Abstract
With the continuous growth of data resources, outsourcing data storage to cloud service providers is becoming the norm. Unfortunately, once data are stored on the cloud platform, they will be out of data owners’ control. Thus, it is critical to guarantee the integrity of the remote data. To solve this problem, researchers have proposed many data auditing schemes, which often employ a trusted role named Third Party Auditor (TPA) to verify the integrity. However, the TPA may not be reliable as expected. For example, it may collude with cloud service providers to hide the fact of data corruption for benefits. Blockchain has the characteristics of decentralization, non-tampering, and traceability, which provides a solution to trace the malicious behaviors of the TPA. Moreover, Intel SGX, as the popular trusted computing technology, can be used to protect the correctness of the auditing operations with a slight performance cost, which excellently serves as the of the blockchain-based solution. In this paper, we propose a secure auditing scheme based on the blockchain and Intel SGX technology, termed SDABS. The scheme follows the properties of storage correctness, data-preserving, accountability, and anti-collusion. The experiment results show that our scheme is efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security 2007, pp. 598–609. ACM (2007)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04444-1_22
Wang, B., Li, H., Li, M.: Privacy-preserving public auditing for shared cloud data supporting group dynamics. In: 2013 IEEE International Conference on Communications (ICC), pp. 1946–1950. IEEE (2013)
Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)
Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43–56 (2014)
Liu, C., et al.: Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Trans. Parallel Distrib. Syst. 25(9), 2234–2244 (2014)
Huang, K., Xian, M., Fu, S., Liu, J.: Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor. IET Commun. 8(12), 2106–2113 (2014)
Suzuki, S., Murai, J.: Blockchain as an audit-able communication channel. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 516–522. IEEE (2017)
Liu, B., Yu, X., Chen, S., Xu, X., Zhu, L.: Blockchain based data integrity service framework for IoT data. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 468–475. IEEE (2017)
Yu, H., Yang, Z., Sinnott, R.: Decentralized big data auditing for smart city environments leveraging blockchain technology. IEEE Access 7, 6288–6296 (2019)
Wang, H., Zhang, J.: Blockchain based data integrity verification for large-scale IoT data. IEEE Access 7, 164996–165006 (2019)
Huang, P., Fan, K., Yang, H., Zhang, K., Li, H., Yang, Y.: A collaborative auditing blockchain for trustworthy data integrity in cloud storage system. IEEE Access 8, 94780–94794 (2020)
Hao, K., Xin, J., Wang, Z., Wang, G.: Outsourced data integrity verification based on blockchain in untrusted environment. World Wide Web 23(4), 2215–2238 (2020). https://doi.org/10.1007/s11280-019-00761-2
Zhang, Y., Xu, C., Lin, X., Shen, X.S.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. (to be published). https://doi.org/10.1109/TCC.2019.2908400
Xu, Y., Ren, J., Zhang, Y., Zhang, C., Shen, B., Zhang, Y.: Blockchain empowered arbitrable data auditing scheme for network storage as a service. IEEE Trans. Serv. Comput. 13(2), 289–300 (2020)
Lu, N., Zhang, Y., Shi, W., Kumari, S., Choo, K.: A secure and scalable data integrity auditing scheme based on hyperledger fabric. Comput. Secur. 92, 101741 (2020)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: The Third USENIX Symposium on Operating Systems Design and Implementation (OSDI), USA, vol. 99, pp. 173–186 (1999)
Seijas, P.L., Thompson, S.J., McAdams, D.: Scripting smart contracts for distributed ledger technology. IACR Cryptology ePrint Archive (2016)
Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of ACM 13th EuroSys Conference (EuroSys), USA (2018)
Xu, C., Wang, K., Li, P., Guo, S., Luo, J., Ye, B., Guo, M.: Making big data open in edges: a resource-efficient blockchain-based approach. IEEE Trans. Parallel Distrib. Syst. 30(4), 870–882 (2019)
Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)
Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: International Congress on Big Data (2017), pp. 557–564 (2017)
Dai, H., Zheng, Z., Zhang, Y.: Blockchain for internet of things: a survey. IEEE Internet Things J. 6(5), 8076–8094 (2019)
Huang, Y., Kong, Q., Jia, N., Chen, X., Zheng, Z.: Recommending differentiated code to support smart contract update. In: International Conference on Program Comprehension (2019), pp. 260–270 (2019)
Intel. 2017. Software Guard Extensions (Intel SGX) (2017). https://software.intel.com/en-us/sgx
Costan, V., Devadas, S.: Intel SGX Explained. IACR Cryptology ePrint Archive (2016)
ARM. Arm TrustZone Technology. https://developer.arm.com/ip-products/security-ip/trustzone
Kwon, D., Seo, J., Cho, Y., Lee, B., Paek, Y.: PrOS: light-weight privatized secure OSes in ARM TrustZone. IEEE Trans. Mob. Comput. 19(6), 1434–1447 (2020)
Li, S., Xue, K., David, W., Yue, H., Yu, N., Hong, P.: SecGrid: a secure and efficient SGX-enabled smart grid system with rich functionalities. IEEE Trans. Inf. Forensics Secur. 15, 1318–1330 (2020)
Lind, J., Naor, O., Eyal, I., Florian Kelbert, F., et al.: Teechain: a secure payment network with asynchronous blockchain access. In: Proceedings of the 27th ACM Symposium on Operating Systems Principles(SOSP), pp. 63–79 (2019)
Bentov, I., Ji, Y., Zhang, F., Breidenbach, L., Daian, P., Juels, A.: Tesseract: real-time cryptocurrency exchange using trusted hardware. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1521–1538 (2019)
Rescorla, E..: Diffie-Hellman key agreement method. RFC 2631 (1999)
Acknowledgements
This study is supported by Oxford-Hainan Blockchain Research Institute, the National Science Foundation of China (No. 61472074, U1708262) and the Fundamental Research Funds for the Central Universities (No. N172304023).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lei, H., Bao, Z., Wang, Q., Zhang, Y., Shi, W. (2020). SDABS: A Secure Cloud Data Auditing Scheme Based on Blockchain and SGX. In: Zheng, Z., Dai, HN., Fu, X., Chen, B. (eds) Blockchain and Trustworthy Systems. BlockSys 2020. Communications in Computer and Information Science, vol 1267. Springer, Singapore. https://doi.org/10.1007/978-981-15-9213-3_21
Download citation
DOI: https://doi.org/10.1007/978-981-15-9213-3_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9212-6
Online ISBN: 978-981-15-9213-3
eBook Packages: Computer ScienceComputer Science (R0)