Blockchain-based cross-user data shared auditing
نویسندگان
چکیده
In cloud storage, public auditing is a more popular data integrity verification technique since it allows users to delegate tasks fully trusted third-party auditor (TPA). However, difficult find such TPA in practical application. Besides, the centralised model makes have bear burdensome work pressure, which limits practicability of existing schemes. this paper, we firstly proposed blockchain-based generalised shared mechanism BCSA cross-user scenario, aims at achieving available with non-fully TPA, and reducing user's fees TPA's pressure by allowing share their procedure others. Furthermore, initialise concrete construction BCSAD Diffie–Hellman protocol for scenario different data. Likewise, also propose novel BCSAI identical data, utilises password-authenticated key exchange (PAKE) achieve ciphertext deduplication, storage alleviating service on server TPA. Security performance analysis evaluate scheme.
منابع مشابه
A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing
Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, the user will outsource data to the cloud storag...
متن کاملAuditing for shared Data in the Cloud using Group Dynamics
We propose a privacy preserving mechanism in which the identity of the user on each shared block is protected from public verifiers, who are responsible to efficiently verify shared data integrity instead of retrieving the entire file. Ring signature is being exploited to audit the correctness of shared data by verifying the metadata available to the auditor. To improve the efficiency of verify...
متن کاملAllocation of Shared Data Based on Mobile User Movement
In this paper, we devise data allocation algorithms that can utilize the knowledge of user moving patterns for proper allocation of shared data in a mobile computing system. By employing the data allocation algorithms devised, the occurrences of costly remote accesses can be minimized and the performance of a mobile computing system is thus improved. The data allocation algorithms for shared da...
متن کاملBlockchain Based Intelligent Vehicle Data sharing Framework
The Intelligent vehicle (IV) is experiencing revolu tionary growth in research and industry, but it still suf fers from many security vulnerabilities. Traditional se curity methods are incapable to provide secure IV dat a sharing. The major issues in IV data sharing are trus t, data accuracy and reliability of data sharing data in the communication channel. Blockchain technology works for the c...
متن کاملShared Data Based Privacy Preserving Authentication in Cloud for Public Auditing
With cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity witho...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Connection science
سال: 2021
ISSN: ['0954-0091', '1360-0494']
DOI: https://doi.org/10.1080/09540091.2021.1956879