浏览全部资源
扫码关注微信
1. 兰州理工大学计算机与通信学院,甘肃 兰州 730050
2. 兰州理工大学经济与管理学院,甘肃 兰州 730050
3. 康考迪亚大学康考迪亚信息系统工程研究所,蒙特利尔 H3G 1M8
[ "冯涛(1970- ),男,甘肃临洮人,博士,兰州理工大学研究员、博士生导师,主要研究方向为网络与信息安全、区块链、工业互联网等" ]
[ "孔繁琪(1994- ),女,满族,辽宁沈阳人,兰州理工大学硕士生,主要研究方向为网络与信息安全、区块链、可验证计算等" ]
[ "柳春岩(1971- ),女,甘肃永靖人,兰州理工大学硕士生导师,主要研究方向为供应链管理等" ]
[ "马蓉(1992- ),女,甘肃兰州人,兰州理工大学博士生,主要研究方向为工业物联网中的安全多方计算和隐私保护等" ]
[ "Maher Albettar(1989- ),男,康考迪亚大学教授,主要研究方向为系统安全集成、建模、物联网和云计算" ]
网络出版日期:2021-12,
纸质出版日期:2021-12-25
移动端阅览
冯涛, 孔繁琪, 柳春岩, 等. 基于区块链的双重可验证云存储方案[J]. 通信学报, 2021,42(12):192-201.
Tao FENG, Fanqi KONG, Chunyan LIU, et al. Dual verifiable cloud storage scheme based on blockchain[J]. Journal on communications, 2021, 42(12): 192-201.
冯涛, 孔繁琪, 柳春岩, 等. 基于区块链的双重可验证云存储方案[J]. 通信学报, 2021,42(12):192-201. DOI: 10.11959/j.issn.1000-436x.2021225.
Tao FENG, Fanqi KONG, Chunyan LIU, et al. Dual verifiable cloud storage scheme based on blockchain[J]. Journal on communications, 2021, 42(12): 192-201. DOI: 10.11959/j.issn.1000-436x.2021225.
针对工业物联网(IIoT)中,工业设备将数据存储到云端,导致数据易被篡改且无法追踪恶意用户,引起恶性循环的问题,借助区块链的可溯源性和不可篡改性等特点,提出了一种基于区块链的双重可验证云存储方案。首先,使用同态加密技术加密数据并上传至云端,确保传输安全性,实现数据的隐私保护;其次,将聚合密文和上传者信息存储在区块链上,有效避免数据被非法用户篡改的风险,并能对恶意用户进行追溯,实现对云端数据完整性的双重验证;最后,进行安全性分析,证明所提方案比同类方案更加安全可靠。
In response to the problem that in the industrial Internet of things (IIoT), industrial equipment stored data in the cloud, causing data to be easily tampered with and unable to track malicious users, causing a vicious circle, with the help of the traceability and immutability of the blockchain, a dual verifiable cloud storage scheme based on the blockchain was proposed.Firstly, homomorphic encryption technology was used to encrypt data and upload it to the cloud , which ensured transmission security and realized data privacy protection.Secondly, the aggregated ciphertext and uploader information were stored on the blockchain, which could effectively avoid the risk of data being tampered with by illegal users, and could trace malicious users to achieve double verification of cloud data integrity.Finally, a safety analysis was carried out to prove that the proposed scheme is safer and more reliable than similar schemes.
YU Y , LIU S M , YEOH P L , et al . LayerChain:a hierarchical edge-cloud blockchain for large-scale low-delay industrial Internet of Things applications [J ] . IEEE Transactions on Industrial Informatics , 2021 , 17 ( 7 ): 5077 - 5086 .
LI H T , GUO F , WANG L L , et al . A blockchain-based public auditing protocol with self-certified public keys for cloud data [J ] . Security and Communication Networks , 2021 , 2021 : 1 - 10 .
薛锐 , 吴迎 , 刘牧华 , 等 . 可验证计算研究进展 [J ] . 中国科学:信息科学 , 2015 , 45 ( 11 ): 1370 - 1388 .
XUE R , WU Y , LIU M H , et al . Progress in verifiable computation [J ] . Scientia Sinica (Informationis) , 2015 , 45 ( 11 ): 1370 - 1388 .
