Skip to main content
Log in

Decentralized data outsourcing auditing protocol based on blockchain

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The rapid popularization of cloud computing and ultra-high-speed Internet has promoted the vigorous development of data sharing and collaborative office, especially in Big Data and AI. Aiming at protecting the security of users’ data, researchers developed PDP scheme to verify data. However, existing schemes all rely on semi-trusted Third Party Auditor (TPA) or group management to store verification information. In order to solve this problem, we propose a distributed data integrity audit scheme based on blockchain. This scheme provides a brand-new method, which allows customers to store data safely without relying on any specific TPA and protect users’ privacy at a lower cost. For the new concept, this paper points out the problems of the existing scheme and puts forward system model and security model. Then, a decentralized data integrity audit scheme using blockchain is designed. The proposed private PDP scheme based on blockchain is provably secure. At the same time, the security analysis and efficiency analysis show that the proposed PDP scheme is safe, efficient and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on computer and communications security, ACM, New York, NY, USA, CCS ’07, pp 598–609

  • Ateniese G, Di Pietro R, Mancini LV, Tsudik G (2008) Scalable and efficient provable data possession. In: Proceedings of the 4th international conference on Security and privacy in communication netowrks—SecureComm ’08, ACM Press, Istanbul, Turkey, p 1

  • Chen X, Shang T, Kim I, Liu J (2017) A remote data integrity checking scheme for big data storage. 2017 IEEE second international conference on data science in cyberspace (DSC). IEEE, Shenzhen, pp 53–59

    Chapter  Google Scholar 

  • Darwish A, Hassanien AE, Elhoseny M, Kumar A, Muhammad K (2017) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput 10:4151–4166

    Article  Google Scholar 

  • Erway CC, KüpçüA Papamanthou C, Tamassia R (2015) Dynamic provable data possession. ACM Trans Inf Syst Secur 17(4):1–29

    Article  Google Scholar 

  • Fan Y, Liao Y, Li F, Zhou S, Zhang G (2019) Identity-based auditing for shared cloud data with efficient and secure sensitive information hiding. IEEE Access 7:114246–114260

    Article  Google Scholar 

  • Hariharasitaraman S, Balakannan SP (2019) A dynamic data security mechanism based on position aware Merkle tree for health rehabilitation services over cloud. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-019-01412-0

    Article  Google Scholar 

  • Huang L, Zhang G, Yu S, Fu A, Yearwood J (2017) SeShare: secure cloud data sharing based on blockchain and public auditing. Concurr Comput Pract Exp 31(22):e4359

    Google Scholar 

  • Huang L, Zhang G, Yu S, Fu A, Yearwood J (2018) Customized data sharing scheme based on blockchain and weighted attribute. 2018 IEEE global communications conference (GLOBECOM). IEEE, Abu Dhabi, pp 206–212

    Google Scholar 

  • Li M, Weng J, Yang A, Lu W, Zhang Y, Hou L, Liu JN, Xiang Y, Deng RH (2019) CrowdBC: a blockchain-based decentralized framework for crowdsourcing. IEEE Trans Parallel Distrib Syst 30(6):1251–1266

    Article  Google Scholar 

  • Merkle R (1987) A digital signature based on a conventional encryption function. LNCS 293:369–378

    Google Scholar 

  • Nakamoto S (2009) Bitcoin: a peer-to-peer electronic cash system. Cryptography Mailing list. https://metzdowd.com

  • Narayanan A, Bonneau J, Felten E, Miller A, Goldfeder S (2016) Bitcoin and cryptocurrency technologies: a comprehensive Introduction. Princeton University Press, Princeton

    MATH  Google Scholar 

  • Pournaghi S, Bayat M, Farjami Y (2020) MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01710-y

    Article  Google Scholar 

  • Qi Y, Huang Y (2019) DIRA: enabling decentralized data integrity and reputation audit via blockchain. Sci China Technol Sci 62(4):698–701

