Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

被引:1
|
作者
Yan, Hao [1 ,2 ]
Liu, Yanan [1 ]
Qiu, Shuo [1 ]
Hu, Shengzhou [3 ]
Zhang, Weijian [4 ]
Xia, Jinyue [5 ]
机构
[1] Jinling Inst Technol, Sch Network Secur, Nanjing 211169, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350007, Peoples R China
[3] Gannan Normal Univ, Dept Math & Comp Sci, Ganzhou 341000, Peoples R China
[4] Hohai Univ, Network Secur & Informat Off, Nanjing 210098, Peoples R China
[5] Int Business Machines Corp IBM, New York, NY USA
来源
基金
中国国家自然科学基金;
关键词
Blockchain; cloud-IoT; data integrity checking; homomorphic hash function; batch audition; DATA POSSESSION CHECKING; STORAGE MECHANISM; INTERNET; SCHEME; VERIFICATION; SECURITY; PROTOCOL; THINGS;
D O I
10.32604/csse.2022.022317
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be out sourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third Party Auditor (TPA) which is assumed to be trustful. However, in real-life TPA is not trusted as people thought. Therefore, these schemes suffer from the underlying problem of single-point failure. Moreover, most of the traditional schemes are designed by RSA or bilinear map techniques which consume heavy computation and communication cost. To overcome these shortcomings, we propose a novel data integrity checking scheme for cloud-IoT data based on blockchain technique and homomorphic hash. In our scheme, the tags of all data blocks are computed by a homomorphic hash function and stored in blockchain. Moreover, each step within the process of data integrity checking is signed by the performer, and the signatures are stored in blockchain through smart contracts. As a result, each behavior for data integrity checking in our scheme can be traced and audited which improves the security of the scheme greatly. Furthermore, batch-audition for multiple data challenges is also supported in our scheme. We formalize the system model of our scheme and give the concrete construction. Detailed performance analyses demonstrate that our proposed scheme is efficient and practical without the trust-assumption of TPA.
引用
收藏
页码:1129 / 1142
页数:14
相关论文
共 50 条
  • [31] A Secure IoT Data Integrity Auditing Scheme Based on Consortium Blockchain
    Dong, Guofang
    Wang, Xia
    2020 5TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (IEEE ICBDA 2020), 2020, : 246 - 250
  • [32] BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments
    Javaid, Uzair
    Aman, Muhammad Naveed
    Sikdar, Biplab
    BLOCKSYS'18: PROCEEDINGS OF THE 1ST BLOCKCHAIN-ENABLED NETWORKED SENSOR SYSTEMS, 2018, : 13 - 18
  • [33] Identity-based public data integrity verification scheme in cloud storage system via blockchain
    Yilin Yuan
    Jianbiao Zhang
    Wanshan Xu
    Zheng Li
    The Journal of Supercomputing, 2022, 78 : 8509 - 8530
  • [34] Identity-based public data integrity verification scheme in cloud storage system via blockchain
    Yuan, Yilin
    Zhang, Jianbiao
    Xu, Wanshan
    Li, Zheng
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (06): : 8509 - 8530
  • [35] Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment
    Alshehri, Suhair
    Bamasaq, Omaimah
    Alghazzawi, Daniyal
    Jamjoom, Arwa
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (05) : 4239 - 4256
  • [36] A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services
    Geeta Sharma
    Sheetal Kalra
    Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 2019, 43 : 619 - 636
  • [37] Type, pad, and place: Avoiding data leaks in Cloud-IoT FaaS orchestrations
    Bocci, Alessandro
    Forti, Stefano
    Ferrari, Gian-Luigi
    Brogi, Antonio
    2022 22ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2022), 2022, : 798 - 805
  • [38] A secure lightweight signature based authentication for Cloud-IoT crowdsensing environments
    Kumar, Manoj
    Verma, Harsh Kumar
    Sikka, Geeta
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (04)
  • [39] A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services
    Sharma, Geeta
    Kalra, Sheetal
    IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2019, 43 (Suppl 1) : 619 - 636
  • [40] Efficient phrase search with reliable verification over encrypted cloud-IoT data
    Xu, Wanshan
    Zhu, Ze
    Khalid, Muhammad Irfan
    PEERJ COMPUTER SCIENCE, 2024, 10 : 1 - 28