2,444
Views
5
CrossRef citations to date
0
Altmetric
Articles

Blockchain-based cross-user data shared auditing

, , &
Pages 83-103 | Received 27 Apr 2021, Accepted 12 Jul 2021, Published online: 26 Jul 2021

References

  • Abdalla, M., & Pointcheval, D. (2005). Simple password-based encrypted key exchange protocols. Cryptographers' Track at the RSA Conference (pp. 191–208). Berlin Heidelberg: Springer.
  • Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS2007 (pp. 598–609). Virginia: ACM.
  • Bellare, M., Keelveedhi, S., & Ristenpart, T. (2013). Message-locked encryption and secure deduplication. Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 296–312). Berlin Heidelberg: Springer.
  • Chen, W., Zheng, Z., Ma, M., Wu, J., Zhou, Y., & Yao, J. (2020). Dependence structure between Bitcoin price and its influence factors. International Journal of Computational Science and Engineering, 21(3), 334–345. https://doi.org/10.1504/IJCSE.2020.106058
  • Douceur, J. R., Adya, A., Bolosky, W. J., Simon, P., & Theimer, M. (2002). Reclaiming space from duplicate files in a serverless distributed file system. Proceedings 22nd International Conference on Distributed Computing Systems (pp. 617–624). Vienna: IEEE.
  • Juels, A., & Kaliski Jr, B. S. (2007). PORs: Proofs of retrievability for large files. Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS'07 (pp. 584–597). Virginia: ACM.
  • Li, J., Chen, X., Li, M., Li, J., Lee, P. P., & Lou, W. (2013). Secure deduplication with efficient and reliable convergent key management. IEEE Transactions on Parallel and Distributed Systems, 25(6), 1615–1625. https://doi.org/10.1109/TPDS.2013.284
  • Li, J., Li, J., Xie, D., & Cai, Z. (2015). Secure auditing and deduplicating data in cloud. IEEE Transactions on Computers, 65(8), 2386–2396. https://doi.org/10.1109/TC.2015.2389960
  • Li, J., Yu, Y., Hu, S., Shi, Y., Zhao, S., & Zhang, C. (2021). A blockchain-based authority management framework in traceability systems. International Journal of Computational Science and Engineering, 24(1), 42–54. https://doi.org/10.1504/IJCSE.2021.113639
  • Liu, J., Asokan, N., & Pinkas, B. (2015). Secure deduplication of encrypted data without additional independent servers. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (pp. 874–885). Virginia: ACM.
  • Liu, X., Sun, W., Lou, W., Pei, Q., & Zhang, Y. (2017). One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage. IEEE Infocom 2017-IEEE Conference on Computer Communications (pp. 1–9). Atlanta, GA: IEEE.
  • Miao, M., Tian, G., & Susilo, W. (2021). New proofs of ownership for efficient data deduplication in the adversarial conspiracy model. International Journal of Intelligent Systems, 36(6), 2753–2766. https://doi.org/10.1002/int.22400
  • Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https://pdos.csail.mit.edu/6.824/papers/bitcoin.pdf.
  • Reinsel, D., Gantz, J., & Rydning, J. (2018). Data age 2025: The digitization of the world from edge to core. IDC White Paper 1–29.
  • Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. International Conference on the Theory and Application of Cryptology and Information Security (pp. 90–107). Berlin Heidelberg: Springer.
  • Shah, M. A., Baker, M., Mogul, J. C., & Swaminathan, R. (2007). Auditing to keep online storage services honest. Proceedings of the 11th USENIX workshop on Hot topics in operating systems (pp. 1–6) ACM. https://www.usenix.org/legacy/events/hotos07/tech/full_papers/shah/shah.pdf
  • Shen, J., Guo, F., Chen, X., & Susilo, W. (2020). Secure cloud auditing with efficient ownership transfer. European Symposium on Research in Computer Security (pp. 611–631). Cham: Springer.
  • Shen, J., Shen, J., Chen, X., Huang, X., & Susilo, W. (2017). An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Transactions on Information Forensics and Security, 12(10), 2402–2415. https://doi.org/10.1109/TIFS.2017.2705620
  • Tian, G., Ma, H., Xie, Y., & Liu, Z. (2020). Randomized deduplication with ownership management and data sharing in cloud storage. Journal of Information Security and Applications, 51(5), 1–9. https://doi.org/10.1016/j.jisa.2019.102432
  • Wang, H. (2012). Proxy provable data possession in public clouds. IEEE Transactions on Services Computing, 6(4), 551–559. https://doi.org/10.1109/TSC.2012.35
  • Wang, J., Chen, X., Huang, X., You, I., & Xiang, Y. (2015). Verifiable auditing for outsourced database in cloud computing. IEEE Transactions on Computers, 64(11), 3293–3303. https://doi.org/10.1109/TC.2015.2401036
  • Wang, C., Chow, S. S., Wang, Q., Ren, K., & Lou, W. (2011). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375. https://doi.org/10.1109/TC.2011.245
  • Wang, C., Wang, Q., Ren, K., & Lou, W. (2010). Privacy-preserving public auditing for data storage security in cloud computing. 2010 Proceedings IEEE Infocom (pp. 1–9). San Diego, CA: IEEE.
  • Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 151(2014), 1–32. https://www.allcryptowhitepapers.com/wp-content/uploads/2018/05/Ethereum-Whitepaper.pdf
  • Wu, X., Gao, J., Ji, G., Wu, T., Tian, Y., & Al-Nabhan, N. (2020). A feature-based intelligent deduplication compression system with extreme resemblance detection. Connection Science, 1–29. https://doi.org/10.1080/09540091.2020.1862058
  • Xiao, T., Han, D., He, J., Li, K. C., & de Mello, R. F. (2021). Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, 33(1), 95–112. https://doi.org/10.1080/09540091.2020.1753175
  • Xie, Y., Tian, G., Yuan, H., Jiang, C., & Wang, J. (2020). Client-side ciphertext deduplication scheme with flexible access control. International Journal of Computational Science and Engineering, 23(2), 145–157. https://doi.org/10.1504/IJCSE.2020.110537
  • Xu, Y., Zhang, C., Wang, G., Qin, Z., & Zeng, Q. (2020). A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Transactions on Emerging Topics in Computing, https://doi.org/10.1109/TETC.2020.3005610.
  • Yuan, H., Chen, X., Wang, J., Yuan, J., Yan, H., & Susilo, W. (2020). Blockchain-based public auditing and secure deduplication with fair arbitration. Information Sciences, 541(9), 409–425. https://doi.org/10.1016/j.ins.2020.07.005
  • Yuan, J., & Yu, S. (2013). Secure and constant cost public cloud storage auditing with deduplication. 2013 IEEE Conference on Communications and Network Security (CNS) (pp. 145–153). National Harbor, MD: IEEE.
  • Yuan, J., & Yu, S. (2015). Public integrity auditing for dynamic data sharing with multiuser modification. IEEE Transactions on Information Forensics and Security, 10(8), 1717–1726. https://doi.org/10.1109/TIFS.10206
  • Zhang, S., Yao, T., Arthur Sandor, V. K., Weng, T. H., Liang, W., & Su, J. (2020). A novel blockchain-based privacy-preserving framework for online social networks. Connection Science, 1–21. https://doi.org/10.1080/09540091.2020.1854181
  • Zheng, Q., & Xu, S. (2012). Secure and efficient proof of storage with deduplication. Proceedings of the Second ACM Conference on Data and Application Security and Privacy (pp. 1–12). Texas: ACM.