Computer Science ›› 2023, Vol. 50 ›› Issue (12): 368-376.doi: 10.11896/jsjkx.221000185

• Information Security • Previous Articles    

CASESC:A Cloud Auditing Scheme Based on Ethereum Smart Contracts

GUO Caicai, JIN Yu   

  1. College of Computer Science and Technology,Wuhan University of Science and Technology,Wuhan 430065,China
    Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System,Wuhan 430065,China
  • Received:2022-10-23 Revised:2023-03-19 Online:2023-12-15 Published:2023-12-07
  • About author:GUO Caicai,born in 1997,postgra-duate,is a member of China Computer Federation.Her main research interests include cloud storage and blockchain.
    JIN Yu,born in 1973,Ph.D,associate professor,is a member of China Computer Federation.Her main research interests include cloud computing,peer-to-peer computing and trust model.

Abstract: People prefer to use cloud storage due to its advantages of high scalability and low cost,but ensuring the integrity of cloud data has become a security challenge that needs to be solved immediately.While blockchain's characteristics of de-centralization and tamper resistance can greatly solve the problems such as single-point failures and security threats existing in cloud auditing schemes based on third party auditor(TPA),some scholars propose blockchain-based cloud auditing schemes.But these schemes need data owner(DO) or a delegated DO to validate the auditing proof,which not only requires DO to keep online,but increases its auditing burden.Moreover,most of them are only implemented in a simulated blockchain environment.Therefore,this paper proposes a cloud auditing scheme with Ethereum smart contracts-CASESC.CASESC uses solidity language to write Ethereum smart contract code which can send auditing requests and validate the auditing proof returned from cloud server provi-der(CSP) and stores auditing results and related information in the Ethereum that can be referred to by DO.Without delegating others or keeping online status,CASESC can replace DO to work and reduces its auditing overhead.Besides,CASESC conducts experiments in Ethereum public blockchain called Goerli and private blockchain constructed by Ganache in order to prove its availability.Theoretical analysis and experimental evaluation show that CASESC can significantly reduce the auditing overhead of DO without increasing overall auditing overhead.

Key words: Cloud auditing, Blockchain, Ethereum, Smart contract

CLC Number: 

  • TP309.2
[1]ZHANG Y,XU C,LI H,et al.Cryptographic Public Verification of Data Integrity for Cloud Storage Systems[J].IEEE Cloud Computing,2016,3(5):44-52.
[2]XUE J,XU C,BAI L.DStore:A Distributed System for Out-sourced Data Storage and Retrieval[J].Future Generation Computer Systems,2019,99(1):106-114.
[3]YANG K,JIA X.An Efficient and Secure Dynamic AuditingProtocol for Data Storage in Cloud Computing[J].IEEE Tran-sactions on Parallel and Distributed Systems,2013,24(9):1717-1726.
[4]ZHANG Y,XU C,LIANG X,et al.Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation[J].IEEE Transactions on Information Forensics and Security,2017,12(3):676-688.
[5]NI J,YU Y,MU Y,et al.On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(10):2760-2761.
[6]HAN H,FEI S,YAN Z,et al.A Survey on Blockchain-Based Integrity Auditing for Cloud Data[J].Digital Communications and Networks,2022,1(1):1-13.
[7]WANG X,ZHA X,NI W,et al.Survey on Blockchain for Internet of Things[J].Computer Communications,2019,136(1):10-29.
[8]LIU L,XU B.Research on Information Security TechnologyBased on Blockchain[C]//Proceedings of IEEE 3rd Interna-tional Conference on Cloud Computing and Big Data Analytics(ICCCBDA).Piscataway:IEEE,2018:380-384.
[9]XUY,REN J,ZHANG Y,et al.Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service[J].IEEE Transactions on Services Computing,2020,13(2):289-300.
[10]ZHANG G,YANG Z,XIE H,et al.A Secure Authorized Deduplication Scheme for Cloud Data Based on Blockchain[J].Information Processing and Management,2021,58(3):102510.
[11]SHARMA P,JINDAL R,BORAH M D.Blockchain-Based Decentralized Architecture for Cloud Storage System[J].Journal of Information Security and Applications,2021,62(8):102970.
[12]ZHANG C,XU Y,HU Y,et al.A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults[J].IEEE Transactions on Cloud Computing,2021,1(1):1-12.
[13]LIU B,YU X L,CHEN S,et al.Blockchain Based Data Integrity Service Framework for IoT Data[C]//Proceedings of IEEE International Conference on Web Services(ICWS).Piscataway:IEEE,2017:468-475.
[14]YU H,YANG Z,SINNOTT R O.Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology[J].IEEE Access,2018,7(1):6288-6296.
[15]WANG H,ZHANG J.Blockchain Based Data Integrity Verifica-tion for Large-Scale IoT Data[J].IEEE Access,2019,7(1):164996-165006.
[16]HUANG P,FAN K,YANG H,et al.A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System[J].IEEE Access,2020,8(1):94780-94794.
[17]LI J,WU J,JIANG G,et al.Blockchain-Based Public Auditing for Big Data in Cloud Storage[J].Information Processing and Management,2020,57(6):102382.
[18]SHU J,ZOU X,JIA X,et al.Blockchain-Based DecentralizedPublic Auditing for Cloud Storage[J].IEEE Transactions on Cloud Computing,2021,1(1):1-14.
[19]ZUO W,LO D,KOCHHAR P S,et al.Smart Contract Development:Challenges and Opportunities[J].IEEE Transactions on Software Engineering,2021,47(10):2084-2106.
[20]RENNER T,MULLER J,KAO O.Endolith:A Blockchain-Based Framework to Enhance Data Retention in Cloud Storages[C]//Proceedings of 26th Euromicro International Conference on Parallel,Distributed and Network-based Processing(PDP).Piscataway:IEEE,2018:627-634.
[21]XUE J,XU C,ZHANG Y,et al.DStore:A Distributed Cloud Storage System Based on Smart Contracts and Blockchain[C]//Proceedings of 18th International Conference on Algorithms and Architectures for Parallel Processing(ICA3PP).Cham:Sprin-ger,2018:385-401.
[22]PENG F,TIAN H,QUAN H,et al.Data Auditing for the Internet of Things Environments Leveraging Smart Contract[C]//Proceedings of 3rd International Conference on Frontiers in Cyber Security(FCS).Singapore:Springer,2020(1286):133-149.
[23]YUAN H,CHEN X,WANG J,et al.Blockchain-Based PublicAuditing and Secure Deduplication with Fair Arbitration[J].Information Sciences,2020,541(9):409-425.
[24]XIE M,ZHAO Q,HONG H.A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal Devices[C]//Proceedings of 21st International Conference on Algorithms and Architectures for Parallel Processing(ICA3PP).Cham:Springer,2021(13155):676-692.
[25]ATENIESE G,BURNS R,CURTMOLA R,et al.Provable Data Possession at Untrusted Stores[C]//Proceedings of 14th ACM Conference on Computer and Communications Security.New York:Association for Computing Machinery,2007:598-609.
[26]GAZZONI F D L,BARRETO P S L M.Demonstrating Data Possession and Uncheatable Data Transfer[J].Cryptology ePrint Archive,2006,1(1):150-159.
[27]LIU F,YANG J,LI Z B,et al.A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J].Journal of Computer Research and Development,2021,58(2):281-290.
[28]ALIA G,MARTINELLI E.Fast Modular Exponentiation ofLarge Numbers with Large Exponents[J].Journal of Systems Architecture,2002,47(14/15):1079-1088.
[29]DESWARTE Y,QUISQUATER J J,SAïDANE A.Remote Integrity Checking[C]//Proceedings of Working Conference on Integrity and Internal Control in Information Systems.Boston:Springer,2003(140):1-11.
[30]YAN H,ZHAO F S,SU F G,et al.Quantum Algorithm for Solving Hyperelliptic Curve Discrete Logarithm Problem[J].Quantum Information Processing,2020,19(3):120-126.
[31]ZHANG F,REIHANEH S N,SUSILO W.An Efficient Signature Scheme from Bilinear Pairings and its Applications[C]//Proceedings of 7th International Workshop on Practice and Theo-ry in Public Key Cryptography.Berlin:Springer,2004(2947):277-290.
[1] TONG Fei, SHAO Ranran. Study on Blockchain Based Access Control Model for Cloud Data [J]. Computer Science, 2023, 50(9): 16-25.
[2] ZHAO Mingmin, YANG Qiuhui, HONG Mei, CAI Chuang. Smart Contract Fuzzing Based on Deep Learning and Information Feedback [J]. Computer Science, 2023, 50(9): 117-122.
[3] WANG Junlu, LIU Qiang, ZHANG Ran, JI Wanting, SONG Baoyan. Blockchain-based Dual-branch Structure Expansion Model [J]. Computer Science, 2023, 50(8): 365-371.
[4] YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7.
[5] TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi. Overview of Blockchain Consensus Algorithms [J]. Computer Science, 2023, 50(6A): 220400200-12.
[6] ZHENG Hong, QIAN Shihui, LIU Zerun, DU Wen. Formal Verification of Supply Chain Contract Based on Coloured Petri Nets [J]. Computer Science, 2023, 50(6A): 220300220-7.
[7] HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6.
[8] LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9.
[9] PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6.
[10] XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312.
[11] LIU Wei, GUO Lingbei, XIA Yujie, SHE Wei, TIAN Zhao. Raft Consensus Algorithm Based on Credit Evaluation Model [J]. Computer Science, 2023, 50(6): 322-329.
[12] ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347.
[13] PEI Cui, FAN Guisheng, YU Huiqun, YUE Yiming. Auction-based Edge Cloud Deadline-aware Task Offloading Strategy [J]. Computer Science, 2023, 50(4): 241-248.
[14] LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322.
[15] SUN Min, XU Senwei, SHAN Tong. LN-ERCL Lightning Network Optimization Scheme [J]. Computer Science, 2023, 50(11A): 230200115-5.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!