Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (6): 113-125.doi: 10.11959/j.issn.2096-109x.2021107
Special Issue: 区块链
• TopicⅡ: Blockchain Technology • Previous Articles Next Articles
Jiashun ZHOU, Na WANG, Xuehui DU
Revised:
2021-11-05
Online:
2021-12-15
Published:
2021-12-01
Supported by:
CLC Number:
Jiashun ZHOU, Na WANG, Xuehui DU. Multi-party efficient audit mechanism for data integrity based on blockchain[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 113-125.
"
方案 | 参与方 | 审计机构 | 多副本 | 确定性验证 | 公开验证 | 异构多数据 | 数据动态修改 | 验证历史检索 | 多方验证 | ||
文献[ | 多个DO | SP | TPA | TPA | NO | NO | YES | NO | YES | NO | NO |
文献[ | DO | SP | TPA | TPA | NO | NO | YES | NO | YES | NO | NO |
文献[ | DO | SP | DO | YES | NO | NO | NO | YES | NO | NO | |
文献[ | DO | SP | 多个TPA | 动态TPA | NO | NO | YES | NO | NO | YES | YES |
文献[ | DO | DU | SP | 智能合约 | NO | YES | NO | NO | NO | NO | YES |
文献[ | DO | SP | DO/SP/TPA | NO | NO | NO | NO | YES | NO | NO | |
文献[ | 多个DO | SP | 智能合约 | NO | NO | YES | NO | YES | NO | NO | |
本文方案 | 多个DO | 多个DU | 多个SP | 智能合约 | YES | YES | YES | YES | NO | YES | YES |
"
云服务器 | 用户 | 功能标识 |
server1 | DO_A | Peer1、Org1、Ca1、Kafka1、Zookeeper1、Orderer1 |
server2 | DO_B | Peer2、Org2、Ca2、Kafka2、Zookeeper2 |
server3 | DU_A | Peer3、Org3、Ca3、Kafka3、Zookeeper3、Orderer2 |
server4 | DU_B | Peer4、Org4、Ca4、Kafka4、Zookeeper4 |
server5 | SP_A | Peer5、Org5、Ca5、Kafka5、Zookeeper5、Orderer3 |
server6 | SP_B | Peer6、Org6、Ca6、Kafka6、Zookeeper6 |
[1] | AL-SAI Z A , ABUALIGAH L M . Big data and E-government:a review[C]// Proceedings of 2017 8th International Conference on Information Technology (ICIT). 2017: 580-587. |
[2] | ZUO W M , WANG C Y . Judicial big data and big-data-based legal research in China[J]. Asian Journal of Law and Society, 2020,7(3): 495-514. |
[3] | RAGHUPATHI W , RAGHUPATHI V . Big data analytics in healthcare:promise and potential[J]. Health Information Science and Systems, 2014,2:3. |
[4] | 谭霜, 贾焰, 韩伟红 . 云存储中的数据完整性证明研究及进展[J]. 计算机学报, 2015,38(1): 164-177. |
TAN S , JIA Y , HAN W H . Research and development of provable data integrity in cloud storage[J]. Chinese Journal of Computers, 2015,38(1): 164-177. | |
[5] | 魏凯敏, 翁健, 任奎 . 大数据安全保护技术综述[J]. 网络与信息安全学报, 2016,2(4): 1-11. |
WEI K M , WENG J , REN K . Data security and protection techniques in big data:a survey[J]. Chinese Journal of Network and Information Security, 2016,2(4): 1-11. | |
[6] | 蒋余浩 . 开放共享下的政务大数据管理机制创新[J]. 中国行政管理, 2017(8): 42-46. |
JIANG Y H . Open data through collaborative sharing:an essay on innovative mechanism of government big data management[J]. Chinese Public Administration, 2017(8): 42-46. | |
[7] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2009. |
[8] | DESWARTE Y , QUISQUATER J J , SA?DANE A , . Remote integrity checking[M]// Integrity and Internal Control in Information Systems VI. Boston: Kluwer Academic Publishers, 2003: 1-11. |
[9] | ATENIESE G , BURNS R , CURTMOLA R ,et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM conference on Computer and Communications Security. 2007: 598-609. |
[10] | WANG Q , WANG C , REN K ,et al. Enabling public auditability and data dynamics for storage security in cloud computing[C]// Proceedings of IEEE Transactions on Parallel and Distributed Systems. 2009: 847-859. |
[11] | 谢四江, 贾倍, 王鹤 ,等. 基于多分支路径树的云存储大数据完整性证明机制[J]. 计算机科学, 2019,46(3): 188-196. |
XIE S J , JIA B , WANG H ,et al. Cloud big data integrity verification scheme based on multi-branch Tree[J]. Computer Science, 2019,46(3): 188-196. | |
[12] | 刘洪宇, 丁奕文, 陈雷霆 . 支持动态操作的多副本数据完整性验证方案[J]. 计算机应用研究, 2019,36(9): 2778-2782. |
LIU H Y , DING Y W , CHEN L T . Multiple-replica data integrity checking protocol with efficient dynamic update in cloud storage[J]. Application Research of Computers, 2019,36(9): 2778-2782. | |
[13] | CURTMOLA R , KHAN O , BURNS R ,et al. MR-PDP:multiple-replica provable data possession[C]// Proceedings of 2008 The 28th International Conference on Distributed Computing Systems. 2008: 411-420. |
[14] | LU N , ZHANG Y X , SHI W B ,et al. A secure and scalable data integrity auditing scheme based on hyperledger fabric[J]. Computers & Security, 2020,92: 101741. |
