Public Auditing Scheme for Industrial Internet Data Based on Smart Contracts

被引:0
|
作者
Li T. [1 ,2 ,3 ]
Yang A.-J. [1 ,2 ,3 ]
Weng J. [1 ,2 ,3 ]
Guo Z.-F. [1 ,2 ,3 ]
机构
[1] College of Cyber Security, Jinan University, Guangzhou
[2] National Joint Engineering Research Center of Network Security Detection and Protection Technology, Jinan University, Guangzhou
[3] Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Jinan University, Guangzhou
来源
Ruan Jian Xue Bao/Journal of Software | 2023年 / 34卷 / 03期
关键词
cloud storage; game theory; industrial Internet; public auditing; smart contract;
D O I
10.13328/j.cnki.jos.006716
中图分类号
学科分类号
摘要
As the amount of data generated by the Industrial Internet grows, more and more companies are choosing to outsource the storage for their Industrial Internet data to cloud servers to save storage costs. To prevent the outsourced data from being tampered or deleted, companies need to audit the data integrity regularly. This study proposes a public auditing scheme for Industrial Internet data based on smart contracts. Particularly, a series of game-theory based smart contracts are designed which can efficiently mitigate malicious participators including the third-party auditor and the cloud server. Compared to existing collusion-resistant public auditing schemes, the proposed scheme does not rely on complex cryptographic tools to achieve resistance to participant malicious behavior, and thus is more efficient and suitable to Industrial Internet applications where huge amount of data need to be frequently updated. Specifically, the game-based contract designed in this study as an individual solution, can be effectively combined with existing public auditing schemes to turn out a public auditing scheme with better security without losing efficiency. Finally, a series of tests are conducted on the proposed contract in the local environment and Ropsten, the common test chain for Ethereum. The results show that the designed contract is cheap to run and adaptable to the operating environment, has little impact on the efficiency of the original integrity audit solution, and is more efficient than other integrity schemes that resist the malicious behavior of auditors. © 2023 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:1491 / 1511
页数:20
相关论文
共 36 条
  • [1] Yu XH, Liu M, Jiang XH, Yin YP, Yang X, Liu DF, Zhang HS, Liu XM, Chi C., Industrial Internet architecture 2.0, Computer Integrated Manufacturing System, 25, 12, pp. 2983-2996, (2019)
  • [2] Cai CW, Qi YD., The empowerment path of Industry Internet to China’s manufacturing industry, Contemporary Economy Management, 43, 12, pp. 40-48, (2021)
  • [3] Khan WZ, Rehman MH, Zangoti HM, Afzal MK, Armi N, Salah K., Industrial Internet of things: Recent advances, enabling technologies and open challenges, Computers & Electrical Engineering, 81, pp. 1-13, (2020)
  • [4] Khan A, Din S, Jeon G, Piccialli F., Lucy with agents in the sky: Trustworthiness of cloud storage for Industrial Internet of things, IEEE Trans. on Industrial Informatics, 17, 2, pp. 953-960, (2021)
  • [5] Xian HQ, Liu HY, Zhang SG, Hou RT., Verifiable secure data deduplication method in cloud storage, Ruan Jian Xue Bao/Journal of Software, 31, 2, pp. 455-470, (2020)
  • [6] Qiu T, Chi JC, Zhou XB, Ning ZL, Atiquzzaman M, Wu DO., Edge computing in Industrial Internet of things: Architecture, advances and challenges, IEEE Communications Surveys & Tutorials, 22, 4, pp. 2462-2488, (2020)
  • [7] Juels A, Kaliski BS., PORs: Proofs of retrievability for large files, Proc. of the 14th ACM Conf. on Computer and Communications Security, pp. 584-597, (2007)
  • [8] Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D., Provable data possession at untrusted stores, Proc. of the 14th ACM Conf. on Computer and Communications Security, pp. 598-609, (2007)
  • [9] Yang AJ, Xu J, Weng J, Zhou H, Wong DS., Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage, IEEE Trans. on Cloud Computing, 9, 1, pp. 212-225, (2021)
  • [10] Xu J, Yang AJ, Zhou JY, Wong DS., Lightweight delegatable proofs of storage, Proc. of the Computer Security (ESORICS 2016), pp. 324-343, (2016)