An Efficient and Scalable Auditing Scheme for Cloud Data Storage using an Enhanced B-tree (2401.08953v1)
Abstract: An efficient, scalable, and provably secure dynamic auditing scheme is highly desirable in the cloud storage environment for verifying the integrity of the outsourced data. Most of the existing work on remote integrity checking focuses on static archival data and therefore cannot be applied to cases where dynamic data updates are more common. Additionally, existing auditing schemes suffer from performance bottlenecks and scalability issues. To address these issues, in this paper, we present a novel dynamic auditing scheme for centralized cloud environments leveraging an enhanced version of the B-tree. Our proposed scheme achieves the immutable characteristic of a decentralized system (i.e., blockchain technology) while effectively addressing the synchronization and performance challenges of such systems. Unlike other static auditing schemes, our scheme supports dynamic insert, update, and delete operations. Also, by leveraging an enhanced B-tree, our scheme maintains a balanced tree after any alteration to a certain file, improving performance significantly. Experimental results show that our scheme outperforms both traditional Merkle Hash Tree-based centralized auditing and decentralized blockchain-based auditing schemes in terms of block modifications (e.g., insert, delete, update), block retrieval, and data verification time.
- K. D. Bowers, A. Juels, and A. Oprea, “Proofs of Retrievability: Theory and Implementation,” IACR Cryptology ePrint Archive, p. 175, 2008.
- G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, and D. X. Song, “Provable Data Possession at Untrusted Stores,” in Proc. of the ACM Conference on Computer and Communications Security, Oct. 2007, pp. 598–609.
- H. Shacham and B. Waters, “Compact proofs of retrievability,” Journal of cryptology, vol. 26, no. 3, pp. 442–483, 2013.
- G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and Efficient Provable Data Possession,” in Proc. of the SecureComm, 2008.
- Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling Public Verifiability and Data Dynamics for Storage Security,” in Proc. of the 14thsuperscript14𝑡ℎ14^{th}14 start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT European Conference on Research in Computer Security, 2009.
- Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, May 2011.
- C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, “Dynamic Provable Data Possession,” in Proc. of the 16thsuperscript16𝑡ℎ16^{th}16 start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT ACM Conference on Computer and Communications Security, 2009.
- K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 9, pp. 1717–1726, 2013.
- D. Comer, “Ubiquitous b-tree,” ACM Comput. Surv., vol. 11, no. 2, p. 121–137, Jun 1979.
- B.-K. Kim, G.-W. Kim, and D.-H. Lee, “A novel b-tree index with cascade memory nodes for improving sequential write performance on flash storage devices,” Applied Sciences, vol. 10, no. 3, 2020.
- J. Shen, J. Shen, X. Chen, X. Huang, and W. Susilo, “An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data,” IEEE Trans. Information Forensics and Security, vol. 12, no. 10, pp. 2402–2415, Oct. 2017.
- W. Shen, J. Qin, J. Yu, R. Hao, and J. Hu, “Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage,” IEEE Trans. Information Forensics and Security, vol. 14, no. 2, pp. 331–346, Feb. 2019.
- Y. Y. Zhang, C. W. J. Yu, R. Hao, and K. Ren, “Enabling efficient user revocation in identity-based cloud storage auditing for shared big data,” IEEE Transactions on Dependable and Secure computing, vol. 17, no. 3, pp. 608–619, 2018.
- T. W. J. Wu, Y. Li and Y. Ding, “Cpda: A confidentiality-preserving deduplication cloud storage with public cloud auditing,” IEEE Access, vol. 7, pp. 160 482–160 497, 2019.
- J. C. Y.Xu, S. Sun and H. Zhong, “Intrusion-resilient public cloud auditing scheme with authenticator update,” Information Sciences, vol. 512, pp. 616–628, 2020.
- S. P. J. Gudeme and R. Kandukuri, “Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage,” Computers & Security, vol. 103, p. 102176, 2021.
