Abstract
Outsourced data, as an significant component of cloud service, has been widely used due to its convince, low overhead and high flexibility. To guarantee the integrity of outsourced data and reduce the computational overhead, data owner (DO) usually adopts a third party auditor (TPA) to execute verification scheme. However, handing over the verification of data to TPA may lead to security vulnerabilities since the TPA is not fully trusted. In this paper, we propose a novel solution for data integrity verification in untrusted outsourced environment. Firstly, we design a decentralized model based on blockchain, consisting by some collaborative verification peers (VPs). Based on our purposed model, we present an advanced data integrity verification algorithm, allowing DO stores and checks verification results by writing and retrieving the blockchain. Moreover, each VP maintains a replication of the entire blockchain to avoid maliciously tampering with. We evaluate our proposed approach on real outsourced data service scenario. Experimental results demonstrate that our proposed approach is efficient and effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amazon. http://aws.amazon.com
Apache hadoop. http://hadoop.apache.org/
Baidu. http://cloud.baidu.com
Google. http://www.google.com
Microsoft azure. http://www.microsoft.com/windowsazure
1e96a1b27a6cb85df68d728cf3695b0c46dbd44d: Filecoin: a cryptocurrency operated file storage network (2014)
Ali, M., Nelson, J., Shea, R., Freedman, M.J.: Blockstack: a global naming and storage system secured by blockchains. https://www.zurich.ibm.com/dccl/paper-s/nelson_dccl_slides.pdf. Accessed 13 Dec 2016
Armknecht, F., Bohli, J.M., Karame, G.O., Liu, Z., Reuter, C.A.: Outsourced proofs of retrievability. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 831–843 (2014)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609 (2007)
Bajaj, S., Sion, R.: TrustedDB: a trusted hardware based database with privacy and data confidentiality. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, Athens, Greece, June 2011, pp. 205–216 (2011)
Becker, G.: Merkle signature schemes, merkle trees and their cryptanalysis. Technical report. Ruhr-University Bochum (2008)
Brenner, S., Wulf, C., Kapitza, R.: Running zookeeper coordination services in untrusted clouds (2014)
Buterin, V.: A next-generation smart contract and decentralized application platform (2014)
Chen, W., Liu, M., Zhang, R., Zhang, Y., Liu, S.: Secure outsourced skyline query processing via untrusted cloud service providers. In: IEEE International Conference on Computer Communications, INFOCOM 2016, pp. 1–9. IEEE (2016)
Dinh, T.T.A., Wang, J., Chen, G., Liu, R., Ooi, B.C., Tan, K.L.: Blockbench: a framework for analyzing private blockchains (2017)
Feldman, A.J., Zeller, W.P., Freedman, M.J., Felten, E.W.: SPORC: group collaboration using untrusted cloud resources. In: Usenix Conference on Operating Systems Design and Implementation, pp. 337–350 (2010)
Jiye, W., Lingchao, G., Aiqiang, D.: Block chain based data security sharing network architecture research. J. Comput. Res. Dev. 54(4), 742–749 (2017)
Juels, A.: PORs: proofs of retrievability for large files. In: ACM Conference on Computer and Communications Security, pp. 584–597 (2007)
Li, Y., Zheng, K., Yan, Y., Liu, Q., Zhou, X.: EtherQL: a query layer for blockchain system. In: Candan, S., Chen, L., Pedersen, T.B., Chang, L., Hua, W. (eds.) DASFAA 2017. LNCS, vol. 10178, pp. 556–567. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55699-4_34
Lowry, S., Wilkinson, J.: Metadisk: blockchain-based decentralized file storage application. https://storj.io/metadisk.pdf. Accessed 2 March 2017
Mao, J., Zhang, Y., Li, P., Li, T., Wu, Q., Liu, J.: A position-aware merkle tree for dynamic cloud data integrity verification. Soft. Comput. 21(8), 2151–2164 (2017)
McConaghy, T., Marques, R.: BigchainDB: a scalable blockchain database. https://www.bigchaindb.com/whitepaper/bigchaindb-whitepaper.pdf. Accessed 11 Jan 2017
Miller, A., Juels, A., Shi, E., Parno, B., Katz, J.: Permacoin: repurposing bitcoin work for data preservation. In: IEEE Symposium on Security and Privacy, pp. 475–490 (2014)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Sengupta, B., Bag, S., Ruj, S., Sakurai, K.: Retricoin: bitcoin based on compact proofs of retrievability. In: International Conference on Distributed Computing and Networking, p. 14 (2016)
Shacham, H., Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2013)
Shraer, A., Cachin, C., Cidon, A., Keidar, I., Yan, M., Shaket, D.: Venus: verification for untrusted cloud storage. In: ACM Workshop on Cloud Computing Security Workshop, pp. 19–30 (2010)
Tsai, W.T., Yu, L., Wang, R., Liu, N., Deng, E.Y.: Blockchain application development techniques (2017)
Waters, B.: Compact proofs of retrievability. J. Cryptol. 26(3), 442–483 (2008)
Weil, S.A., Brandt, S.A., Miller, E.L., Long, D.D., Maltzahn, C.: Ceph: a scalable, high-performance distributed file system. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation, pp. 307–320. USENIX Association (2006)
Wilkinson, S., Boshexski, T.: Metadisk: blockchain-based decentralized file storage application. https://storj.io/storj.pdf. Accessed 11 January 2017
Yong, Y., Feiyue, W.: The development status and prospects of blockchain technology. Acta Autom. Sin. 42(4), 481–494 (2016)
Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: IEEE Security and Privacy Workshops, pp. 180–184 (2015)
Acknowledgement
This research was partially supported by the National Natural Science Foundation of China (Nos. 61472069, 61402089, and U1401256), the Fundamental Research Funds for the Central Universities (Nos. N161602003, N171607010, N161904001, and N160601001), the Natural Science Foundation of Liaoning Province (No. 2015020553).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Hao, K., Xin, J., Wang, Z., Jiang, Z., Wang, G. (2018). Decentralized Data Integrity Verification Model in Untrusted Environment. In: Cai, Y., Ishikawa, Y., Xu, J. (eds) Web and Big Data. APWeb-WAIM 2018. Lecture Notes in Computer Science(), vol 10988. Springer, Cham. https://doi.org/10.1007/978-3-319-96893-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-96893-3_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-96892-6
Online ISBN: 978-3-319-96893-3
eBook Packages: Computer ScienceComputer Science (R0)