Abstract
The rapid popularization of cloud computing and ultra-high-speed Internet has promoted the vigorous development of data sharing and collaborative office, especially in Big Data and AI. Aiming at protecting the security of users’ data, researchers developed PDP scheme to verify data. However, existing schemes all rely on semi-trusted Third Party Auditor (TPA) or group management to store verification information. In order to solve this problem, we propose a distributed data integrity audit scheme based on blockchain. This scheme provides a brand-new method, which allows customers to store data safely without relying on any specific TPA and protect users’ privacy at a lower cost. For the new concept, this paper points out the problems of the existing scheme and puts forward system model and security model. Then, a decentralized data integrity audit scheme using blockchain is designed. The proposed private PDP scheme based on blockchain is provably secure. At the same time, the security analysis and efficiency analysis show that the proposed PDP scheme is safe, efficient and practical.






Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, ACM, New York, NY, USA, CCS ’07, pp 598–609
Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on Security and privacy in communication netowrks—SecureComm ’08, ACM Press, Istanbul, Turkey, p 1
Chen X, Shang T, Kim I, Liu J (2017) A remote data integrity checking scheme for big data storage. 2017 IEEE second international conference on data science in cyberspace (DSC). IEEE, Shenzhen, pp 53–59
Darwish A, Hassanien AE, Elhoseny M, Kumar A, Muhammad K (2017) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput 10:4151–4166
Erway CC, KüpçüA Papamanthou C, Tamassia R (2015) Dynamic provable data possession. ACM Trans Inf Syst Secur 17(4):1–29
Fan Y, Liao Y, Li F, Zhou S, Zhang G (2019) Identity-based auditing for shared cloud data with efficient and secure sensitive information hiding. IEEE Access 7:114246–114260
Hariharasitaraman S, Balakannan SP (2019) A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-019-01412-0
Huang L, Zhang G, Yu S, Fu A, Yearwood J (2017) SeShare: secure cloud data sharing based on blockchain and public auditing. Concurr Comput Pract Exp 31(22):e4359
Huang L, Zhang G, Yu S, Fu A, Yearwood J (2018) Customized data sharing scheme based on blockchain and weighted attribute. 2018 IEEE global communications conference (GLOBECOM). IEEE, Abu Dhabi, pp 206–212
Li M, Weng J, Yang A, Lu W, Zhang Y, Hou L, Liu JN, Xiang Y, Deng RH (2019) CrowdBC: a blockchain-based decentralized framework for crowdsourcing. IEEE Trans Parallel Distrib Syst 30(6):1251–1266
Merkle R (1987) A digital signature based on a conventional encryption function. LNCS 293:369–378
Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Cryptography Mailing list. https://metzdowd.com
Narayanan A, Bonneau J, Felten E, Miller A, Goldfeder S (2016) Bitcoin and cryptocurrency technologies: a comprehensive Introduction. Princeton University Press, Princeton
Pournaghi S, Bayat M, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01710-y
Qi Y, Huang Y (2019) DIRA: enabling decentralized data integrity and reputation audit via blockchain. Sci China Technol Sci 62(4):698–701
Tian H, Chen Y, Chang CC, Jiang H, Huang Y, Chen Y, Liu J (2017) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10(5):701–714
Tian H, Nan Fulin, Jiang H, Chang CC, Ning J, Huang Y (2019a) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107–125
Tian H, Nan F, Chang CC, Huang Y, Lu J, Du Y (2019b) Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J Netw Comput Appl 127:59–69
Wan C, Zhang J, Pei B, Chen C (2015) Efficient privacy-preserving third-party auditing for ambient intelligence systems. J Ambient Intell Humaniz Comput 7:1–7
Wang B, Li B, Li H (2012) Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Bao F, Samarati P, Zhou J (eds) Applied cryptography and network security, Lecture Notes in Computer Science. Springer, Berlin, pp 507–525
Wang B, Li B, Li H (2014) Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput 2(1):43–56
Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106
Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Yan Z, Gail-Joon A, Hongxin H, Yau SS, An HG, Chang-Jun H (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238
Yang Y, Huang Q, Chen F (2019a) Secure cloud storage based on RLWE problem. IEEE Access 7:27604–27614
Yang Y, Sun Y, Huang Q, Yin W, Chen F (2019b) RLWE-based ID-DIA protocols for cloud storage. IEEE Access 7:55732–55743
Zhang X, Xu C (2014) Efficient identity-based public auditing scheme for cloud storage from lattice assumption. 2014 IEEE 17th international conference on computational science and engineering. IEEE, Chengdu, pp 1819–1826
Zhang Y, Deng RH, Liu X, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277
Zhao X, Wang X, Xu H, Wang Y (2015) Cloud data integrity checking protocol from lattice. Int J High Perform Comput Netw 8(2):167
Zheng BK, Zhu LH, Shen M, Gao F, Zhang C, Li YD, Yang J (2018) Scalable and privacy-preserving data sharing based on blockchain. J Comput Sci Technol 33(3):557–567
Zhou L, Fu A, Yu S, Su M, Kuang B (2018) Data integrity verification of the outsourced big data in the cloud environment: a survey. J Netw Comput Appl 122:1–15
Acknowledgements
This work is supported by National Key Research and Development Program of China (No. 2017Y FB0802000), Natural Science Basic Research Plan in Shaanxi Province of China (Grant no. 2018JM6028), National Natural Science Foundation of China (No. 61772550, U1636114 and 61572521), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No. 2019BDKFJJ008), and the National Cryptography Development Fund of China (No. MMJJ2 0170112). This work is also supported by Engineering University of PAP’s Funding for Scientific Research Innovation Team (No. KYTD201805), Engineering University of PAP’s Funding for Key Researcher (No. KYGG202011).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue. The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wang, H., Wang, X.A., Xiao, S. et al. Decentralized data outsourcing auditing protocol based on blockchain. J Ambient Intell Human Comput 12, 2703–2714 (2021). https://doi.org/10.1007/s12652-020-02432-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02432-x