Skip to main content
Erschienen in:

04.06.2024

A blockchain-based auditable deduplication scheme for multi-cloud storage

verfasst von: Chunhua Jin, Yongliang Xu, Wenyu Qin, Jie Zhao, Ge Kan, Fugeng Zeng

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Der Artikel stellt ein neuartiges Blockchain-basiertes Deduplizierungsprogramm für Multi-Cloud-Speicher vor, das sich den Herausforderungen der Datenvertraulichkeit, Systemzuverlässigkeit und Integrität widmet. Es nutzt konvergente Verschlüsselung und geheime Weitergabe, um die Sicherheit zu erhöhen, während Batch-Auditing und Blockchain-Technologie die Prüfungskosten senken und einzelne Fehlerpunkte verhindern. Das System ist hocheffizient und sicher konzipiert und leistet somit einen wertvollen Beitrag im Bereich des Cloud-Speichermanagements.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef
2.
Zurück zum Zitat Mell P, Grance T (2011) The NIST definition of cloud computing. Commun ACM 53(6):50 Mell P, Grance T (2011) The NIST definition of cloud computing. Commun ACM 53(6):50
3.
Zurück zum Zitat Ebinazer SE, Savarimuthu N (2021) An efficient secure data deduplication method using radix trie with bloom filter (sdd-rt-bf) in cloud environment. Peer Peer Netw Appl 14:2443–2451CrossRef Ebinazer SE, Savarimuthu N (2021) An efficient secure data deduplication method using radix trie with bloom filter (sdd-rt-bf) in cloud environment. Peer Peer Netw Appl 14:2443–2451CrossRef
4.
Zurück zum Zitat Kan G, Jin C, Zhu H, Xu Y, Liu N (2021) An identity-based proxy re-encryption for data deduplication in cloud. J Syst Architect 121:102332CrossRef Kan G, Jin C, Zhu H, Xu Y, Liu N (2021) An identity-based proxy re-encryption for data deduplication in cloud. J Syst Architect 121:102332CrossRef
5.
Zurück zum Zitat Zhang X, Zhao J, Xu C, Li H, Wang H, Zhang Y (2021) CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based wbans against malicious auditors. IEEE Trans Cloud Comput 9(4):1362–1375CrossRef Zhang X, Zhao J, Xu C, Li H, Wang H, Zhang Y (2021) CIPPPA: Conditional identity privacy-preserving public auditing for cloud-based wbans against malicious auditors. IEEE Trans Cloud Comput 9(4):1362–1375CrossRef
6.
Zurück zum Zitat Chang J, Xu M, Xue R (2022) Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based iot applications. Peer Peer Netw Appl 15(4):2021–2036CrossRef Chang J, Xu M, Xue R (2022) Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based iot applications. Peer Peer Netw Appl 15(4):2021–2036CrossRef
7.
Zurück zum Zitat Vidhya S, Kalaivani V (2023) A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme. Peer Peer Netw Appl, p 1–14 Vidhya S, Kalaivani V (2023) A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme. Peer Peer Netw Appl, p 1–14
8.
Zurück zum Zitat Aronovich L, Asher R, Bachmat E, Bitner H, Hirsch M, Klein ST (2009) The design of a similarity based deduplication system. In: Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, p 1–14 Aronovich L, Asher R, Bachmat E, Bitner H, Hirsch M, Klein ST (2009) The design of a similarity based deduplication system. In: Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, p 1–14
9.
Zurück zum Zitat Blasco J, Di Pietro R, Orfila A, Sorniotti A (2014) A tunable proof of ownership scheme for deduplication using bloom filters. In: 2014 IEEE Conference on Communications and Network Security, p 481–489. IEEE Blasco J, Di Pietro R, Orfila A, Sorniotti A (2014) A tunable proof of ownership scheme for deduplication using bloom filters. In: 2014 IEEE Conference on Communications and Network Security, p 481–489. IEEE
10.
Zurück zum Zitat Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd International Conference on Distributed Computing Systems, p 617–624. IEEE Douceur JR, Adya A, Bolosky WJ, Simon P, Theimer M (2002) Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings 22nd International Conference on Distributed Computing Systems, p 617–624. IEEE
11.
Zurück zum Zitat Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, p 296–312. Springer Bellare M, Keelveedhi S, Ristenpart T (2013) Message-locked encryption and secure deduplication. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, p 296–312. Springer
12.
Zurück zum Zitat Keelveedhi S, Bellare M, Ristenpart T (2013) DupLESS: Server-aided encryption for deduplicated storage. In: 22nd USENIX Security Symposium, p 179–194 Keelveedhi S, Bellare M, Ristenpart T (2013) DupLESS: Server-aided encryption for deduplicated storage. In: 22nd USENIX Security Symposium, p 179–194
13.
