Abstract
Public auditing mechanism can delegate a third-party auditor (TPA) to check the remote data integrity on behalf of data owners. However, the TPA, as an idealized and benefit-oriented entity, may not provide correct auditing results on time. To date, a large number of public auditing schemes utilize the booming blockchain technique to resist dishonest TPA, but most of them are vulnerable to malicious miners who attempt to manipulate the randomness of auditing challenge generation. In this paper, we propose a novel Blockchain-assisted Privacy-preserving Public Auditing scheme, named BPPA. The BPPA scheme utilizes a smart contract deployed on the Ethereum blockchain to replace the TPA. To eliminate the impact of malicious miners, the smart contract employs unpredictable hash values of the nearest Ethereum blocks to generate the index locators. These locators segmentally produce index subsets of challenged data blocks, ensuring the unpredictability of auditing challenge messages. Meanwhile, BPPA achieves conditional identity anonymity for data owners through the employment of identity-based public key cryptography and key exchange technique. We prove the security of our scheme based on the computational Diffie-Hellman assumption and the discrete logarithm assumption. Furthermore, we analyze the performance from theoretical and experimental aspects, and the evaluation results demonstrate that our auditing scheme is effective and efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and Communications Security, pp. 598–609 (2007)
Gennaro, R., Katz, J., Krawczyk, H., Rabin, T.: Secure network coding over the integers. In: Nguyen, P.Q., Pointcheval, D. (eds.) Public Key Cryptography – PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings, pp. 142–160. Springer Berlin Heidelberg, Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13013-7_9
Guo, J., Han, L., Yang, G., Liu, X., Tian, C.: An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J. Cloud Comput. 11(1), 1–12 (2022)
Huang, L., et al.: Ipanm: incentive public auditing scheme for non-manager groups in clouds. IEEE Trans. Dependable Secure Comput. 19(2), 936–952 (2022)
Juels, A., Kaliski Jr, B.S.: Pors: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 584–597 (2007)
Li, A., Chen, Y., Yan, Z., Zhou, X., Shimizu, S.: A survey on integrity auditing for data storage in the cloud: from single copy to multiple replicas. IEEE Trans. Big Data 8(5), 1428–1442 (2020)
Li, J., Wu, J., Jiang, G., Srikanthan, T.: Blockchain-based public auditing for big data in cloud storage. Inform. Process. Manage. 57(6), 102382 (2020)
Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Syst. J. 15(1), 577–585 (2020)
Li, R., Qin, Y., Wang, C., Li, M., Chu, X.: A blockchain-enabled framework for enhancing scalability and security in iiot. IEEE Trans. Industr. Inf. 19(6), 7389–7400 (2023)
Liu, X., Luo, Y., Yang, X., Wang, L., Zhang, X.: Lattice-based proxy-oriented public auditing scheme for electronic health record in cloud-assisted wbans. IEEE Syst. J. 16(2), 2968–2978 (2022)
Pierrot, C., Wesolowski, B.: Malleability of the blockchain’s entropy. Cryptogr. Commun. 10(1), 211–233 (2018)
Rosenfeld, M.: Analysis of hashrate-based double spending. ArXiv abs/1402.2009 (2014)
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90–107. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_7
Shu, J., Zou, X., Jia, X., Zhang, W., Xie, R.: Blockchain-based decentralized public auditing for cloud storage. IEEE Trans. Cloud Comput. 10(4), 2366–2380 (2022)
Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 proceedings IEEE infocom, pp. 1–9. IEEE (2010)
Wang, H., Wang, Q., He, D.: Blockchain-based private provable data possession. IEEE Trans. Dependable Secure Comput. 18(5), 2379–2389 (2019)
Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014), 1–32 (2014)
Xu, Y., Jin, C., Qin, W., Shan, J., Jin, Y.: Secure fuzzy identity-based public verification for cloud storage. J. Syst. Architect. 128, 102558 (2022)
Xu, Z., He, D., Wang, H., Vijayakumar, P., Choo, K.K.R.: A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems. J. Inform. Secur. Appl. 51, 102453 (2020)
Zhang, C., Xu, Y., Hu, Y., Wu, J., Ren, J., Zhang, Y.: A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans. Cloud Comput. 10(4), 2252–2263 (2021)
Zhang, X., Zhao, J., Xu, C., Li, H., Wang, H., Zhang, Y.: Cipppa: conditional identity privacy-preserving public auditing for cloud-based wbans against malicious auditors. IEEE Trans. Cloud Comput. 9(4), 1362–1375 (2019)
Zhang, Y., Xu, C., Lin, X., Shen, X.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. 9(3), 923–937 (2019)
Zhao, J., Huang, H., Gu, C., Hua, Z., Zhang, X.: Blockchain-assisted conditional anonymity privacy-preserving public auditing scheme with reward mechanism. IEEE Syst. J. 16(3), 4477–4488 (2021)
Zhao, J., Zheng, Y., Huang, H., Wang, J., Zhang, X., He, D.: Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems. J. Syst. Architect. 138, 102860 (2023)
Zhao, Y., Chang, J.: Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage. Comput. Netw. 216, 109270 (2022)
Acknowledgements
This work is supported by the Shenzhen Science and Technology Program (Grant No. GXWD20220817124827001, JCYJ20210324132406016). This work is also supported by the National Key R &D Program of China (Grant No. 2021YFB2700900), the Shenzhen Key Technical Project (Grant No. 2022N009), the Fok Ying Tung Education Foundation of China (Grant No. 171058), Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies (Grant No. 2022B1212010005).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xiang, W., Zhao, J., Huang, H., Zhang, X., Jiang, Z.L., He, D. (2024). Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems. In: Tari, Z., Li, K., Wu, H. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2023. Lecture Notes in Computer Science, vol 14488. Springer, Singapore. https://doi.org/10.1007/978-981-97-0801-7_17
Download citation
DOI: https://doi.org/10.1007/978-981-97-0801-7_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0800-0
Online ISBN: 978-981-97-0801-7
eBook Packages: Computer ScienceComputer Science (R0)