Computer Science ›› 2020, Vol. 47 ›› Issue (9): 330-338.doi: 10.11896/jsjkx.190800147

• Information Security • Previous Articles    

High Trusted Cloud Storage Model Based on TBchain Blockchain

LI Ying1,2, YU Ya-xin1,2, ZHANG Hong-yu1, LI Zhen-guo1   

  1. 1 School of Computer Science and Engineering,Northeastern University,Shenyang 110819,China
    2 Key Laboratory of Intelligent Computing of Medical Imaging,Ministry of Education,School of Computer Science and Engineering,Northeastern University,Shenyang 110819,China
  • Received:2019-08-29 Published:2020-09-10
  • About author:LI Ying,born in 1994,postgraduate.Her main research interests include blockchain and cloud computing.
    YU Ya-xin,born in 1971,Ph.D,asso-ciated professor,MS supervisor,is a member of China Computer Federation.Her main research interests include data mining and social network.
  • Supported by:
    National Natural Science Foundation of China (61871106),Research on Theory of Super-resolution ComputationalImaging Based Optical Diffraction in Freeform Lens (61973059) and National Key Research and DevelopmentProgram of China (2016YFC0101500).

Abstract: Data stored in the cloud can be illegally stolen or tampered with,exposing users’ data to confidentiality threats.In order to store mass data more safely and efficiently,this paper proposes a storage model CBaaS(Cloud and Blockchain as a service) that supports the combination of index,traceability and verifiability of Cloud storage and Blockchain,which can enhance the credibility of data in the Cloud.Secondly,blockchain consensus protocol leads to low throughput and slow processing speed of transactions,which seriously restricts the development of decentralized applications.Based on this,this paper implements a three-tier architecture Blockchain model TBchain,which improves the scalability of the Blockchain and the throughput of transactions in the blockchain by dividing a part of the blockchain and locking it in the block of a higher level blockchain.Next,due to the demand of decentralization,blockchain occupies a large amount of storage space of massive nodes,which greatly limits the development and application of the database system based on blockchain technology.Part of the transaction is stored locally through TBchain,which increases the scalability of blockchain capacity.The ETag in the cloud storage object metadata is used to identify the contents of an Object and can be used to check if the contents of the Object have changed.By storing the object metadata in the cloud storage on the blockchain,the ETag value can be used to check whether the content of the Object changes and the data on the blockchain can not be tampered with to verify whether the data stored on the cloud is safe and improve the reliability of the data stored on the cloud.The experimental results show that the TBchain model improves the scalability and storage capacity scalability of the blockchain,and the CBaaS model also improves the reliability of data stored in the cloud.

Key words: Three-tier hierarchical blockchain, Highly trusted cloud storage, Scalability, Storage scalability, Metadata

CLC Number: 

