Abstract
Cloud storage is one of the most important service of cloud computing. Since cloud service providers can not be completely trusted, traditional auditing methods can’t guarantee the security of data sources. This paper proposes a security framework for cloud data audit using blockchain technology. User’s operational information on the file is formed to a block after validated by all checked nodes in the blockchain network, and then to be put into the blockchain. Any modification or fake to the operational information can be inspected through the chain structure of block, thus ensuring the security of auditing data source. We construct a prototype in an Ethereum-based blockchain using Aliyun as data storage service, then test the time overhead of uploading file, broadcasting operation information and packing information into block chain. The results show that the time for packaging block remains unchanged from an overall viewpoint, and as the file size increasing, packaging block occupies less percentage in the entire process of file uploading or downloading.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
G Wood Ethereum: a secure decentralised generalised transaction. http://www.ethereum.Org
Dong, C., Wang, Y., Aldweesh, A., et al.: Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing, ACM CCS. ACM, New York (2017)
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gen. Comput. Syst. (2017)
Oliner, A., Stearley, J.: What supercomputers say: a study of five system logs. In: IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 575–584. IEEE Computer Society (2007)
Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: The 8th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC (2009)
Ateniese, G., Burns, R., Curtmola, R., et al.: Provable data possession at untrusted stores. In: ACM Conference on Computer and Communications Security, pp. 598–609. ACM (2007)
Tian, H., Chen, Z., Chang, C.C., et al.: Enabling public auditability for operation behaviors in cloud storage. Soft. Comput. 21(8), 1–13 (2016)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic ash system. Technical report (2009). https://bitcoin.org/bitcoin.pdf
Sengupta, B., Bag, S., Ruj, S., et al.: Retricoin: bitcoin based on compact proofs of retrievability. In: The 17th International Conference on Distributed Computing and Networking (2016)
Ramachandran, A., Kantarcioglu, D.: Using Blockchain and smart contracts for secure data provenance management (2017)
Yang, C., Chen, X., Xiang, Y.: Blockchain-based publicly verifiable data deletion scheme for cloud storage. J. Netw. Comput. Appl. 103 (2017)
Dagher, G.G., Mohler, J., Milojkovic, M., et al.: Ancile: privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology, sustainable cities & society (2018)
Ghoshal, S., Paul, G.: Exploiting block-chain data structure for auditorless auditing on cloud data. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 359–371. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49806-5_19
Fu, Y.: Meta-key: a secure data-sharing protocol under blockchain-based decentralised storage architecture (2017)
Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of IEEE Symposium on Security and Privacy (1980)
Acknowledgments
This work is supported by the National Key R&D Program of China (2016YFB0800402), partially supported by the National Natural Science Foundation of China under Grant No. 61232004 and the Fundamental Research Funds for the Central Universities (2016YXMS020).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Li, C., Hu, J., Zhou, K., Wang, Y., Deng, H. (2018). Using Blockchain for Data Auditing in Cloud Storage. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_31
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)