile, the communication overhead and computing time of our scheme is similar to that of similar schemes in data integrity audit.

Keywords

Data integrity / Cloud outsourcing audit / Data ownership batch transaction / Blockchain / Smart contract

Cite this article

Download citation ▾
Chengming Yi, Hua Zhang, Weiming Sun, Jun Ding. DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain. High-Confidence Computing, 2024, 4(2): 100152 DOI:10.1016/j.hcc.2023.100152

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgments

This work was supported by National Key R & D Program of China (2020YFB1005900), the National Natural Science Foundation of China (62072051).

References

[1]

R.R. Selvaraju, M. Cogswell, A. Das, et al., Grad-cam: visual explanations from deep networks via gradient-based localization, in: IEEE International Conference on Computer Vision, 2017, pp. 618-626.

[2]

S. Melnik, A. Gubarev, J.J. Long, et al., Dremel: interactive analysis of web-scale datasets, VLDB Endow. 3 (1-2) (2010) 330-339.

[3]

G. Ateniese, R. Burns, R. Curtmola, et al., Provable data possession at untrusted stores, in: ACM Conference on Computer and Communications Security, 2007, pp. 598-609.

[4]

H. Wang, D. He, A. Fu, et al., Provable data possession with outsourced data transfer, IEEE Trans. Serv. Comput. 14 (6) (2019) 1929-1939.

[5]

J. Shen, F. Guo, X. Chen, et al., Secure cloud auditing with efficient ownership transfer,in:European Symposium on Research in Computer Security, 2020, pp. 611-631.

[6]

D. Boneh, M. Franklin, Identity-based encryption from the weil pairing, in:Annual International Cryptology Conference, 2001, pp. 213-229.

[7]

W. Diffie, M.E. Hellman, New directions in cryptography, in: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022, pp. 365-390.

[8]

F. Bao, R.H. Deng, H. Zhu, Variations of diffie-hellman problem, in:International Conference on Information and Communications Security, 2003, pp. 301-312.

[9]

A. Juels, B.S. Kaliski Jr., PORs: proofs of retrievability for large files, in: ACM Conference on Computer and Communications Security, 2007, pp. 584-597.

[10]

M. Blum, W. Evans, P. Gemmell, et al., Checking the correctness of memories, Algorithmica 12 (2) (1994) 225-244.

[11]

G. Ateniese, R. Di Pietro, L.V. Mancini, et al., Scalable and efficient provable data possession,in:International Conference on Security and Privacy in Communication Networks, 2008, pp. 1-10.

[12]

C.C. Erway, A. Küpçü, C. Papamanthou, et al., Dynamic provable data possession, in: ACM Conference on Computer and Communications Security, 2009:, pp. 213-222.

[13]

C. Liu, R. Ranjan, C. Yang, et al., MuR-DPA: top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud, IEEE Trans. Comput. 64 (9) (2015) 2609-2622.

[14]

C. Wang, Q. Wang, K. Ren, et al., Privacy-preserving public auditing for data storage security in cloud computing, in: IEEE INFOCOM, 2010, pp. 525-533.

[15]

K. He, C. Huang, J. Wang, et al., An efficient public batch auditing protocol for data security in multi-cloud storage, in: IEEE Chinagrid Annual Conference, 2013, pp. 51-56.

[16]

K. Yang, X. Jia, An efficient and secure dynamic auditing protocol for data storage in cloud computing, IEEE Trans. Parallel Distrib. Syst. 24 (9) (2012) 1717-1726.

[17]

Lu Rao, Hua Zhang, Tengfei Tu, Dynamic outsourced auditing services for cloud storage based on batch-leaves-authenticated merkle hash tree, IEEE Trans. Serv. Comput. (2017).

[18]

C.C. Erway, A. Küpçü, C. Papamanthou, et al., Dynamic provable data possession, ACM Trans. Inf. Syst. Secur. 17 (4) (2015) 1-29.

[19]

W. Guo, H. Zhang, S. Qin, et al., Outsourced dynamic provable data possession with batch update for secure cloud storage, Future Gener. Comput. Syst. 95 (2019) 309-322.

[20]

H. Yuan, X. Chen, J. Wang, et al., Blockchain-based public auditing and secure deduplication with fair arbitration, Inf. Sci. 541 (2020) 409-425.

[21]

A. Li, G. Tian, M. Miao, et al., Blockchain-based cross-user data shared auditing, Connect. Sci. 34 (1) (2022) 83-103.

[22]

S. Li, J. Liu, G. Yang, et al., A blockchain-based public auditing scheme for cloud storage environment without trusted auditors, Wirel. Commun. Mob. Comput. (2020).

[23]

S. Halevi, D. Harnik, B. Pinkas, et al., Proofs of ownership in remote storage systems, in: ACM Conference on Computer and Communications Security, 2011, pp. 491-500.

[24]

Q. Zheng, S. Xu, Secure and efficient proof of storage with deduplication, in: ACM Conference on Data and Application Security and Privacy, 2012, pp. 1-12.

[25]

J. Yuan, S. Yu, Secure and constant cost public cloud storage auditing with deduplication, in: IEEE Conference on Communications and Network Security, 2013, pp. 145-153.

[26]

J. Li, J. Li, D. Xie, et al., Secure auditing and deduplicating data in cloud, IEEE Trans. Comput. 65 (8) (2015) 2386-2396.

[27]

C. Yang, Y. Liu, Y. Ding, Efficient data transfer supporting provable data deletion for secure cloud storage, Soft Comput. (2022) 1-17.

[28]

Y. Zhang, C. Xu, X. Lin, et al., Blockchain-based public integrity verification for cloud storage against procrastinating auditors, IEEE Trans. Cloud Comput. 9 (3) (2019) 923-937.

[29]

Q. Zhao, S. Chen, Z. Liu, et al., Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems, Inf. Process. Manage. 57 (6) (2020) 102355.

[30]

X. Zheng, Y. Zhao, H. Li, et al., Blockchain-based verifiable privacy-preserving data classification protocol for medical data, Comput. Stand. Interfaces 82 (2022) 103605.

[31]

Y. Miao, Q. Huang, M. Xiao, et al., Decentralized and privacy-preserving public auditing for cloud storage based on blockchain, IEEE Access 8 (2020) 139813-139826.

[32]

A.P. Mohan, A. Gladston, Merkle tree and blockchain-based cloud data auditing, Int. J. Cloud Appl. Comput. 10 (3) (2020) 54-66.

[33]

T. Islam, K. Hasan, S. Singh, et al., A secure and decentralized auditing scheme for cloud ensuring data integrity and fairness in auditing, in: IEEE International Conference on Cyber Security and Cloud Computing, 2022, pp. 74-79.

[34]

E. Androulaki, A. Barger, V. Bortnikov, et al., Hyperledger fabric: a distributed operating system for permissioned blockchains,in:EuroSys Conference, 2018, pp. 1-15.

AI Summary AI Mindmap
PDF (1558KB)

300

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/