[15] | HANG L , ULLAH I , KIM D H . A secure fish farm platform based on blockchain for agriculture data integrity[J]. Computers and Electronics in Agriculture, 2020,170: 105251. |
[16] | HANG L , KIM D H . Design and implementation of an integrated IoT blockchain platform for sensing data integrity[J]. Sensors (Basel,Switzerland), 2019,19(10): 2228. |
[17] | ALTULYAN M , YAO L N , KANHERE S S ,et al. A unified framework for data integrity protection in people-centric smart cities[J]. Multimedia Tools and Applications, 2020,79(7): 4989-5002. |
[18] | LIU B , YU X L , CHEN S P ,et al. Blockchain based data integrity service framework for IoT data[C]// Proceedings of 2017 IEEE International Conference on Web Services (ICWS). Piscataway:IEEE Press, 2017: 468-475. |
[19] | ZHAO Q Y , CHEN S Y , LIU Z L ,et al. Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems[J]. Information Processing & Management, 2020,57(6): 102355. |
[20] | WEI P C , WANG D H , ZHAO Y ,et al. Blockchain data-based cloud data integrity protection mechanism[J]. Future Generation Computer Systems, 2020,102: 902-911. |
[21] | 魏艳, 毛燕琴, 沈苏彬 . 一种基于区块链的数据完整性验证解决方案[J]. 计算机技术与发展, 2020,30(1): 76-81. |
WEI Y , MAO Y Q , SHEN S B . A data integrity verification solution based on Blockchain[J]. Computer Technology and Development, 2020,30(1): 76-81. | |
[22] | GAVIN W . Ethereum:A secure decentralized generalised transaction ledger[R]. Ethereum Project Yellow Paper, 2014. |
[23] | LIU C , YANG C , ZHANG X Y ,et al. External integrity verification for outsourced big data in cloud and IoT:a big picture[J]. Future Generation Computer Systems, 2015,49: 58-67. |
[24] | CHEN X Y , SHANG T , KIM I ,et al. A remote data integrity checking scheme for big data storage[C]// Proceedings of 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC). Piscataway:IEEE Press, 2017: 53-59. |
[25] | NASONOV D , VISHERATIN A A , BOUKHANOVSKY A . Blockchain-based transaction integrity in distributed big data marketplace[M]// Lecture Notes in Computer Science. Cham: Springer International Publishing, 2018: 569-577. |
[26] | LEBDAOUI I , EL HAJJI S , ORHANOU G . Managing big data integrity[C]// Proceedings of 2016 International Conference on Engineering & MIS (ICEMIS). Piscataway:IEEE Press, 2016: 1-6. |
[27] | BENET J . IPFS - content addressed,versioned,P2P file system[J]. arXiv:1407.3561, 2014. |
[28] | ANDROULAKI E , BARGER A , BORTNIKOV V ,et al. Hyperledger fabric:a distributed operating system for permissioned blockchains[C]// Proceedings of Proceedings of the Thirteenth EuroSys Conference. New York,NY,USA:ACM, 2018: 1-15. |
[29] | BONEH D , LYNN B , SHACHAM H . Short signatures from the Weil pairing[J]. Journal of Cryptology:the Journal of the International Association for Cryptologic Research, 2004,17(4): 297-319. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[3] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[4] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[5] | Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU. Network security of the National Natural Science Foundation of China: today and prospects [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101. |
[6] | Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG. Access control relationship prediction method based on GNN dual source learning [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 40-55. |
[7] | Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA. Proof of storage with corruption identification and recovery for dynamic group users [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 75-87. |
[8] | Chao MU, Xin WANG, Ming YANG, Heng ZHANG, Zhenya CHEN, Xiaoming WU. Hardcoded vulnerability detection approach for IoT device firmware [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 98-110. |
[9] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[10] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[11] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[12] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[13] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[14] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[15] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|