Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12454))

Abstract

Blockchain based verification has recently been studied as a new emerging approach for cloud data integrity protection without a centralized third party auditor. Existing schemes are mostly limited to scalability barrier and search efficiency of blockchain, which restricts their capability to support large-scale application. To address the problem above, we propose a blockchain based integrity verification scheme for large-scale cloud data using T-Merkle Tree. In our design, data tags are generated by ZSS short signature and stored on blockchain, and a new verification method based on ZSS short signature is proposed. The integrity of cloud data can be efficiently and undeniably verified with the property of bilinear pairing by offloading the computation from verifier to prover. Furthermore, a new blockchain storage structure called T-Merkle tree and its search algorithm is designed to improves the storage utilization and supports binary search in a block. Finally, a prototype system based on Hyperledger Fabric is implemented to evaluate our scheme. Theoretic analysis and experimental results demonstrate the security and efficiency of our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Amer, A., Long, D.D.E., Schwarz, S.J.T.: Reliability challenges for storing exabytes. In: International Conference on Networking and Communications (ICNC), vol. 2014, pp. 907–913 (2014)

    Google Scholar 

  2. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    Article  MathSciNet  Google Scholar 

  3. Zhang, Y., Xu, C., Lin, X., Shen, X.S.: Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Trans. Cloud Comput. (2020)

    Google Scholar 

  4. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  5. Yue, D., Li, R., Zhang, Y., Tian, W., Peng, C.: Blockchain based data integrity verification in P2P cloud storage. In: IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), pp. 561–568 (2018)

    Google Scholar 

  6. Wang, H., Wang, Q., He, D.: Blockchain-based private provable data possession. IEEE Trans. Dependable Secure Comput. (2020)

    Google Scholar 

  7. Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24632-9_20

    Chapter  Google Scholar 

  8. Juels, A., Kaliski, B.S.: PORs: proofs of retrievability for large files. In: Proceedings of ACM CCS, pp. 584–597 (2007)

    Google Scholar 

  9. Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of ACM CCS 2007, pp. 598–610 (2007)

    Google Scholar 

  10. Wang, Q., Wang, C., Ren, K., Lou, W., Lin, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22(5), 847–859 (2011)

    Article  Google Scholar 

  11. Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(19), 1717–1726 (2013)

    Article  Google Scholar 

  12. Wang, B., Li, B., Li, H.: Panda: public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8(1), 92–106 (2015)

    Article  Google Scholar 

  13. Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of IEEE INFOCOM, pp. 2121–2129 (2014)

    Google Scholar 

  14. Chen, C.H., Lee, P.C.: Enabling data integrity protection in regenerating-coding-based cloud storage: theory and implementation. IEEE Trans. Reliab. 64(3), 840–851 (2015)

    Article  Google Scholar 

  15. Liu, C., et al.: Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Trans. Parallel Distrib. Syst. 25(9), 2234–2244 (2014)

    Article  Google Scholar 

  16. Liu, B., Yu, X.L., Chen, S., Xu, X., Zhu, L.: Blockchain based data integrity service framework for IoT data. In: Proceedings of ICWS, pp. 468–475, June 2017

    Google Scholar 

  17. Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwiat, K., Njilla, L.: ProvChain: a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability. In: Proceedings of 17th IEEE/ACM International Symposium on Cluster, Cloud Grid Computing (CCGRID), Madrid, Spain, May 2017, pp. 468–477 (2017)

    Google Scholar 

  18. Wang, C., Chen, S., Feng, Z., Jiang, Y., Xue, X.: Block chain-based data audit and access control mechanism in service collaboration. In: Proceedings of ICWS, pp. 214–218 (2019)

    Google Scholar 

  19. Wang, H., Zhang, J.: Blockchain based data integrity verification for large-scale IoT data. IEEE Access 7, 164996–165006 (2019)

    Article  Google Scholar 

  20. Yu, H., Yang, Z., Sinnott, R.: Decentralized big data auditing for smart city environments leveraging blockchain technology. IEEE Access 7, 6288–6296 (2019)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the Natural Science Foundation of Hubei Province (2018CBF109), Research Project of Hubei Provincial Department of Education (Q20191710), Project of Jiangxi Provincial Social Science Planning (17XW08), Science and Technology Research Project of Jiangxi Provincial of Education Department (GJJ180905). Team plan of scientific and technological innovation of outstanding youth in universities of Hubei province (T201807).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiaoli Shi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, K., Shi, J., Huang, C., Hu, X. (2020). Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree. In: Qiu, M. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2020. Lecture Notes in Computer Science(), vol 12454. Springer, Cham. https://doi.org/10.1007/978-3-030-60248-2_5

Download citation

Publish with us

Policies and ethics