Skip to main content

Using Blockchain for Data Auditing in Cloud Storage

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Abstract

Cloud storage is one of the most important service of cloud computing. Since cloud service providers can not be completely trusted, traditional auditing methods can’t guarantee the security of data sources. This paper proposes a security framework for cloud data audit using blockchain technology. User’s operational information on the file is formed to a block after validated by all checked nodes in the blockchain network, and then to be put into the blockchain. Any modification or fake to the operational information can be inspected through the chain structure of block, thus ensuring the security of auditing data source. We construct a prototype in an Ethereum-based blockchain using Aliyun as data storage service, then test the time overhead of uploading file, broadcasting operation information and packing information into block chain. The results show that the time for packaging block remains unchanged from an overall viewpoint, and as the file size increasing, packaging block occupies less percentage in the entire process of file uploading or downloading.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. G Wood Ethereum: a secure decentralised generalised transaction. http://www.ethereum.Org

  2. Dong, C., Wang, Y., Aldweesh, A., et al.: Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing, ACM CCS. ACM, New York (2017)

    Google Scholar 

  3. Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gen. Comput. Syst. (2017)

    Google Scholar 

  4. Oliner, A., Stearley, J.: What supercomputers say: a study of five system logs. In: IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 575–584. IEEE Computer Society (2007)

    Google Scholar 

  5. Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: The 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC (2009)

    Google Scholar 

  6. Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)

    Google Scholar 

  7. Tian, H., Chen, Z., Chang, C.C., et al.: Enabling public auditability for operation behaviors in cloud storage. Soft. Comput. 21(8), 1–13 (2016)

    Google Scholar 

  8. Nakamoto, S.: Bitcoin: a peer-to-peer electronic ash system. Technical report (2009). https://bitcoin.org/bitcoin.pdf

  9. Sengupta, B., Bag, S., Ruj, S., et al.: Retricoin: bitcoin based on compact proofs of retrievability. In: The 17th International Conference on Distributed Computing and Networking (2016)

    Google Scholar 

  10. Ramachandran, A., Kantarcioglu, D.: Using Blockchain and smart contracts for secure data provenance management (2017)

    Google Scholar 

  11. Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103 (2017)

    Google Scholar 

  12. Dagher, G.G., Mohler, J., Milojkovic, M., et al.: Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology, sustainable cities & society (2018)

    Google Scholar 

  13. Ghoshal, S., Paul, G.: Exploiting block-chain data structure for auditorless auditing on cloud data. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 359–371. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49806-5_19

    Chapter  Google Scholar 

  14. Fu, Y.: Meta-key: a secure data-sharing protocol under blockchain-based decentralised storage architecture (2017)

    Google Scholar 

  15. Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of IEEE Symposium on Security and Privacy (1980)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Key R&D Program of China (2016YFB0800402), partially supported by the National Natural Science Foundation of China under Grant No. 61232004 and the Fundamental Research Funds for the Central Universities (2016YXMS020).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunhua Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, C., Hu, J., Zhou, K., Wang, Y., Deng, H. (2018). Using Blockchain for Data Auditing in Cloud Storage. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics