Skip to main content

Blockchain-Based Integrity Auditing with Secure Deduplication in Cloud Storage

  • Conference paper
  • First Online:
Data Mining and Big Data (DMBD 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1745))

Included in the following conference series:

  • 663 Accesses

Abstract

Public auditing technology has currently been proposed to ensure the integrity of the cloud data and reduce users’ overheads, which, enables users to hire a third-party auditor (TPA) for cloud data auditing. However, most existing public auditing schemes are exposed to security problems of not completely reliable TPAs, easily manipulated challenge messages, and the convenience for external adversaries to launch side-channel attacks based on audit parameters. Additionally, a large number of redundant integrity tags caused by the auditing mechanism increase the storage burden of cloud servers, and reduce the searching and auditing efficiency. Hence, aiming to solve the concern of data security and storage efficiency in cloud storage, this paper proposes a blockchain-based cloud storage integrity auditing with secure deduplication (BIAD). We distribute a random file key between different users by employing the ciphertext-policy attribute encryption (CP-ABE), and conduct secure public auditing through the blockchain combined with a bloom filter-based random challenge generation method. In particular, by applying the random key to encrypt ciphertext and integrity tags, the existence and ownership privacy of the requested file in the auditing process can be protected. The security analysis and experimental results demonstrate that compared with the state-of-the arts, the proposed scheme achieves public auditing and deduplication in a secure and lightweight way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Qi, Y., Tang, X., Huang, Y.: Enabling efficient batch updating verification for multi-versioned data in cloud storage. Chin. J. Electron. 28(2), 377–385 (2019)

    Article  Google Scholar 

  2. Zhang, J., et al.: AntiConcealer: reliable detection of adversary concealed behaviors in EdgeAI assisted IoT. IEEE Internet of Things Journal (2021)

    Google Scholar 

  3. Tang, X., Zhou, Y., Cheng, Y., Shao, Y.: Weighted average-based complexity calculation in block selection oriented reversible data hiding. Security and Communication Networks 2022, 1–15 (2022)

    Google Scholar 

  4. Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04444-1_22

    Chapter  Google Scholar 

  5. Wang, C., Chow, S.S.M., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2011)

    Article  MATH  Google Scholar 

  6. Tang, X., Qi, Y., Huang, Y.: Reputation audit in multi-cloud storage through integrity verification and data dynamics. In: Proceedings of the IEEE 9th International Conference on Cloud Computing (IEEE CLOUD), San Francisco, CA, USA, pp. 624–631 (2016)

    Google Scholar 

  7. Qi, Y., Tang, X., Huang, Y.: Enabling efficient verification of dynamic data possession and batch updating in cloud storage. KSII Trans. Internet Inf. Syst. 12(6), 2429–2449 (2018)

    Google Scholar 

  8. Tang, X., Qi, Y., Chang, C., Zhou, L.: Efficient real-time integrity auditing with privacy-preserving arbitration for images in cloud storage system. IEEE Access. 7, 33009–33023 (2019)

    Article  Google Scholar 

  9. Zhang, J., Bhuiyan, M., Yang, X., Singh, A.: Trustworthy target tracking with collaborative deep reinforcement learning in EdgeAI-Aided IoT. IEEE Trans. Industr. Inf. 18(2), 1301–1309 (2022)

    Article  Google Scholar 

  10. Shu, J., Zou, X., Jia, X., et al.: Blockchain-based decentralized public auditing for cloud storage. IEEE Trans. Cloud Comput. (2021). https://doi.org/10.1109/TCC.202-1.3051622

    Article  Google Scholar 

  11. Zhang, Y., Xu, C., Lin, X., et al.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. 9(3), 923–937 (2019)

    Article  Google Scholar 

  12. Xue, J., Xu, C., Zhao, J., Ma, J.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci. China Inf. Sci. 62(3), 1–16 (2019). https://doi.org/10.1007/s11432-018-9462-0

    Article  Google Scholar 

  13. Tang, X., Zhou, L., Hu, B., et al.: Aggregation-based tag deduplication for cloud storage with resistance against side channel attack. Secur. Commun. Netw. 2021, 1–15 (2021)

    Google Scholar 

  14. Tang, X., Chen, X., Zhou, R., Sui, L., Zhou, T.: Marking based obfuscation strategy to resist side channel attack in cross-user deduplication for cloud storage. In: Proceedings of the 21th IEEE International Conference on Trust, security and Privacy in Computing and Communications (IEEE TrustCom), Wuhan, China (2022)

    Google Scholar 

  15. Tang, X., Liu, Z., Shao, Y., Di, H.: Side channel attack resistant cross-user generalized deduplication for cloud storage. In: Proceedings of the IEEE International Conference on Communications (IEEE ICC), Seoul, South Korea, pp. 998–1003 (2022)

    Google Scholar 

  16. Tang, X., Zhou, L., Huang, Y., Chang, C.: Efficient cross-user deduplication of encrypted data through re-encryption. In: Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), New York, USA, pp. 897–904 (2018)

    Google Scholar 

  17. Tang, X., Zhang, Y., Zhou, L., Liu, D., Hu, B.: Request merging based cross-user deduplication for cloud storage with resistance against appending chunks attack. Chin. J. Electron. 30(2), 199–209 (2021)

    Article  Google Scholar 

  18. Liu, X., Sun, W., Lou, W., et al.: One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM WKSHPS), Atlanta, GA, USA, pp. 1–9 (2017)

    Google Scholar 

  19. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (IEE S&P), California, USA, pp. 321–334 (2007)

    Google Scholar 

  20. Shai, H., Danny, H., Benny, P., Alexandra, S.: Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM CCS), Chicago, Illinois, USA, pp. 491–500 (2011)

    Google Scholar 

  21. Byun, H., Lim, H.: Functional bloom filter, better than hash tables. In: Proceedings of 2018 International Conference on Electronics, Information, and Communication (ICEIC), Hawaii, USA, pp. 1–3 (2018)

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (62102113), Student Academic Support Program of University of International Relations (3262022SWA02), and Research Funds for NSD Construction of University of International Relations (2021GA08).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, Y., Tang, X., Zhou, Y., Chen, X., Zhu, Y. (2022). Blockchain-Based Integrity Auditing with Secure Deduplication in Cloud Storage. In: Tan, Y., Shi, Y. (eds) Data Mining and Big Data. DMBD 2022. Communications in Computer and Information Science, vol 1745. Springer, Singapore. https://doi.org/10.1007/978-981-19-8991-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8991-9_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8990-2

  • Online ISBN: 978-981-19-8991-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics