Abstract
Data deduplication and integrity auditing based blockchain plays an important role in guaranteeing secure and efficient cloud storage services. However, existing data deduplication schemes support auditing either with the assistance of a trust center (key server or third-party auditor) or bear the waste of computation and storage resources caused by repetitive authenticators storage and key storage. In this paper, we propose a blockchain-based shared data integrity auditing and deduplication scheme. Specifically, we propose a deduplication protocol based on ID-based broadcast encryption without key servers and achieve key deduplication on the user side. Next, we propose a data integrity auditing protocol by using the characteristic of convergent encryption to achieve authenticator deduplication on the cloud service provider side. Besides, we achieve decentralized data integrity auditing based blockchain without relying on a single trusted third-party auditor and improve the credibility of the auditing result. On this basis, we propose two bath auditing protocols for different scenarios to improve efficiency. Security and performance analysis demonstrates that the authenticators' storage cost on the cloud storage provider side can be reduced from <inline-formula><tex-math notation="LaTeX">${\mathcal {O}}({\mathcal {F}})$</tex-math></inline-formula> to <inline-formula><tex-math notation="LaTeX">${\mathcal {O}}(1)$</tex-math></inline-formula> and the key storage cost on the user side can be reduced from <inline-formula><tex-math notation="LaTeX">${\mathcal {O}}({\mathcal {F}})$</tex-math></inline-formula> to <inline-formula><tex-math notation="LaTeX">${\mathcal {O}}(1)$</tex-math></inline-formula> as well.
Original language | English |
---|---|
Pages (from-to) | 1-16 |
Number of pages | 16 |
Journal | IEEE Transactions on Dependable and Secure Computing |
DOIs | |
Publication status | Accepted/In press - 2023 |
Keywords
- Batch auditing
- Blockchain
- Blockchains
- Cloud computing
- Costs
- Data deduplication
- Data integrity
- Encryption
- Key deduplication
- Maximum likelihood estimation
- Servers
- Tag deduplication