Decentralized and privacy-preserving public auditing for cloud storage based on blockchain

Y Miao, Q Huang, M Xiao, H Li - IEEE Access, 2020 - ieeexplore.ieee.org
IEEE Access, 2020ieeexplore.ieee.org
Cloud storage systems provide a flexible, convenient and friendly way for users to outsource
data. However, users lose control of their data once outsourcing them to the cloud. Public
auditing was introduced to ensure data integrity, in which a third-party auditor (TPA) is
delegated to execute auditing tasks. In general, TPA generates and sends challenge
information to the cloud server (CS), which proves data possession accordingly. However,
the TPA may not perform public auditing protocol honestly or may even collude with CS to …
Cloud storage systems provide a flexible, convenient and friendly way for users to outsource data. However, users lose control of their data once outsourcing them to the cloud. Public auditing was introduced to ensure data integrity, in which a third-party auditor (TPA) is delegated to execute auditing tasks. In general, TPA generates and sends challenge information to the cloud server (CS), which proves data possession accordingly. However, the TPA may not perform public auditing protocol honestly or may even collude with CS to deceive users. Some existing public auditing schemes utilize blockchain to resist against the malicious TPA. However, the CS may guess the challenge messages and there is a risk that users' information may be leaked to the TPA during the process of auditing. In this paper, we propose a decentralized and privacy-preserving public auditing scheme based on blockchain (DBPA), in which a blockchain is utilized as an unpredictable source for the generation of (random) challenge information, and the auditor is required to record the audit process onto the blockchain. Due to the characteristics of blockchain, users can check the audit results publicly. Moreover, zero-knowledge proof is used in DBPA to protect user's privacy during the audit process so that the response information returned by the CS does not leak information about user's data. Security analysis and performance evaluation show that DBPA is secure and efficient.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References