Zurück zum Zitat Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan MM, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579MathSciNetCrossRef Li J, Chen X, Huang X, Tang S, Xiang Y, Hassan MM, Alelaiwi A (2015) Secure distributed deduplication systems with improved reliability. IEEE Trans Comput 64(12):3569–3579MathSciNetCrossRef
14.
Zurück zum Zitat Li J, Wu J, Chen L, Li J (2018) Blockchain-based secure and reliable distributed deduplication scheme. In: International Conference on Algorithms and Architectures for Parallel Processing, p 393–405. Springer Li J, Wu J, Chen L, Li J (2018) Blockchain-based secure and reliable distributed deduplication scheme. In: International Conference on Algorithms and Architectures for Parallel Processing, p 393–405. Springer
15.
Zurück zum Zitat Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, p 491–500 Halevi S, Harnik D, Pinkas B, Shulman-Peleg A (2011) Proofs of ownership in remote storage systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, p 491–500
16.
Zurück zum Zitat Li S, Xu C, Zhang Y, Du Y, Chen K (2022) Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage. IEEE Trans Serv Comput, p 1–1 Li S, Xu C, Zhang Y, Du Y, Chen K (2022) Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage. IEEE Trans Serv Comput, p 1–1
17.
Zurück zum Zitat Song M, Hua Z, Zheng Y, Huang H, Jia X (2024) LSDedup: Layered secure deduplication for cloud storage. IEEE Trans Comput 73(2):422–435CrossRef Song M, Hua Z, Zheng Y, Huang H, Jia X (2024) LSDedup: Layered secure deduplication for cloud storage. IEEE Trans Comput 73(2):422–435CrossRef
18.
Zurück zum Zitat Zheng H, Zeng S, Li H, Li Z (2024) Secure batch deduplication without dual servers in backup system. IEEE Trans Dependable Secure Comput, p 1–13 Zheng H, Zeng S, Li H, Li Z (2024) Secure batch deduplication without dual servers in backup system. IEEE Trans Dependable Secure Comput, p 1–13
19.
Zurück zum Zitat Deswarte Y, Quisquater J-J, Saïdane A (2004) Remote integrity checking: How to trust files stored on untrusted servers. IFIP Adv Inf Commun Technol 140:1–11 Deswarte Y, Quisquater J-J, Saïdane A (2004) Remote integrity checking: How to trust files stored on untrusted servers. IFIP Adv Inf Commun Technol 140:1–11
20.
Zurück zum Zitat Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, p 598–609 Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, p 598–609
21.
Zurück zum Zitat Juels A, Kaliski Jr BS (2007) PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, p 584–597 Juels A, Kaliski Jr BS (2007) PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, p 584–597
22.
Zurück zum Zitat Shacham H, Waters B (2008) Compact proofs of retrievability. In: International Conference on the Theory and Application of Cryptology and Information Security, p 90–107. Springer Shacham H, Waters B (2008) Compact proofs of retrievability. In: International Conference on the Theory and Application of Cryptology and Information Security, p 90–107. Springer
23.
Zurück zum Zitat Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: International Conference on the Theory and Application of Cryptology and Information Security, p 514–532. Springer Boneh D, Lynn B, Shacham H (2001) Short signatures from the weil pairing. In: International Conference on the Theory and Application of Cryptology and Information Security, p 514–532. Springer
24.
Zurück zum Zitat Xu Y, Jin C, Qin W, Shan J, Jin Y (2022) Secure fuzzy identity-based public verification for cloud storage. J Syst Architect 128:102558CrossRef Xu Y, Jin C, Qin W, Shan J, Jin Y (2022) Secure fuzzy identity-based public verification for cloud storage. J Syst Architect 128:102558CrossRef
25.
Zurück zum Zitat Liu X, Li L, Sun R, Li W, Liu T (2023) Lightweight multi-departmental data sharing scheme based on consortium blockchain. Peer Peer Netw Appl, p 1–16 Liu X, Li L, Sun R, Li W, Liu T (2023) Lightweight multi-departmental data sharing scheme based on consortium blockchain. Peer Peer Netw Appl, p 1–16
26.
Zurück zum Zitat Armknecht F, Bohli J-M, Karame GO et al (2014) Outsourced proofs of retrievability. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p 831–843 Armknecht F, Bohli J-M, Karame GO et al (2014) Outsourced proofs of retrievability. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, p 831–843
27.
Zurück zum Zitat Zhang Y, Xu C, Yu S, Li H, Zhang X (2015) SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans Comput Social Syst 2(4):159–170CrossRef Zhang Y, Xu C, Yu S, Li H, Zhang X (2015) SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Trans Comput Social Syst 2(4):159–170CrossRef
28.
Zurück zum Zitat Xue J, Xu C, Zhao J, Ma J (2019) Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. SCIENCE CHINA Inf Sci 62(3):1–16CrossRef Xue J, Xu C, Zhao J, Ma J (2019) Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. SCIENCE CHINA Inf Sci 62(3):1–16CrossRef
29.
Zurück zum Zitat Zhang Y, Xu C, Lin X, Shen X (2021) Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Transactions on Cloud Computing 9(3):923–937CrossRef Zhang Y, Xu C, Lin X, Shen X (2021) Blockchain-based public integrity verification for cloud storage against procrastinating auditors. IEEE Transactions on Cloud Computing 9(3):923–937CrossRef
30.
Zurück zum Zitat Shu J, Zou X, Jia X, Zhang W, Xie R (2021) Blockchain-based decentralized public auditing for cloud storage. IEEE Trans Cloud Comput, p 1–1 Shu J, Zou X, Jia X, Zhang W, Xie R (2021) Blockchain-based decentralized public auditing for cloud storage. IEEE Trans Cloud Comput, p 1–1
31.
Zurück zum Zitat Zhang C, Xu Y, Hu Y, Wu J, Ren J, Zhang Y (2021) A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans Cloud Comput Zhang C, Xu Y, Hu Y, Wu J, Ren J, Zhang Y (2021) A blockchain-based multi-cloud storage data auditing scheme to locate faults. IEEE Trans Cloud Comput
32.
Zurück zum Zitat Xu Y, Jin C, Qin W, Zhao J, Chen G, Zeng F (2024) BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication. J Syst Architect 147:103053CrossRef Xu Y, Jin C, Qin W, Zhao J, Chen G, Zeng F (2024) BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication. J Syst Architect 147:103053CrossRef
33.
Zurück zum Zitat Song M, Hua Z, Zheng Y, Xiang T, Jia X (2023) Enabling transparent deduplication and auditing for encrypted data in cloud. IEEE Trans Dependable Secure Comput, p 1–18 Song M, Hua Z, Zheng Y, Xiang T, Jia X (2023) Enabling transparent deduplication and auditing for encrypted data in cloud. IEEE Trans Dependable Secure Comput, p 1–18
34.
Zurück zum Zitat Blakley GR, Meadows C (1984) Security of ramp schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, p 242–268. Springer Blakley GR, Meadows C (1984) Security of ramp schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, p 242–268. Springer
36.
Zurück zum Zitat Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, p 21260 Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, p 21260
37.
Zurück zum Zitat Bao F, Deng RH, Zhu H (2003) Variations of diffie-hellman problem. In: International Conference on Information and Communications Security, p 301–312. Springer Bao F, Deng RH, Zhu H (2003) Variations of diffie-hellman problem. In: International Conference on Information and Communications Security, p 301–312. Springer
38.
Zurück zum Zitat Yuan J, Yu S (2013) Secure and constant cost public cloud storage auditing with deduplication. In: 2013 IEEE Conference on Communications and Network Security (CNS), p 145–153. IEEE Yuan J, Yu S (2013) Secure and constant cost public cloud storage auditing with deduplication. In: 2013 IEEE Conference on Communications and Network Security (CNS), p 145–153. IEEE
39.
Zurück zum Zitat Xu Y, Zhang C, Wang G, Qin Z, Zeng Q (2020) A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans Emerg Top Comput 9(3):1421–1432CrossRef Xu Y, Zhang C, Wang G, Qin Z, Zeng Q (2020) A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans Emerg Top Comput 9(3):1421–1432CrossRef
40.
Zurück zum Zitat Tian G, Hu Y, Wei J, Liu Z, Huang X, Chen X, Susilo W (2022) Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans Dependable Secure Comput 19(6):3941–3954CrossRef Tian G, Hu Y, Wei J, Liu Z, Huang X, Chen X, Susilo W (2022) Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans Dependable Secure Comput 19(6):3941–3954CrossRef
41.
Zurück zum Zitat Zhang Q, Sui D, Cui J, Gul C, Zhong H (2023) Efficient integrity auditing mechanism with secure deduplication for blockchain storage. IEEE Trans Comput 72(8):2365–2376CrossRef Zhang Q, Sui D, Cui J, Gul C, Zhong H (2023) Efficient integrity auditing mechanism with secure deduplication for blockchain storage. IEEE Trans Comput 72(8):2365–2376CrossRef
42.
Zurück zum Zitat Liu S, Yao Y, Tian G, Wei J, Liu X (2023) A blockchain-based compact audit-enabled deduplication in decentralized storage. Computer Standards & Interfaces 85:103718CrossRef Liu S, Yao Y, Tian G, Wei J, Liu X (2023) A blockchain-based compact audit-enabled deduplication in decentralized storage. Computer Standards & Interfaces 85:103718CrossRef
Metadaten
Titel
A blockchain-based auditable deduplication scheme for multi-cloud storage
verfasst von
Chunhua Jin
Yongliang Xu
Wenyu Qin
Jie Zhao
Ge Kan
Fugeng Zeng
Publikationsdatum
04.06.2024
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2024
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-024-01734-7