A Blockchain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Fault
ABSTARCT :
Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in multi-cloud storage to help users confirm the integrity of their outsourced data. Unfortunately, most of the corresponding schemes rely on trusted institutions such as the centralized third-party auditor (TPA) and the cloud service organizer, and it is difficult to identify malicious service providers after service disputes. Therefore, we present a blockchain-based multi-cloud storage data auditing scheme to protect data integrity and accurately arbitrate service disputes. We not only introduce the blockchain to record the interactions among users, service providers, and organizers in data auditing process as evidence, but also employ the smart contract to detect service dispute, so as to enforce the untrusted organizer to honestly identify malicious service providers. We also use the blockchain network and homomorphic verifiable tags to achieve the low-cost batch verification without TPA. Theoretical analyses and experiments reveal that the scheme is effective in multi-cloud environments and the cost is acceptable.
EXISTING SYSTEM :
? The procrastinating auditor also cannot be detected in the public verification schemes even though malicious auditors can be detected there.
? Implemented secure data storage with the help of blockchain based data storage. Provides the strongest security guarantee compared with existing schemes. A procrastinating auditor can detect the data corruption as soon as possible.
? The third party service providers and public auditor’sinteractions are overcome through unpredictability of block storage in a blockchain.
? Through this process, the computational and communication overheads are reduced. In this technique, the replicated information is stored in a cloud storage leads to a security issues.
DISADVANTAGE :
? To address this problem, a proof of retrievability (PoR) protocol and a provable data possession (PDP) protocol have been presented in 2007, respectively.
? The security of the protocol depends on the stability of the calculation of the Diffie–Hellman problem (CDHP) in the random oracle model (ROM).
? In other words, it is computationally feasible to solve the CDH problem or impossible to solve the CDH problem in a limited time.
? In other words, the attacker’s probability of success is to solve the discrete logarithm problem and factorization problem.
? However, the difficulty for him to achieve it is also equivalent to the difficulty of computing discrete logarithm problem.
PROPOSED SYSTEM :
• This proposed protocol performed well in terms of efficient dynamic support and reduced overhead.
• The key idea of the proposed work is, the public verification technique is that the data owner splits the data into multiple blocks and computes a signature for each block using double SHA 256 algorithm.
• This proposed blockchain based data storage restricts the behavior of third party auditors. Similarly the certificate-less public audit scheme increases efficiency of auditing process.
• Each transaction proposed in a blockchain is hashed together, and the hash pointers connect each block to the next block.
ADVANTAGE :
? Because cloud storage has superiorities of low cost, scalable, location-independent, and high performance, more and more individuals and businesses tend to outsource their data to the cloud.
? However, the lack of strict performance analysis has greatly affected the practical application of the scheme.
? Due to the limited capacity of blocks in the blockchain, only very important security information is considered to be stored in blocks; otherwise, the system performance will not be acceptable.
? Compared with other public auditing schemes, our scheme based on the self-certified public key system has been improved in storage overhead, communication bandwidth, and verification efficiency.
? Taking the security and efficiency into account, a novel public auditing scheme for cloud data is proposed in this paper based on a self-certified public key system.
|