- A. Fu, S. Yu, Y. Zhang, H. Wang, and C. Huang, “Npp: A new privacy-aware public auditing scheme for cloud data sharing with group users,” IEEE Transactions on Big Data, vol. 8, no. 1, pp. 14–24, 2017.
- F. Casino, E. Politou, E. Alepis, and C. Patsakis, “Immutability and decentralized storage: An analysis of emerging threats,” IEEE Access, vol. 8, pp. 4737–4744, 2019.
- N. Garg and S. Bawa, “Rits-mht: relative indexed and time stamped merkle hash tree based data auditing protocol for cloud computing,” Journal of Network and Computer Applications, vol. 84, pp. 1–13, 2017.
- D. Tosh, S. Shetty, X. Liang, C. Kamhoua, and L. L. Njilla, “Data provenance in the cloud: A blockchain-based approach,” IEEE consumer electronics magazine, vol. 8, no. 4, pp. 38–44, 2019.
- H. Zhu, Y. Yuan, Y. Chen, Y. Zha, W. Xi, B. Jia, and Y. Xin, “A secure and efficient data integrity verification scheme for cloud-iot based on short signature,” IEEE Access, vol. 7, pp. 90 036–90 044, 2019.
- K. Zeng, “Publicly Verifiable Remote Data Integrity,” in Proc. of the 10thsuperscript10𝑡ℎ10^{th}10 start_POSTSUPERSCRIPT italic_t italic_h end_POSTSUPERSCRIPT International Conference on Information and Communications Security, Oct. 2008, pp. 419–434.
- H. Roh, S. Kim, D. Lee, and S. Park, “As b-tree: A study of an efficient b+-tree for ssds.” J. Inf. Sci. Eng., vol. 30, no. 1, pp. 85–106, 2014.
- H. Shafagh, L. Burkhalter, A. Hithnawi, and S. Duquennoy, “Towards blockchain-based auditable storage and sharing of iot data,” in Proceedings of the 2017 on cloud computing security workshop, 2017, pp. 45–50.
- J. Li, J. Wu, G. Jiang, and T. Srikanthan, “Blockchain-based public auditing for big data in cloud storage,” Information Processing & Management, vol. 57, no. 6, p. 102382, 2020.
- P. W. Abreu, M. Aparicio, and C. J. Costa, “Blockchain technology in the auditing environment,” in 2018 13th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2018, pp. 1–6.
- D. Francati, G. Ateniese, A. Faye, A. M. Milazzo, A. M. Perillo, L. Schiatti, and G. Giordano, “Audita: A blockchain-based auditing framework for off-chain storage,” in Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021, pp. 5–10.
- S. Xu, X. Cai, Y. Zhao, Z. Ren, L. Du, Q. Wang, and J. Zhou, “zkrpchain: Towards multi-party privacy-preserving data auditing for consortium blockchains based on zero-knowledge range proofs,” Future Generation Computer Systems, vol. 128, pp. 490–504, 2022.
- C. Zhang, Y. Xu, Y. Hu, J. Wu, J. Ren, and Y. Zhang, “A blockchain-based multi-cloud storage data auditing scheme to locate faults,” IEEE Transactions on Cloud Computing, vol. 10, no. 4, pp. 2252–2263, 2022.
- Z. Liu, S. Wang, S. Duan, L. Ren, and J. Wei, “Dynamic data integrity auditing based on hierarchical merkle hash tree in cloud storage,” Electronics, vol. 12, no. 3, p. 717, 2023.
- A. Gladston, A. Mohan, and R. Asfak, “Merkle tree and blockchain-based cloud data auditing,” International Journal of Cloud Applications and Computing (IJCAC), vol. 10, no. 3, pp. 54–66, 2020.
- D. Yue, R. Li, Y. Zhang, W. Tian, and Y. Huang, “Blockchain-based verification framework for data integrity in edge-cloud storage,” Journal of Parallel and Distributed Computing, vol. 146, pp. 1–14, 2020.