  • TP311
[1] NAKAMOTO S,BITCOIN A.A peer-to-peer electronic cashsystem[EB/OL].https://bitcoin.org/bitcoin.pdf.
[2] ZHENG Z,XIE S,DAI H,et al.An overview of blockchaintechnology:Architecture,consensus,and future trends[C]//2017 IEEE International Congress on Big Data (BigData congress).IEEE,2017:557-564.
[3] OTTE P,DE VOS M,POUWELSE J.TrustChain:A Sybil-re-sistant scalable blockchain[J].Future Generation Computer Systems,2020,107:770-780.
[4] JIA D Y,XIN J C,WANG Z Q.Storage Capacity Scalable Model of Blockchain[J].Journal of Frontiers of Computer Science and Technology,2018,12(4):525-535.
[5] EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-ng:A scalable blockchain protocol[C]//13th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 16).2016:45-59.
[6] SOMPOLINSKY Y,ZOHAR A.Secure high-rate transactionprocessing in bitcoin[C]//International Conference on Financial Cryptography and Data Security.Berlin:Springer,2015:507-527.
[7] ZHOU L,VARADHARAJAN V,HITCHENS M.Trust en-hanced cryptographic role-based access control for secure cloud data storage[J].IEEE Transactions on Information Forensics and Security,2015,10(11):2381-2395.
[8] UIKEY C,BHILARE D S.TrustRBAC:Trust role based access control model in multi-domain cloud environments[C]//2017 International Conference on Information,Communication,Instrumentation and Control (ICICIC).IEEE,2017:1-7.
[9] TIAN H,CHEN Y,JIANG H,et al.Public auditing for trusted cloud storage services[J].IEEE Security & Privacy,2019,17(1):10-22.
[10] ZHAO B,FAN P,NI M.Mchain:a blockchain-based VM measurements securestorage approach in IaaS cloud with enhanced integrity and controllability[J].IEEE Access,2018,6:43758-43769.
[11] SUKHODOLSKIY I,ZAPECHNIKOV S.A blockchain-basedaccess control system for cloud storage[C]//2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).IEEE,2018:1575-1578.
[12] WESTERLUND M,KRATZKE N.Towards distributed clouds:A review about the evolution of centralized cloud computing,distributed ledger technologies,and a foresight on unifying opportunities and security implications[C]//2018 International Conference on High Performance Computing & Simulation (HPCS).IEEE,2018:655-663.
[13] POURMAJIDI W,MIRANSKYY A.Logchain:blockchain-as-sisted log storage[C]//2018 IEEE 11th International Conference on Cloud Computing (CLOUD).IEEE,2018:978-982.
[14] ZHU L,WU Y,GAI K,et al.Controllable and trustworthyblockchain-based cloud data management[J].Future Generation Computer Systems,2019,91:527-535.
[15] ESPOSITO C,DE SANTIS A,TORTORA G,et al.Blockchain:A panacea for healthcare cloud-based data security and privacy?[J].IEEE Cloud Computing,2018,5(1):31-37.
[16] SHEN M,MA B,ZHU L,et al.Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection[J].IEEE Transactions on Information Forensics and Security,2017,13(4):940-953.
[17] XIA Q I,SIFAH E B,ASAMOAH K O,et al.MeDShare:Trust-less medical data sharing among cloud service providers via blockchain[J].IEEE Access,2017,5:14757-14767.
[18] GUO R,SHI H,ZHAO Q,et al.Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems[J].IEEE access,2018,6:11676-11686.
[19] LIANG G,WELLER S R,LUO F,et al.Distributed blockchain-based data protection framework for modern power systems against cyber attacks[J].IEEE Transactions on Smart Grid,2018,10(3):3162-3173.
[20] ZYSKIND G,NATHAN O.Decentralizing privacy:Usingblockchain to protect personal data[C]//2015 IEEE Security and Privacy Workshops.IEEE,2015:180-184.
[21] LIANG X,SHETTY S,TOSH D,et al.Provchain:A block-chain-based data provenance architecture in cloud environment with enhanced privacy and availability[C]//2017 17th IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing (CCGRID).IEEE,2017:468-477.
[22] JIA D,XIN J,WANG Z,et al.ElasticChain:support very large blockchain by reducing data redundancy[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data.Cham:Springer,2018:440-454.
[23] GAETANI E,ANIELLO L,BALDONI R,et al.Blockchain-based database to ensure data integrity in cloud computing environments[C]//Italian Conference on Cybersecurity.2017.
[24] YANG C,CHEN X,XIANG Y.Blockchain-based publicly verifiable data deletion scheme for cloud storage[J].Journal of Network and Computer Applications,2018,103:185-193.
[1] ZHUANG Yuan, GUO Qiang, ZHANG Jie, ZENG Yun-hui. Large Scalability Method of 2D Computation on Shenwei Many-core [J]. Computer Science, 2020, 47(8): 87-92.
[2] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[3] WU Bin-feng. Design of IoT Middleware Based on Microservices Architecture [J]. Computer Science, 2019, 46(6A): 580-584.
[4] ZHAO Xing-wang,LIANG Ji-ye,GUO Lan-jie. Collaborative Filtering Recommendation Algorithm Based on Space Transformation [J]. Computer Science, 2018, 45(7): 16-21.
[5] ZHANG Shi-jiang, CHAI Jing, CHEN Ze-hua and HE Hai-wu. Byzantine Consensus Algorithm Based on Gossip Protocol [J]. Computer Science, 2018, 45(2): 20-24.
[6] ZHOU Qiang, XIE Jing and ZHAO Hua-ming. Architecture and Solution for Large Web Sites [J]. Computer Science, 2017, 44(Z6): 587-590.
[7] HAI Mo and ZHANG You. Performance Comparison of Clustering Algorithms in Spark [J]. Computer Science, 2017, 44(Z6): 414-418.
[8] TANG Bing, Laurent BOBELIN and HE Hai-wu. Parallel Algorithm of Nonnegative Matrix Factorization Based on Hybrid MPI and OpenMP Programming Model [J]. Computer Science, 2017, 44(3): 51-54.
[9] XU Jing, REN Kai-jun and LI Xiao-yong. Parallel Algorithm Design and Optimization of Range Query for Meteorological Data Retrieval [J]. Computer Science, 2017, 44(3): 42-47.
[10] LIU Lin and ZHOU Jian-tao. Review for Research of Control Plane in Software-defined Network [J]. Computer Science, 2017, 44(2): 75-81.
[11] HE Yan-xiang, YU Tao, CHEN Yan-zhao, LI Qing-an and FAN Tong-rang. Data Storage and Query in Internet of Things [J]. Computer Science, 2015, 42(3): 185-190.
[12] FU Teng and GAO Jian-hua. Metadata Checking and Testing of Web Application Based on Invariance [J]. Computer Science, 2014, 41(8): 224-228.
[13] XIE Ping. Survey on Data Deduplication Techniques for Storage Systems [J]. Computer Science, 2014, 41(1): 22-30.
[14] ZHENG Sheng and LI Tong. Data Placement Algorithm for Large-scale Storage System [J]. Computer Science, 2013, 40(Z11): 270-273.
[15] . Parallel Benchmark for Evaluating Parallel Simulation Engine [J]. Computer Science, 2013, 40(3): 41-45.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .
[10] YANG Yu-qi, ZHANG Guo-an and JIN Xi-long. Dual-cluster-head Routing Protocol Based on Vehicle Density in VANETs[J]. Computer Science, 2018, 45(4): 126 -130 .