Journal of Guangxi Normal University(Natural Science Edition) ›› 2020, Vol. 38 ›› Issue (2): 1-7.doi: 10.16088/j.issn.1001-6600.2020.02.001

    Next Articles

Blockchain-based Public Verifiable Scheme for Sharing Data

WANG Han1,2, WANG Xu’an1,2*, ZHOU Neng1,2, LIU Yudong1,2   

  1. 1. College of Cryptography Engineering, Engineering University of PAP, Xi’an Shaanxi 710086, China;
    2. Key Laboratory of Network and Information Security under the PAP (Engineering University of PAP),Xi’an Shaanxi 710086, China
  • Received:2019-10-08 Published:2020-04-02

Abstract: With the rapid development of cloud computing, an increasing number of organizations and individuals store and share their data on clouds. While cloud storage brings people convenience, it also brings a series of problems at the same time. For example, the data uploaded to the cloud may be tampered and damaged. Therefore, shared data auditing has become an important issue in the field of cloud storage, attracting the attention of researchers. However, the state-of-the-art schemes cannot fully meet the performance and security requirements. Therefore, this paper proposes a public audit shared data protocol for cloud storage by using blockchain and Rank-based Merkle AVL tree (RB-MHT) to achieve privacy preserving and batch auditing to reduce system overhead as well as keeping the security of modification record in this blockchain-based scheme. For privacy preserving, the auditing signature is only related to group management during the audit process and data is blind by a random value. Furthermore, the security of the scheme is verified and its performance is evaluated through implementation. The results demonstrate that the proposed scheme is secure and efficient.

Key words: cloud computing, cloud storage, data shared, privacy preserving, blockchain

CLC Number: 

  • TP309.7
[1] ARMBRUST M, FOX A, GRIFFITH R,et al. A view of cloud computing[J]. Commun ACM, 2010, 53(4): 50-58.
[2] CAI H, XU B, JIANG L. Vasilakos AV IoT-based big data storage systems in cloud computing: per-spectives and challenges[J]. IEEE Internet of Things Journal, 2017, 4(1): 75-87.
[3] NACHIAPPAN R, JAVADI B, CALHEIROS R, et al. Cloud storage reliability for big data applications: a state of the art survey[J]. Journal of Network and Computer Applications, 2017, 97: 35-47.
[4] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York, NY:ACM, 2007: 598-609.
[5] YU Y, AU M H, ATENIESE G, et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4): 767-778.
[6] CHEN F, XIANG T, YANG Y, et al. Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure[C]//2015 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE Press, 2015: 2389-2397.
[7] WANG B, LI B, LI H. Oruta: privacy-preserving public auditing for shared data in the cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(1): 43-56.
[8] LIU X, ZHANG Y, WANG B, et al. Mona: secure multi-owner data sharing for dynamic groups in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182-1191.
[9] TIAN H, NAN F L, JIANG H, et al. Public auditing for shared cloud data with efficient and secure group management[J]. Information Sciences, 2019, 472: 107-125.
[10]NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL].(2009-03-25)[2019-10-08]. https://bitcoin.org/bitcoin.pdf.
[11]NARAYANAN A, BONNEAU J, FELTEN E, et al. Bitcoin and cryptocurrency technologies[M]. Princeton, NJ: Princeton University Press, 2016.
[12]STANEK J, KENCL L. Enhanced secure thresholded data deduplication scheme for cloud storage[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(4):694-707.
[13]BHASKARAN K, ILFRICH P, LIFFMAN D, et al. Double-blind consent-driven data sharing on block-chain[C]// IEEE International Conference on Cloud Engineering. Piscataway, NJ:IEEE Press, 2018: 385-391.
[14]ZHENG B K, ZHU L H, SHEN M, et al, Scalable and privacy-preserving data sharing based on block-chain[J]. Journal of Computer Science and Technology, 2018, 33(3): 557-567.
[15]HUANG L, ZHANG G, YU S, et al. SeShare: Secure cloud data sharing based on blockchain and public auditing[J]. Concurrency and Computation: Practice and Experience, 2019, 31(22): e4359.
[16]QI Y, TANG X, HUANG Y. Enabling efficient verification of dynamic data possession and batch up-dating in cloud storage[J]. KSII Transactions on Internet and Information Systems, 2018,12(6): 2429-2449.
[17]WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22 (5): 847-859.
[1] CHEN Xiong, ZHU Yu, FENG Ke, YU Tongwei. Identity Authentication of Power System Safetyand Stability Control Terminals Based on Blockchain [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 8-18.
[2] GE Lina, LIU Jinhui. Privacy Preserving Method Based on k-isomorphism and Local Randomization [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(4): 1-8.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] ZHUANG Fenghong, MA Jiangming, ZHANG Yajun, SU Jing, YU Fangming. Eco-Physiological Responses of Leaves of Isoetes sinensis to Light Intensity[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 93 -100 .
[2] BAO Jinping, ZHENG Lianbin, YU Keli, SONG Xue, TIAN Jinyuan, DONG Wenjing. Skinfold Thickness Characteristics of Yi Adults in Daliangshan,China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 107 -112 .
[3] ZHANG Ru, ZHANG Bei, REN Hongrui. Spatio-temporal Dynamics Analysis and Its Affecting Factors of Cropland Loss in Xuangang Mining Area, Shanxi, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 121 -132 .
[4] LI Xianjiang, SHI Shuqin, CAI Weimin, CAO Yuqing. Simulation of Land Use Change in Tianjin Binhai New Area Based on CA-Markov Model[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 133 -143 .
[5] WANG Mengfei, HUANG Song. Spatial Linkage of Tourism Economy of Cities in West River Economic Belt in Guangxi, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 144 -150 .
[6] LIU Guolun, SONG Shuxiang, CEN Mingcan, LI Guiqin, XIE Lina. Design of Bandwidth Tunable Band-Stop Filter[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 1 -8 .
[7] TENG Zhijun, LÜ Jinling, GUO Liwen, XU Yuanyuan. Coverage Strategy of Wireless Sensor Network Based on Improved Particle Swarm Optimization Algorithm[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 9 -16 .
[8] LIU Ming, ZHANG Shuangquan, HE Yude. Classification Study of Differential Telecom Users Based on SOM Neural Network[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 17 -24 .
[9] MIAO Xinyan, ZHANG Long, LUO Yantao, PAN Lijun. Study on a Class of Alternative Competition-Cooperation Hybrid Population Model[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 25 -31 .
[10] HUANG Kaijiao, XIAO Feiyan. A Stochastic Predator-prey System with Beddington-DeAngelis Functional Response[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 32 -40 .