Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

被引:1
|
作者
Yan, Hao [1 ,2 ]
Liu, Yanan [1 ]
Qiu, Shuo [1 ]
Hu, Shengzhou [3 ]
Zhang, Weijian [4 ]
Xia, Jinyue [5 ]
机构
[1] Jinling Inst Technol, Sch Network Secur, Nanjing 211169, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[3] Gannan Normal Univ, Dept Math & Comp Sci, Ganzhou 341000, Peoples R China
[4] Hohai Univ, Network Secur & Informat Off, Nanjing 210098, Peoples R China
[5] Int Business Machines Corp IBM, New York, NY USA
来源
基金
中国国家自然科学基金;
关键词
Blockchain; cloud-IoT; data integrity checking; homomorphic hash function; batch audition; DATA POSSESSION CHECKING; STORAGE MECHANISM; INTERNET; SCHEME; VERIFICATION; SECURITY; PROTOCOL; THINGS;
D O I
10.32604/csse.2022.022317
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be out sourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third Party Auditor (TPA) which is assumed to be trustful. However, in real-life TPA is not trusted as people thought. Therefore, these schemes suffer from the underlying problem of single-point failure. Moreover, most of the traditional schemes are designed by RSA or bilinear map techniques which consume heavy computation and communication cost. To overcome these shortcomings, we propose a novel data integrity checking scheme for cloud-IoT data based on blockchain technique and homomorphic hash. In our scheme, the tags of all data blocks are computed by a homomorphic hash function and stored in blockchain. Moreover, each step within the process of data integrity checking is signed by the performer, and the signatures are stored in blockchain through smart contracts. As a result, each behavior for data integrity checking in our scheme can be traced and audited which improves the security of the scheme greatly. Furthermore, batch-audition for multiple data challenges is also supported in our scheme. We formalize the system model of our scheme and give the concrete construction. Detailed performance analyses demonstrate that our proposed scheme is efficient and practical without the trust-assumption of TPA.
引用
收藏
页码:1129 / 1142
页数:14
相关论文
共 50 条
  • [21] An Edge Cloud Data Integrity Protection Scheme Based on Blockchain
    Duan, Weihua
    Jiang, Yu
    Xu, Xiaolong
    Zhang, Ziming
    Liu, Guanpei
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [22] A survey on blockchain-based integrity auditing for cloud data
    Han, Haoxiang
    Fei, Shufan
    Yan, Zheng
    Zhou, Xiaokang
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (05) : 591 - 603
  • [23] A survey on blockchain-based integrity auditing for cloud data
    Haoxiang Han
    Shufan Fei
    Zheng Yan
    Xiaokang Zhou
    Digital Communications and Networks, 2022, 8 (05) : 591 - 603
  • [24] Yugala: Blockchain based Encrypted Cloud Storage for IoT Data
    Gochhayat, Sarada Prasad
    Bandara, Eranga
    Shetty, Sachin
    Foytik, Peter
    2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2019), 2019, : 483 - 489
  • [25] Blockchain Based Data Integrity Verification for Large-Scale IoT Data
    Wang, Haiyan
    Zhang, Jiawei
    IEEE ACCESS, 2019, 7 : 164996 - 165006
  • [26] Data Access Model for Privacy-Preserving Cloud-IoT Architectures
    Fernandez, Maribel
    Tapia, Alex Franch
    Jaimunk, Jenjira
    Chamorro, Manuel Martinez
    Thuraisingham, Bhavani
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 191 - 202
  • [27] Blockchain Processing Technique Based on Multiple Hash Chains for Minimizing Integrity Errors of IoT Data in Cloud Environments
    Jeong, Yoon-Su
    SENSORS, 2021, 21 (14)
  • [28] A Blockchain-Assisted Certificateless Public Cloud Data Integrity Auditing Scheme
    Du, Jianming
    Dong, Guofang
    Ning, Juangui
    Xu, Zhengnan
    Yang, Ruicheng
    IEEE ACCESS, 2023, 11 : 123018 - 123029
  • [29] Data-Aware Application Placement and Management in the Cloud-IoT Continuum
    Massa, Jacopo
    SERVICE-ORIENTED COMPUTING - ICSOC 2022 WORKSHOPS, 2023, 13821 : 301 - 307
  • [30] Data-aware Declarative Application Management in the Cloud-IoT Continuum
    Massa, Jacopo
    Forti, Stefano
    Dazzi, Patrizio
    Brogi, Antonio
    ERCIM NEWS, 2023, (133): : 35 - 36