    Article  Google Scholar 

  • Tian H, Chen Y, Chang CC, Jiang H, Huang Y, Chen Y, Liu J (2017) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput 10(5):701–714

    Article  Google Scholar 

  • Tian H, Nan Fulin, Jiang H, Chang CC, Ning J, Huang Y (2019a) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107–125

    Article  Google Scholar 

  • Tian H, Nan F, Chang CC, Huang Y, Lu J, Du Y (2019b) Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J Netw Comput Appl 127:59–69

    Article  Google Scholar 

  • Wan C, Zhang J, Pei B, Chen C (2015) Efficient privacy-preserving third-party auditing for ambient intelligence systems. J Ambient Intell Humaniz Comput 7:1–7

    Google Scholar 

  • Wang B, Li B, Li H (2012) Knox: privacy-preserving auditing for shared data with large groups in the cloud. In: Bao F, Samarati P, Zhou J (eds) Applied cryptography and network security, Lecture Notes in Computer Science. Springer, Berlin, pp 507–525

    Chapter  Google Scholar 

  • Wang B, Li B, Li H (2014) Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput 2(1):43–56

    Article  Google Scholar 

  • Wang B, Li B, Li H (2015) Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92–106

    Article  MathSciNet  Google Scholar 

  • Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859

    Article  Google Scholar 

  • Yan Z, Gail-Joon A, Hongxin H, Yau SS, An HG, Chang-Jun H (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238

    Article  Google Scholar 

  • Yang Y, Huang Q, Chen F (2019a) Secure cloud storage based on RLWE problem. IEEE Access 7:27604–27614

    Article  Google Scholar 

  • Yang Y, Sun Y, Huang Q, Yin W, Chen F (2019b) RLWE-based ID-DIA protocols for cloud storage. IEEE Access 7:55732–55743

    Article  Google Scholar 

  • Zhang X, Xu C (2014) Efficient identity-based public auditing scheme for cloud storage from lattice assumption. 2014 IEEE 17th international conference on computational science and engineering. IEEE, Chengdu, pp 1819–1826

    Chapter  Google Scholar 

  • Zhang Y, Deng RH, Liu X, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277

    Article  MathSciNet  Google Scholar 

  • Zhao X, Wang X, Xu H, Wang Y (2015) Cloud data integrity checking protocol from lattice. Int J High Perform Comput Netw 8(2):167

    Article  Google Scholar 

  • Zheng BK, Zhu LH, Shen M, Gao F, Zhang C, Li YD, Yang J (2018) Scalable and privacy-preserving data sharing based on blockchain. J Comput Sci Technol 33(3):557–567

    Article  MathSciNet  Google Scholar 

  • Zhou L, Fu A, Yu S, Su M, Kuang B (2018) Data integrity verification of the outsourced big data in the cloud environment: a survey. J Netw Comput Appl 122:1–15

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by National Key Research and Development Program of China (No. 2017Y FB0802000), Natural Science Basic Research Plan in Shaanxi Province of China (Grant no. 2018JM6028), National Natural Science Foundation of China (No. 61772550, U1636114 and 61572521), the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No. 2019BDKFJJ008), and the National Cryptography Development Fund of China (No. MMJJ2 0170112). This work is also supported by Engineering University of PAP’s Funding for Scientific Research Innovation Team (No. KYTD201805), Engineering University of PAP’s Funding for Key Researcher (No. KYGG202011).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu An Wang.

Ethics declarations

Conflict of interest

This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue. The authors have no affiliation with any organization with a direct or indirect financial interest in the subject matter discussed in the manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., Wang, X.A., Xiao, S. et al. Decentralized data outsourcing auditing protocol based on blockchain. J Ambient Intell Human Comput 12, 2703–2714 (2021). https://doi.org/10.1007/s12652-020-02432-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02432-x

Keywords

Navigation