NIGAM R , PATHAK R K , KUMAR A , et al . PCP framework to expose malware in devices [C ] // Proceedings of 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) . Piscataway:IEEE Press , 2020 : 1 - 6 .
杨亚涛 , 赵阳 , 张卷美 , 等 . 同态密码理论与应用进展 [J ] . 电子与信息学报 , 2021 ( 2 ): 475 - 487 .
YANG Y T , ZHAO Y , ZHANG J M , et al . Recent development of theory and application on homomorphic encryption [J ] . Journal of Electronics & Information Technology , 2021 ( 2 ): 475 - 487 .
CHANG J Y , JI Y Y , SHAO B L , et al . Certificateless homomorphic signature scheme for network coding [J ] . IEEE/ACM Transactions on Networking , 2020 , 28 ( 6 ): 2615 - 2628 .
CHAUM D , PEDERSEN T . Wallet databases with observers [C ] // Proceedings of Annual International Cryptology Conference . Berlin:Springer , 1993 : 89 - 105 .
LONE A H , NAAZ R . Demystifying cryptography behind blockchains and a vision for post-quantum blockchains [C ] // Proceedings of 2020 IEEE International Conference for Innovation in Technology (INOCON) . Piscataway:IEEE Press , 2020 : 1 - 6 .
WANG S P , ZHANG D , ZHANG Y L . Blockchain-based personal health records sharing scheme with data integrity verifiable [J ] . IEEE Access , 2019 , 7 : 102887 - 102901 .
GUO Y , ZHANG C , JIA X H . Verifiable and forward-secure encrypted search using blockchain techniques [C ] // Proceedings of ICC 2020 2020 IEEE International Conference on Communications (ICC) . Piscataway:IEEE Press , 2020 : 1 - 7 .
GUO R , ZHUANG C Y , SHI H X , et al . A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing [J ] . International Journal of Distributed Sensor Networks , 2020 , 16 ( 2 ): 155014772090679 .
DIMITRIOU T . Efficient,coercion-free and universally verifiable blockchain-based voting [J ] . Computer Networks , 2020 , 174 : 107234 .
WANG S P , ZHANG Y L , ZHANG Y L . A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems [J ] . IEEE Access , 2018 , 6 : 38437 - 38450 .
DORSALA M R , SASTRY V N , CHAPRAM S . Fair protocols for verifiable computations using bitcoin and Ethereum [C ] // Proceedings of 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) . Piscataway:IEEE Press , 2018 : 786 - 793 .
ZHANG Y H , DENG R H , SHU J G , et al . TKSE:trustworthy keyword search over encrypted data with two-side verifiability via blockchain [J ] . IEEE Access , 2018 , 6 : 31077 - 31087 .
YAO H L , WANG C F , HAI B , et al . Homomorphic hash and blockchain based authentication key exchange protocol for strangers [C ] // Proceedings of 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD) . Piscataway:IEEE Press , 2018 : 243 - 248 .
REN W , TONG X , DU J , et al . Privacy-preserving using homomorphic encryption in Mobile IoT systems [J ] . Computer Communications , 2021 , 165 : 105 - 111 .
WANG C , CHOW S S M , WANG Q , et al . Privacy-preserving public auditing for secure cloud storage [J ] . IEEE Transactions on Computers , 2013 , 62 ( 2 ): 362 - 375 .
BUCCAFURRI F , LAX G , NICOLAZZ S , et al . Range query integrity in cloud data streams with efficient insertion [C ] // International Conference on Cryptology and Network Security . Cham:Springer International Publishing , 2016 : 719 - 724 .
武朵朵 , 来齐齐 , 杨波 . 矩阵乘积的高效可验证安全外包计算 [J ] . 密码学报 , 2017 , 4 ( 4 ): 322 - 332 .
WU D D , LAI Q Q , YANG B . Efficient,verifiable and secure outsourcing of matrix multiplication [J ] . Journal of Cryptologic Research , 2017 , 4 ( 4 ): 322 - 332 .
SATHYA A , RAJA S K S . Privacy preservation-based access control intelligence for cloud data storage in smart healthcare infrastructure [J ] . Wireless Personal Communications , 2021 , 118 ( 4 ): 3595 - 3614 .
0
浏览量
583
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构