Abstract
In the era of global communication and the sharing economy, the demand for personal and ubiquitous storage among enterprises and individual users has increased; thus, the flexible expansion of the data access architecture has become crucial. According to the storage requirements, the aim of this study was to develop store and access mechanisms for achieving data privacy, decentralisation, and load balancing in a data storage system. We explore how factors such as data privacy, file segmentation, security processes, and auditing mechanisms affect the performance of ubiquitous storage systems. We developed a trust evaluation model to reduce the access error rates, which are caused by the abnormal storage hosts or transmission failed. The file segmentation and encryption methods are used to store data in untrustworthy decentralised hosts. Although such data can be decrypted, they are difficult to recognise because a part of the transformed file is adopted to protect user privacy. Furthermore, with the developed mechanism, any user can share their storage and computing power to achieve blockchain-based peer-to-peer storage functions. We conducted a series of simulations to evaluate and compare the performance of the proposed data privacy mechanism and existing data privacy mechanisms in ubiquitous storage. The results indicated that the proposed mechanism outperformed other mechanisms.
Similar content being viewed by others
Data availability
The datasets generated and analysed during the current study are available in the cloud storage (https://drive.google.com/drive/folders/10KZtNpFkpTUTbPaBpzUzNx8AfFhV1oGm?usp=sharing).
References
Fan Y, Zou J, Liu S, Yin Q, Guan X, Yuan X, Wu W, Du D (2020) A blockchain-based data storage framework: a rotating multiple random masters and error-correcting approach. Peer-to-Peer Netw Appl 13:1486–1504
Zahed Benisi N, Aminian M, Javadi B (2020) Blockchain-based decentralized storage networks: a survey. J Netw Comput Appl 162:102656
Lee K, Kim J, Kwak J, Kim Y (2022) Dynamic multi-resource optimization for storage acceleration in cloud storage systems. IEEE Trans Serv Comput (online first). https://doi.org/10.1109/TSC.2022.3173333
Li J, Wu J, Chen L (2018) Block-secure: blockchain based scheme for secure P2P cloud storage. Inf Sci 465:219–231
Vivekanandan M, Sastry VN, Reddy SU (2021) Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment. Peer-to-Peer Netw Appl 14:1572–1595
Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: a survey. IEEE Access 8:131723–131740
Ezhil Arasi V, Indra Gandhi K, Kulothungan K (2022) Auditable attribute-based data access control using blockchain in cloud storage. J Supercomput 78:10772–10798
Kurmanbaev EA, Syrgabekov IN, Zadauly E, Karipzhanova AZ, Urazbaeva KT (2017) Information security system on the basis of the distributed storage with splitting of data. Int J Appl Eng Res 12(8):1703–1711
Chai B, Yan B, Yu J, Wang G (2022) BHE-AC: A blockchain-based high-efficiency access control framework for Internet of things. Pers Ubiquit Comput 26:971–982
Tran QN, Turnbull BP, Wu HT, de Silva AJS, Kormusheva K, Hu J (2021) A survey on privacy-preserving blockchain systems (PPBS) and a novel PPBS-based framework for smart agriculture. IEEE open J Comput Soc 2:72–84
Zhuang C, Dai Q, Zhang Y (2022) BCPPT: a blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Netw Appl 15:724–738
Miao Y, Huang Q, Xiao M, Li H (2020) Decentralized and privacy-preserving public auditing for cloud storage based on blockchain. IEEE Access 8:139813–139826
Abbas A, Alroobaea R, Krichen M, Rubaiee S, Vimal S, Almansour FM (2021) Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things. Pers Ubiquit Comput. https://doi.org/10.1007/s00779-021-01583-8
Liang X, Zhao J, Shetty S, Liu J, Li D (2017) Integrating blockchain for data sharing and collaboration in mobile healthcare applications. In: 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp 1–5.
Zhang Z, Zhang H, Wang J, Hu X, Li J, Yu W, Yu P, Li W, Cui B, Zhu G, Sood K, Will B, Guan H (2023) QKPT: securing your private keys in cloud with performance, scalability and transparency. IEEE Trans Dependable Secure Comput 20(1):478–491
Chen D, Zhang R (2022) An open source project for tuning and analyzing MapReduce performance in Hadoop and Spark. IEEE Softw 39(1):61–69
Wen YF, Chen YF, Chiu TK, Chen YC (2020) Performance enhancement for iterative data computing with in-memory concurrent processing. Concurr Comput: Pract Exper 32(7):e5593
Li H, Han D, Tang M (2022) A privacy-preserving storage scheme for logistics data with assistance of blockchain. IEEE Internet Things J 9(6):4704–4720
Filecoin, https://filecoin.io/, Access data: Apr. 20, 2023.
Sia, https://sia.tech/, Access date: Apr. 20th, 2023.
