Skip to main content
Log in

Themis: An accountable blockchain-based P2P cloud storage scheme

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Cloud storage is an effective way for data owners to outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services. In traditional cloud storage systems, cloud data integrity verification relies on centralized entities and data is stored in a small number of storage servicers. However, these centralized entities and storage servicers may be untrustworthy, and malicious servicers may even refuse to perform a user’s query or update request. Though a few blockchain-based themes have been proposed to address some of these problems, they do not achieve decentralization, accountability, flexibility and practicability simultaneously. In this paper, we present Themis, an accountable P2P cloud storage scheme with smart contracts on Ethereum. Our scheme has the following advantages: First, cloud data integrity verification is decentralized and implemented by miners on blockchain without any trusted third party. Second, by carefully setting up the reward and punishment mechanism within a smart storage contract, all rational nodes will participate in the storage service following an accountable rule. Third, based on reliable information published on the blockchain, users are free to choose appropriate storage servicers who want to share idle storage, making storage service decentralized and flexible. Fourth, compared with the existing related systems, by adopting a payment at maturity method, the malicious behavior of breaking the contract after the servicer obtains some revenue is prevented, and the availability of user data within the specified period is enhanced. Fourthermore, we implement a prototype of Themis on Rinkeby, an Ethereum test network. Extensive experimental results demonstrate that our scheme is able to support a PB-level data storage in a single P2P storage service at a low cost and is feasible for practical deployment. And the entire decentralized arbitration process takes only 40 to 110 seconds.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Chen K, Lang W, Zheng K, Ouyang W (2015) Research on the cloud storage security in big data era. In: 2015 international conference on applied science and engineering innovation, Atlantis Press, pp 659–664

  2. Zhou R, Chen H, Li T (2015) Towards lightweight and swift storage resource management in big data cloud era. In: Proceedings of the 29th ACM on international conference on supercomputing, ICS’15, Newport Beach/Irvine, CA, USA, June 08 - 11, 2015, pp 133–142

  3. Andrews JG, Buzzi S, Choi W, Hanly SV, Lozano A, Soong AC, Zhang JC (2014) What will 5g be?. IEEE Journal on Selected Areas in Communications 32(6):1065–1082

    Article  Google Scholar 

  4. Song D, Shi E, Fischer I, Shankar U (2012) Cloud data protection for the masses. IEEE Computer 45(1):39–45

    Article  Google Scholar 

  5. Cash D, Küpçü A, Wichs D (2017) Dynamic proofs of retrievability via oblivious RAM. J Cryptology 30(1):22–57

    Article  MathSciNet  Google Scholar 

  6. Shi E, Stefanov E, Papamanthou C (2013) Practical dynamic proofs of retrievability. In: 2013 ACM SIGSAC conference on computer and communications security, CCS’13, Berlin, Germany, November 4-8, 2013, pp 325–336

  7. Wang Q, Wang C, Li J, Ren K, Lou W (2009) Enabling public verifiability and data dynamics for storage security in cloud computing, in: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp 355–370

  8. Mukundan R, Madria SK, Linderman M (2014) Efficient integrity verification of replicated data in cloud using homomorphic encryption. Distributed and Parallel Databases 32(4):507– 534

    Article  Google Scholar 

  9. Zhang Y, Xu C, Liang X, Li H, Mu Y, Zhang X (2017) Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Information Forensics and Security 12(3):676–688

    Article  Google Scholar 

  10. Wilkinson S, Boshevski T, Brandoff J, Buterin V (2014) Storj a peer-to-peer cloud storage network. https://storj.io/storj.pdf

  11. Vorick D, Champine L (2014) Sia: Simple decentralized storage. https://sia.tech/sia.pdf

  12. Benet J (2014) IPFS - content addressed, versioned, P2P file system. 1407.3561

  13. Benet J, Greco N (2018) Filecoin: a decentralized storage network. https://filecoin.io/

  14. Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M (2013) Snarks for c: verifying program executions succinctly and in zero knowledge. In: Advances in cryptology - CRYPTO 2013 - 33rd annual cryptology conference, santa barbara, CA, USA, August 18-22, 2013, Proceedings, Part II, pp 90–108

  15. Nakamoto S, et al. (2008) Bitcoin: a peer-to-peer electronic cash system https://bitcoin.org/bitcoin.pdf

  16. Szabo N Formalizing and securing relationships on public networks, First Monday 2 (9)

  17. Poon J, Dryja T (2016) The bitcoin lightning network: Scalable off-chain instant payments https://lightning.network/lightning-network-paper.pdf

  18. Bonneau J, Miller A, Clark J, Narayanan A, Kroll JA, Felten EW (2015) Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE symposium on security and privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pp 104–121. https://doi.org/10.1109/SP.2015.14

  19. Garay JA, Kiayias A (2018) Sok: A consensus taxonomy in the blockchain era. https://eprint.iacr.org/2018/754.pdf

  20. Garay JA, Kiayias A, Leonardos N (2015) The bitcoin backbone protocol: Analysis and applications. In: Advances in cryptology - EUROCRYPT 2015 - 34th annual international conference on the theory and applications of cryptographic techniques, sofia, bulgaria, April 26-30, 2015, Proceedings, Part II, pp 281– 310

  21. Pass R, Seeman L, Shelat A (2017) Analysis of the blockchain protocol in asynchronous networks. In: Advances in cryptology - EUROCRYPT 2017 - 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II, pp 643–673. https://doi.org/10.1007/978-3-319-56614-6_22

  22. Zhao Y, Li Y, Mu Q, Yang B, Yu Y (2018) Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems. IEEE Access 6:12295–12303

    Article  Google Scholar 

  23. Hu Y, Manzoor A, Ekparinya P, Liyanage M, Thilakarathna K, Jourjon G, Seneviratne A (2019) A delay-tolerant payment scheme based on the ethereum blockchain. IEEE Access 7:33159–33172

    Article  Google Scholar 

  24. Pãnescu A-T, Manta V (2018) Smart contracts for research data rights management over the ethereum blockchain network. Science & Technology Libraries 37(3):235–245

    Article  Google Scholar 

  25. Hong S (2019) P2p networking based internet of things (iot) sensor node authentication by blockchain. Peer-to-Peer Networking and Applications, pp 1–11

  26. Zhang Y, Wen J (2017) The iot electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Networking and Applications 10(4):983–994

    Article  Google Scholar 

  27. Chen Y, Li H, Li K, Zhang J (2017) An improved P2P file system scheme based on IPFS and blockchain. In: 2017 IEEE international conference on big data, BigData 2017, Boston, MA, USA, December 11-14, 2017, pp 2652–2657

  28. Buterin V (2014) A next-generation smart contract and decentralized application platform. https://whitepaperdatabase.com/wp-content/uploads/2017/09/Ethereum-ETH-whitepaper.pdf

  29. Merkle RC (1980) Protocols for public key cryptosystems. In: Proceedings of the 1980 IEEE symposium on security and privacy, Oakland, California, USA, April 14-16, 1980, pp 122–134

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dawei Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hei, Y., Liu, Y., Li, D. et al. Themis: An accountable blockchain-based P2P cloud storage scheme. Peer-to-Peer Netw. Appl. 14, 225–239 (2021). https://doi.org/10.1007/s12083-020-00967-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00967-6

Keywords

Navigation