4.6 Article

A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage

期刊

IEEE ACCESS
卷 10, 期 -, 页码 105920-105929

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3211391

关键词

Blockchains; Data integrity; Cloud computing; Aggregates; Data models; Costs; Servers; Data security; Information security; Cloud computing security; data integrity; blockchain; data security

资金

  1. Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center

向作者/读者索取更多资源

This paper proposes an efficient data integrity verification scheme using blockchain technology, which solves the problems of traditional centralized verification methods and provides higher security and efficiency.
The cloud storage service provides the storage and access function for massive data, reducing the management cost for large amounts of data. The data integrity verification scheme in cloud storage can be employed to help users confirm the integrity of outsourced data. Although public data integrity verification schemes allow users to outsource data integrity verification to third-party auditor (TPA), there are still many problems with centralized TPA in terms of security and efficiency. In recent years, researchers have tried to apply blockchain technology to solve the centralization problem of traditional methods, but these schemes do not pay attention to the problem of efficiency degradation caused by the use of blockchain technology. This paper proposes an efficient data integrity verification scheme for multi-cloud storage services by using blockchain technology. The overall verification can verify the integrity of multiple CSPs, which solves the problems of low computational efficiency. Local verification can trace the source to the specific damaged CSP, which is more secure and reliable. In addition, this paper puts the data verification process directly in the blockchain for public execution and provides data integrity verification services without the assistance of any third-party audit platform, avoiding the security problems caused by untrusted TPA. Theoretical analysis and experiments verify the safety and effectiveness of the scheme.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据