首页 | 本学科首页   官方微博 | 高级检索  
     


Outsourced data integrity verification based on blockchain in untrusted environment
Authors:Hao  Kun  Xin  Junchang  Wang  Zhiqiong  Wang  Guoren
Affiliation:1.School of Computer Science and Engineering, Northeastern University, Shenyang, China
;2.Key Laboratory of Big Data Management and Analytics, Liaoning Province, China
;3.College of Medicine and Biological Information Engineering, Northeastern University, Shenyang, China
;4.Neusoft Research of Intelligent Healthcare Technology, Co. Ltd., Shenyang, China
;5.School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China
;
Abstract:

Outsourced data, as the significant component of cloud service, has been widely used due to its convenience, low overhead, and high flexibility. To guarantee the integrity of outsourced data, data owner (DO) usually adopts a third party auditor (TPA) to execute the data integrity verification scheme. However, during the verification process, DO cannot fully confirm the reliability of the TPA, and handing over the verification of data integrity to the untrusted TPA may lead to data security threats. In this paper, we focus on the problem of integrity verification of outsourced data in untrusted environment, that is, how to improve the security and efficiency of data integrity verification without utilizing untrusted TPA. To address the problem, we design a decentralized model based on blockchain consisting of some collaborative verification peers (VPs), each of which maintains a replication of the entire blockchain to avoid maliciously tampering with. Based on the model, we present an advanced data integrity verification algorithm which allows DO to store and check the verification information by writing and retrieving the blockchain. In addition, in order to improve the concurrent performance, we extend the algorithm by introducing the verification group (VG) constituting by some VPs organized by Inner-Group and Inter-Group consensus protocols. We conduct a completed security analysis as well as extensive experiments of our proposed approach, and the evaluation results demonstrate that our proposed approaches achieve superior performance.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号