Skip to main content

Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14488))

  • 152 Accesses

Abstract

Public auditing mechanism can delegate a third-party auditor (TPA) to check the remote data integrity on behalf of data owners. However, the TPA, as an idealized and benefit-oriented entity, may not provide correct auditing results on time. To date, a large number of public auditing schemes utilize the booming blockchain technique to resist dishonest TPA, but most of them are vulnerable to malicious miners who attempt to manipulate the randomness of auditing challenge generation. In this paper, we propose a novel Blockchain-assisted Privacy-preserving Public Auditing scheme, named BPPA. The BPPA scheme utilizes a smart contract deployed on the Ethereum blockchain to replace the TPA. To eliminate the impact of malicious miners, the smart contract employs unpredictable hash values of the nearest Ethereum blocks to generate the index locators. These locators segmentally produce index subsets of challenged data blocks, ensuring the unpredictability of auditing challenge messages. Meanwhile, BPPA achieves conditional identity anonymity for data owners through the employment of identity-based public key cryptography and key exchange technique. We prove the security of our scheme based on the computational Diffie-Hellman assumption and the discrete logarithm assumption. Furthermore, we analyze the performance from theoretical and experimental aspects, and the evaluation results demonstrate that our auditing scheme is effective and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and Communications Security, pp. 598–609 (2007)

    Google Scholar 

  2. Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) Public Key Cryptography – PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, pp. 142–160. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13013-7_9

    Chapter  Google Scholar 

  3. Guo, J., Han, L., Yang, G., Liu, X., Tian, C.: An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J. Cloud Comput. 11(1), 1–12 (2022)

    Article  Google Scholar 

  4. Huang, L., et al.: Ipanm: incentive public auditing scheme for non-manager groups in clouds. IEEE Trans. Dependable Secure Comput. 19(2), 936–952 (2022)

    Google Scholar 

  5. Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)

    Google Scholar 

  6. Li, A., Chen, Y., Yan, Z., Zhou, X., Shimizu, S.: A survey on integrity auditing for data storage in the cloud: from single copy to multiple replicas. IEEE Trans. Big Data 8(5), 1428–1442 (2020)

    Article  Google Scholar 

  7. Li, J., Wu, J., Jiang, G., Srikanthan, T.: Blockchain-based public auditing for big data in cloud storage. Inform. Process. Manage. 57(6), 102382 (2020)

    Article  Google Scholar 

  8. Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. 15(1), 577–585 (2020)

    Article  Google Scholar 

  9. Li, R., Qin, Y., Wang, C., Li, M., Chu, X.: A blockchain-enabled framework for enhancing scalability and security in iiot. IEEE Trans. Industr. Inf. 19(6), 7389–7400 (2023)

    Article  Google Scholar 

  10. Liu, X., Luo, Y., Yang, X., Wang, L., Zhang, X.: Lattice-based proxy-oriented public auditing scheme for electronic health record in cloud-assisted wbans. IEEE Syst. J. 16(2), 2968–2978 (2022)

    Article  Google Scholar 

  11. Pierrot, C., Wesolowski, B.: Malleability of the blockchain’s entropy. Cryptogr. Commun. 10(1), 211–233 (2018)

    Article  MathSciNet  Google Scholar 

  12. Rosenfeld, M.: Analysis of hashrate-based double spending. ArXiv abs/1402.2009 (2014)

    Google Scholar 

  13. Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_7

    Chapter  Google Scholar 

  14. Shu, J., Zou, X., Jia, X., Zhang, W., Xie, R.: Blockchain-based decentralized public auditing for cloud storage. IEEE Trans. Cloud Comput. 10(4), 2366–2380 (2022)

    Article  Google Scholar 

  15. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 proceedings IEEE infocom, pp. 1–9. IEEE (2010)

    Google Scholar 

  16. Wang, H., Wang, Q., He, D.: Blockchain-based private provable data possession. IEEE Trans. Dependable Secure Comput. 18(5), 2379–2389 (2019)

    Google Scholar 

  17. Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014), 1–32 (2014)

    Google Scholar 

  18. Xu, Y., Jin, C., Qin, W., Shan, J., Jin, Y.: Secure fuzzy identity-based public verification for cloud storage. J. Syst. Architect. 128, 102558 (2022)

    Article  Google Scholar 

  19. Xu, Z., He, D., Wang, H., Vijayakumar, P., Choo, K.K.R.: A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems. J. Inform. Secur. Appl. 51, 102453 (2020)

    Google Scholar 

  20. Zhang, C., Xu, Y., Hu, Y., Wu, J., Ren, J., Zhang, Y.: A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans. Cloud Comput. 10(4), 2252–2263 (2021)

    Article  Google Scholar 

  21. Zhang, X., Zhao, J., Xu, C., Li, H., Wang, H., Zhang, Y.: Cipppa: conditional identity privacy-preserving public auditing for cloud-based wbans against malicious auditors. IEEE Trans. Cloud Comput. 9(4), 1362–1375 (2019)

    Article  Google Scholar 

  22. Zhang, Y., Xu, C., Lin, X., Shen, X.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. 9(3), 923–937 (2019)

    Article  Google Scholar 

  23. Zhao, J., Huang, H., Gu, C., Hua, Z., Zhang, X.: Blockchain-assisted conditional anonymity privacy-preserving public auditing scheme with reward mechanism. IEEE Syst. J. 16(3), 4477–4488 (2021)

    Article  Google Scholar 

  24. Zhao, J., Zheng, Y., Huang, H., Wang, J., Zhang, X., He, D.: Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems. J. Syst. Architect. 138, 102860 (2023)

    Article  Google Scholar 

  25. Zhao, Y., Chang, J.: Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage. Comput. Netw. 216, 109270 (2022)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the Shenzhen Science and Technology Program (Grant No. GXWD20220817124827001, JCYJ20210324132406016). This work is also supported by the National Key R &D Program of China (Grant No. 2021YFB2700900), the Shenzhen Key Technical Project (Grant No. 2022N009), the Fok Ying Tung Education Foundation of China (Grant No. 171058), Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (Grant No. 2022B1212010005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hejiao Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiang, W., Zhao, J., Huang, H., Zhang, X., Jiang, Z.L., He, D. (2024). Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems. In: Tari, Z., Li, K., Wu, H. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2023. Lecture Notes in Computer Science, vol 14488. Springer, Singapore. https://doi.org/10.1007/978-981-97-0801-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0801-7_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0800-0

  • Online ISBN: 978-981-97-0801-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics