4.7 Article

IntegrityChain: Provable Data Possession for Decentralized Storage

Journal

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
Volume 38, Issue 6, Pages 1205-1217

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSAC.2020.2986664

Keywords

Protocols; Servers; Cloud computing; Cryptography; Data integrity; Outsourced storage; data integrity; blockchain; smart contract; cryptocurrency

Funding

  1. National Key R&D Program of China [2017YFB0802000]
  2. National Natural Science Foundation of China [61872229, 61671377, U19B2021]
  3. Key Research and Development Program of Shaanxi [2020ZDLGY09-06]
  4. Basic Research Program of Qinghai Province [2020-ZJ-701]

Ask authors/readers for more resources

Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data owners lose their physical control over the remote-stored data. Existing provable data possession protocols are overwhelmingly designed for centralized storage such as cloud, in which the server is assumed dishonest but the client is reliable. Moreover, the centralized storage suffers single-point-of-failure threat. In this paper, to deal with these issues, we propose the notion of IntegrityChain, a decentralized storage framework supporting provable data possession (PDP) based on blockchain. We formalize the system model, in which a data owner can store files to the peers in a blockchain network and check the integrity of the outsourced data periodically by paying some cryptocurrencies while the hosts can earn money if honestly provide storage service and will be punished by losing the pre-made deposit if data loss happens. In the security model, we consider the fairness in trading between a host and a data user and the soundness of the underlying decentralized PDP in this system. We come up with a concrete construction by borrowing the idea of multi-replica PDP and proof-of-retrievability and present the security analysis of the proposal. The evaluation for the construction contain two segments: the offchain part, in which we implement the algorithms locally to test the time consumption, and onchain part, in which we program a smart contract and launch it in a test network to test the gas cost for the functions.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available