Skip to main content

Secure File Outsourcing Method Based on Consortium Blockchain

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13828))

Included in the following conference series:

  • 754 Accesses

Abstract

With the development of the big data era, the amount of data has entered an explosive growth phase. Limited by the constraints of cost, efficiency, and security of self-built storage systems, enterprises are forced to outsource files to cloud storage systems. However, the lack of file security and auditability in cloud storage systems continues to threaten the security of outsourced files. This paper designs and implements BFSOut, which is a secure file outsourcing method based on consortium blockchain. It uses Hyperledger Fabric and Interplanetary File System (IPFS) as the underlying storage engine, which solves the problem of cloud storage security issues. In BFSOut, in order to ensure the security of outsource files, the client-side offline block encryption is used. Furthermore, a dynamic hybrid encryption scheme is adopted, making the overall encryption effect more Efficient. Experimental performance analysis show that the system has good performance.

This work was supported by the National Natural Science Foundation of China (No. 61906099), the Open Fund of Key Laboratory of Urban Land Resources Monitoring and Simulation, Ministry of Natural Resources (No. KF-2019-04-065).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sanchez-Gomez, A., Diaz, J., Hernandez-Encinas, L., Arroyo, D.: Review of the main security threats and challenges in free-access public cloud storage servers. In: Daimi, K. (ed.) Computer and Network Security Essentials, pp. 263–281. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-58424-9_15

    Chapter  Google Scholar 

  2. Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. Futur. Gener. Comput. Syst. 87, 772–781 (2018)

    Article  Google Scholar 

  3. Gan, Q., Wang, X., Li, J., Yan, J.: Enabling online/offline remote data auditing for secure cloud storage, Cluster Comput. 24, 3027-3-041 (2021)

    Google Scholar 

  4. Stodt, J., Schönle, D., Reich, C., Ghovanlooy Ghajar, F., Welte, D., Sikora, A.: Security audit of a blockchain-based industrial application platform. Algorithms 14(4),121 (2021)

    Google Scholar 

  5. Gai, K., Wu, Y., Zhu, L., Zhang, Z., Qiu, M.: Differential privacy-based blockchain for industrial internet-of-things. IEEE Trans. Industr. Inf. 16(6), 4156–4165 (2019)

    Article  Google Scholar 

  6. Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams. IEEE Trans. Dependable Secure Comput. 15(5), 840–852 (2016)

    Article  Google Scholar 

  7. Sun, C., Huang, C., Zhang, H., Chen, B., An, F., Wang, L., Yun, T.: Individual tree crown segmentation and crown width extraction from a heightmap derived from aerial laser scanning data using a deep learning framework. Front. Plant Sci. 13 (2022)

    Google Scholar 

  8. Nasir, M.H., Arshad, J., Khan, M.M., Fatima, M., Salah, K., Jayaraman, R.: Scalable blockchains-a systematic review. Futur. Gener. Comput. Syst. 126, 136–162 (2022)

    Article  Google Scholar 

  9. Gai, K., Guo, J., Zhu, L., Yu, S.: Blockchain meets cloud computing: a survey. IEEE Commun. Surv. Tutor 22(3), 2009–2030 (2020)

    Article  Google Scholar 

  10. Ghesmati, S., Fdhila, W., Weippl, E.: Studying bitcoin privacy attacks and their impact on bitcoin-based identity methods. In: González Enríquez, J., Debois, S., Fettke, P., Plebani, P., van de Weerd, I., Weber, I. (eds.) BPM 2021. LNBIP, vol. 428, pp. 85–101. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-85867-4_7

    Chapter  Google Scholar 

  11. Aggarwal, S., Kumar, N.: Chapter sixteen-hyperledger. Adv. Comput. 121, 323–343 (2021)

    Article  Google Scholar 

  12. Sinha, K., Priya, A., Paul, P.: K-RSA: secure data storage technique for multimedia in cloud data server. J. Intell. Fuzzy Syst. 39(3), 3297–3314 (2020)

    Article  Google Scholar 

  13. Azaria, A., Ekblaw, A., Vieira, T., Lippman, A.: Medrec: using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD). IEEE, pp. 25–30 (2020)

    Google Scholar 

  14. Li, Z., Barenji, A.V., Huang, G.Q.: Toward a blockchain cloud manufacturing system as a peer to peer distributed network platform. Rob. Comput. Integr. Manuf. 54, 133–144 (2018)

    Article  Google Scholar 

  15. Acquah, M.A., Chen, N., Pan, J.-S., Yang, H.-M., Yan, B.: Securing fingerprint template using blockchain and distributed storage system. Symmetry 12(6), 951 (2020)

    Article  Google Scholar 

  16. Li, L., Yue, Z., Wu, G.: Electronic medical record sharing system based on hyperledger fabric and interplanetary file system. In: 2021 the 5th International Conference on Compute and Data Analysis, pp. 149–154 (2021)

    Google Scholar 

  17. Tang, X., Guo, H., Li, H., Yuan, Y., Wang, J., Cheng, J.: A DAPP business data storage model based on blockchain and IPFS. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds.) ICAIS 2021. LNCS, vol. 12737, pp. 219–230. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-78612-0_18

    Chapter  Google Scholar 

  18. Lai, J., Deng, R.H., Li, Y.: Fully secure cipertext-policy hiding CP-ABE. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 24–39. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21031-0_3

    Chapter  Google Scholar 

  19. Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357–376. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00468-1_20

    Chapter  Google Scholar 

  20. Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59–67 (2020)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guozi Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

You, X., Zhou, C., Chen, Z., Gu, Y., Han, R., Sun, G. (2023). Secure File Outsourcing Method Based on Consortium Blockchain. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28124-2_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28123-5

  • Online ISBN: 978-3-031-28124-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics