Abstract
Public auditing technology has currently been proposed to ensure the integrity of the cloud data and reduce users’ overheads, which, enables users to hire a third-party auditor (TPA) for cloud data auditing. However, most existing public auditing schemes are exposed to security problems of not completely reliable TPAs, easily manipulated challenge messages, and the convenience for external adversaries to launch side-channel attacks based on audit parameters. Additionally, a large number of redundant integrity tags caused by the auditing mechanism increase the storage burden of cloud servers, and reduce the searching and auditing efficiency. Hence, aiming to solve the concern of data security and storage efficiency in cloud storage, this paper proposes a blockchain-based cloud storage integrity auditing with secure deduplication (BIAD). We distribute a random file key between different users by employing the ciphertext-policy attribute encryption (CP-ABE), and conduct secure public auditing through the blockchain combined with a bloom filter-based random challenge generation method. In particular, by applying the random key to encrypt ciphertext and integrity tags, the existence and ownership privacy of the requested file in the auditing process can be protected. The security analysis and experimental results demonstrate that compared with the state-of-the arts, the proposed scheme achieves public auditing and deduplication in a secure and lightweight way.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Qi, Y., Tang, X., Huang, Y.: Enabling efficient batch updating verification for multi-versioned data in cloud storage. Chin. J. Electron. 28(2), 377–385 (2019)
Zhang, J., et al.: AntiConcealer: reliable detection of adversary concealed behaviors in EdgeAI assisted IoT. IEEE Internet of Things Journal (2021)
Tang, X., Zhou, Y., Cheng, Y., Shao, Y.: Weighted average-based complexity calculation in block selection oriented reversible data hiding. Security and Communication Networks 2022, 1–15 (2022)
Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 355–370. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-04444-1_22
Wang, C., Chow, S.S.M., Wang, Q., et al.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2011)
Tang, X., Qi, Y., Huang, Y.: Reputation audit in multi-cloud storage through integrity verification and data dynamics. In: Proceedings of the IEEE 9th International Conference on Cloud Computing (IEEE CLOUD), San Francisco, CA, USA, pp. 624–631 (2016)
Qi, Y., Tang, X., Huang, Y.: Enabling efficient verification of dynamic data possession and batch updating in cloud storage. KSII Trans. Internet Inf. Syst. 12(6), 2429–2449 (2018)
Tang, X., Qi, Y., Chang, C., Zhou, L.: Efficient real-time integrity auditing with privacy-preserving arbitration for images in cloud storage system. IEEE Access. 7, 33009–33023 (2019)
Zhang, J., Bhuiyan, M., Yang, X., Singh, A.: Trustworthy target tracking with collaborative deep reinforcement learning in EdgeAI-Aided IoT. IEEE Trans. Industr. Inf. 18(2), 1301–1309 (2022)
Shu, J., Zou, X., Jia, X., et al.: Blockchain-based decentralized public auditing for cloud storage. IEEE Trans. Cloud Comput. (2021). https://doi.org/10.1109/TCC.202-1.3051622
Zhang, Y., Xu, C., Lin, X., et al.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. 9(3), 923–937 (2019)
Xue, J., Xu, C., Zhao, J., Ma, J.: Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci. China Inf. Sci. 62(3), 1–16 (2019). https://doi.org/10.1007/s11432-018-9462-0
Tang, X., Zhou, L., Hu, B., et al.: Aggregation-based tag deduplication for cloud storage with resistance against side channel attack. Secur. Commun. Netw. 2021, 1–15 (2021)
Tang, X., Chen, X., Zhou, R., Sui, L., Zhou, T.: Marking based obfuscation strategy to resist side channel attack in cross-user deduplication for cloud storage. In: Proceedings of the 21th IEEE International Conference on Trust, security and Privacy in Computing and Communications (IEEE TrustCom), Wuhan, China (2022)
Tang, X., Liu, Z., Shao, Y., Di, H.: Side channel attack resistant cross-user generalized deduplication for cloud storage. In: Proceedings of the IEEE International Conference on Communications (IEEE ICC), Seoul, South Korea, pp. 998–1003 (2022)
Tang, X., Zhou, L., Huang, Y., Chang, C.: Efficient cross-user deduplication of encrypted data through re-encryption. In: Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), New York, USA, pp. 897–904 (2018)
Tang, X., Zhang, Y., Zhou, L., Liu, D., Hu, B.: Request merging based cross-user deduplication for cloud storage with resistance against appending chunks attack. Chin. J. Electron. 30(2), 199–209 (2021)
Liu, X., Sun, W., Lou, W., et al.: One-tag checker: message-locked integrity auditing on encrypted cloud deduplication storage. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM WKSHPS), Atlanta, GA, USA, pp. 1–9 (2017)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (IEE S&P), California, USA, pp. 321–334 (2007)
Shai, H., Danny, H., Benny, P., Alexandra, S.: Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (ACM CCS), Chicago, Illinois, USA, pp. 491–500 (2011)
Byun, H., Lim, H.: Functional bloom filter, better than hash tables. In: Proceedings of 2018 International Conference on Electronics, Information, and Communication (ICEIC), Hawaii, USA, pp. 1–3 (2018)
Acknowledgements
This work was supported by National Natural Science Foundation of China (62102113), Student Academic Support Program of University of International Relations (3262022SWA02), and Research Funds for NSD Construction of University of International Relations (2021GA08).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wang, Y., Tang, X., Zhou, Y., Chen, X., Zhu, Y. (2022). Blockchain-Based Integrity Auditing with Secure Deduplication in Cloud Storage. In: Tan, Y., Shi, Y. (eds) Data Mining and Big Data. DMBD 2022. Communications in Computer and Information Science, vol 1745. Springer, Singapore. https://doi.org/10.1007/978-981-19-8991-9_21
Download citation
DOI: https://doi.org/10.1007/978-981-19-8991-9_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8990-2
Online ISBN: 978-981-19-8991-9
eBook Packages: Computer ScienceComputer Science (R0)