Wen YF, Huang CY (2022) Exploration of mined block temporarily holding and enforce fork attacks by selfish mining pool in proof-of-work blockchain systems. IEEE Access 10:61159–61174
Gourisetti SNG, Mylrea M, Patangia H (2020) Evaluation and demonstration of blockchain applicability framework. IEEE Trans Eng Manag 67(4):1142–1156
Wen YF, Hsu CM (2023) A performance evaluation of modular functions and state databases for hyperledger fabric blockchain systems. J Supercomput 79(3):2654–2690
Huang L, Zhang G, Fu A (2018) Privacy-preserving public auditing for non-manager group shared data. Wireless Pers Commun 100:1277–1294
Abdullah ZH, Udzir NI, Mahmod R, Samsudin K (2011) File integrity monitor scheduling based on file security level classification. Software Engineering and Computer Systems, Berlin, Heidelberg, J. M. Zain, W. M. b. Wan Mohd, and E. El-Qawasmeh, Eds., 2011, Springer Berlin Heidelberg, 177–189.
Boneh D, Franklin M (2001) (2001) Identity-based encryption from the weil pairing. In: Kilian J (ed) Advances in Cryptology—CRYPTO, Berlin, Heidelberg. Springer, Berlin Heidelberg, pp 213–229
Sahai A, Waters B (2005) (2005) Fuzzy identity-based encryption. In: Cramer R (ed) Advances in Cryptology-Eurocrypt, Berlin, Heidelberg. Springer, Berlin Heidelberg, pp 457–473
Benet J (2014) IPFS-content addressed, versioned, P2P file system. arXiv preprint arXiv:1407.3561.
Chen Y, Li H, Li K, Zhang J (2017) An improved P2P file system scheme based on IPFS and blockchain. In: 2017 IEEE International Conference on Big Data, pp 2652–2657.
Zheng Q, Li Y, Chen P, Dong X (2018) An innovative IPFS-based storage model for blockchain. In: IEEE/WIC/ACM International Conference on Web Intelligence (WI), pp 704–708.
Sigwart M, Borkowski M, Peise M, Schulte S, Stefan Tai S (2020) A secure and extensible blockchain-based data provenance framework for the Internet of Things. Pers Ubiquit Comput (online first). https://doi.org/10.1007/s00779-020-01417-z
Lai C, Ma Z, Guo R, Zheng D (2022) Secure medical data sharing scheme based on traceable ring signature and blockchain. Peer-to-Peer Netw Appl 15:1562–1576
Liu L, Zhang W, Han C (2021) A survey for the application of blockchain technology in the media. Peer-to-Peer Netw Appl 14:3143–3165
Kamboj P, Khare S, Pal S (2021) User authentication using blockchain based smart contract in role-based access control. Peer-to-Peer Netw Appl 14:2961–2976
Khalid MI, Ehsan I, Al-Ani AK, Iqbal J, Hussain S, UllahA SS, Nayab. (2023) Comprehensive survey on blockchain-based decentralized storage networks. IEEE Access 11:10995–11015
Park GS, Song H (2016) A novel hybrid P2P and cloud storage system for retrievability and privacy enhancement. Peer-to-Peer Netw Appl 9:299–312
Díaz AF, Anguita M, Camacho HE, Erik N, Julio O (2013) Two-level hash/table approach for metadata management in distributed file systems. J Supercomput 64:144–155
MaidSafe, https://maidsafe.net/, Access date: Apr. 20th, 2023.
Tian G, Hu Y, Wei J, Liu Z, Huang X, Chen X, Susilo W (2022) Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans Dependable Secure Comput 19(6):3941–3954. https://doi.org/10.1109/TDSC.2021.3114160
Hsieh MY, Huang YM, Chao HC (2007) Adaptive security design with malicious node detection in cluster-based sensor networks. Comput Commun 30(11):2385–2400
Pires WR, Figueiredo THdP, Wong HC, Loureiro AAF (2004) Malicious node detection in wireless sensor networks. In: Proceedings of 18th International Parallel and Distributed Processing Symposium, pp 24.
She W, Liu Q, Tian Z, Chen JS, Wang B, Liu W (2019) Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access 7:38947–38956
Sultan S, Javaid Q, Malik AJ, Al-Turjman F, Attique M (2022) Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks. Environ Dev Sustain 24(6):7532–7550
Lessig L. (2008) Remix: Making art and commerce thrive in the hybrid economy. Penguin.
Funding
This work was supported in part by the National Science and Technology Council (NSTC), Taiwan, under Grant NSTC 111–2410-H-305–023, and National Taipei University, Taiwan, under Grant 2022-NTPU-ORDA-02.
Author information
Authors and Affiliations
Contributions
Y-FW and C-P Wang wrote the manuscript text and prepared all figures and tables together. Y-F handles the submission as well as correspond the following review processes and respond reviewers' and editors' comments. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.
Consent to publish
This manuscript is the authors' original work that the results/data/figures have not been published elsewhere, nor are they under consideration by another publisher.
Ethical approval
No participation of humans takes place in this implementation process.
Human and animal rights
No violation of Human and Animal Rights is involved.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wen, YF., Wang, CP. Data privacy mechanisms development and performance evaluation for personal and ubiquitous blockchain-based storage. J Supercomput 79, 19636–19670 (2023). https://doi.org/10.1007/s11227-023-05425-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05425-7