Abstract

In the internet of things, user information is usually collected by all kinds of smart devices. The collected user information is stored in the cloud storage, and there is a risk of information leakage. In order to protect the security and the privacy of user information, the user and cloud provider will periodically execute a protocol called proof of retrievability scheme. A proof of retrievability scheme ensures the security of the data by generating proof to convince the user that the cloud provider does correctly store the user information. In this paper, we construct a proof of retrievability scheme using the blockchain technology. Using the advantage that the stored data cannot be tampered with in blockchain, this ensures the integrity of the data. Specifically, some related definitions, security models, and a blockchain-based construction of a proof of retrievability scheme are given. Then the validity and security of the scheme are proved later. As a result, user information can be protected by our scheme.

Highlights

  • With the information systems coming into our life, there are many user private information appliances such as surveillance cameras, smartwatches, smart door locks, and the online supermarket. ey provide a lot of convenience for our life

  • Due to the vulnerability of the cloud, user information could be attacked by hackers in information systems and can be stolen if the cloud storage provider is compromised

  • We focus on the proof of retrievability (PoR) and for the state-of-the-art of PoR, the reader is referred to [11,12,13,14,15,16,17,18,19,20,21,22,23,24,25]

Read more

Summary

Introduction

The schemes of PoR are under different settings and security models. E scheme in [25] is for the multiserver and dynamic data setting. We consider using blockchain technology to solve the problem of the trusted third party in the verification of the PoR scheme. We propose the first concrete PoR scheme based on blockchain. We demonstrate that the proposed scheme is provably secure in the new model.

Preliminaries
Security Model
Our PoR Scheme
Reasonableness
Traceability
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.