Blockchain-based cross-user data shared auditing

نویسندگان

چکیده

In cloud storage, public auditing is a more popular data integrity verification technique since it allows users to delegate tasks fully trusted third-party auditor (TPA). However, difficult find such TPA in practical application. Besides, the centralised model makes have bear burdensome work pressure, which limits practicability of existing schemes. this paper, we firstly proposed blockchain-based generalised shared mechanism BCSA cross-user scenario, aims at achieving available with non-fully TPA, and reducing user's fees TPA's pressure by allowing share their procedure others. Furthermore, initialise concrete construction BCSAD Diffie–Hellman protocol for scenario different data. Likewise, also propose novel BCSAI identical data, utilises password-authenticated key exchange (PAKE) achieve ciphertext deduplication, storage alleviating service on server TPA. Security performance analysis evaluate scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing

Cloud computing technology has matured, so cloud computing produces a wide range of cloud service. Cloud storage services are one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage services bring a lot of convenience, many enterprises and users store the data to the cloud storage. However, the user will outsource data to the cloud storag...

متن کامل

Auditing for shared Data in the Cloud using Group Dynamics

We propose a privacy preserving mechanism in which the identity of the user on each shared block is protected from public verifiers, who are responsible to efficiently verify shared data integrity instead of retrieving the entire file. Ring signature is being exploited to audit the correctness of shared data by verifying the metadata available to the auditor. To improve the efficiency of verify...

متن کامل

Allocation of Shared Data Based on Mobile User Movement

In this paper, we devise data allocation algorithms that can utilize the knowledge of user moving patterns for proper allocation of shared data in a mobile computing system. By employing the data allocation algorithms devised, the occurrences of costly remote accesses can be minimized and the performance of a mobile computing system is thus improved. The data allocation algorithms for shared da...

متن کامل

Blockchain Based Intelligent Vehicle Data sharing Framework

The Intelligent vehicle (IV) is experiencing revolu tionary growth in research and industry, but it still suf fers from many security vulnerabilities. Traditional se curity methods are incapable to provide secure IV dat a sharing. The major issues in IV data sharing are trus t, data accuracy and reliability of data sharing data in the communication channel. Blockchain technology works for the c...

متن کامل

Shared Data Based Privacy Preserving Authentication in Cloud for Public Auditing

With cloud data services, it is commonplace for data to be not only stored in the cloud, but also shared across multiple users. Unfortunately, the integrity of cloud data is subject to skepticism due to the existence of hardware/software failures and human errors. Several mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity witho...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Connection science

سال: 2021

ISSN: ['0954-0091', '1360-0494']

DOI: https://doi.org/10.1080/09540091.2021.1956879