Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (11): 3453-3462.DOI: 10.11772/j.issn.1001-9081.2024121835
• The 7th CCF China Conference on Blockchain Technology • Previous Articles
Tingting GAO1, Zhongyuan YAO1(
), Miao JIA1, Xueming SI1,2, Huanming TAN3, Yufeng ZHAN4
Received:2024-12-31
Revised:2025-01-07
Accepted:2025-01-16
Online:2025-04-02
Published:2025-11-10
Contact:
Zhongyuan YAO
About author:GAO Tingting, born in 2000, M. S. candidate. Her research interests include cryptology, blockchain.Supported by:
高婷婷1, 姚中原1(
), 贾淼1, 斯雪明1,2, 谭焕明3, 詹玉峰4
通讯作者:
姚中原
作者简介:高婷婷(2000—),女,甘肃平凉人,硕士研究生,主要研究方向:密码学、区块链基金资助:CLC Number:
Tingting GAO, Zhongyuan YAO, Miao JIA, Xueming SI, Huanming TAN, Yufeng ZHAN. Blockchain-based deduplication and data integrity audit scheme[J]. Journal of Computer Applications, 2025, 45(11): 3453-3462.
高婷婷, 姚中原, 贾淼, 斯雪明, 谭焕明, 詹玉峰. 基于区块链的重复数据删除和数据完整性审计方案[J]. 《计算机应用》唯一官方网站, 2025, 45(11): 3453-3462.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024121835
| 符号 | 含义 | 符号 | 含义 |
|---|---|---|---|
| λ | 安全参数 | Tr | 重复数据删除标签 |
| P | 系统参数 | C | 文件密文 |
| G | 乘法循环群 | Ck | 收敛密钥密文 |
| g | G的一个生成元 | N | 数据块个数 |
| q1,q2 | 2个大素数 | ci | 密文块 |
| φ(n) | 欧拉函数 | Vi | 承诺 |
| (e,n) | 公钥 | pi | 相对于承诺的证明 |
| (d,n) | 私钥 | IDDO | 用户身份标识 |
| N | 数据块个数 | Proof | 完整性证明 |
| chal | 挑战信息 | H1 | 生成收敛密钥的哈希函数 |
| H2 | 生成重复数据删除标签的 哈希函数 |
Tab. 1 Symbolic meaning
| 符号 | 含义 | 符号 | 含义 |
|---|---|---|---|
| λ | 安全参数 | Tr | 重复数据删除标签 |
| P | 系统参数 | C | 文件密文 |
| G | 乘法循环群 | Ck | 收敛密钥密文 |
| g | G的一个生成元 | N | 数据块个数 |
| q1,q2 | 2个大素数 | ci | 密文块 |
| φ(n) | 欧拉函数 | Vi | 承诺 |
| (e,n) | 公钥 | pi | 相对于承诺的证明 |
| (d,n) | 私钥 | IDDO | 用户身份标识 |
| N | 数据块个数 | Proof | 完整性证明 |
| chal | 挑战信息 | H1 | 生成收敛密钥的哈希函数 |
| H2 | 生成重复数据删除标签的 哈希函数 |
| 方案 | 第三方实体 | 存储 去重 | 收敛 加密 | PoW | 避免单点 失效 | 抵制 暴力攻击 | 抵制 合谋攻击 | 数据 完整性 | 密钥管理 |
|---|---|---|---|---|---|---|---|---|---|
| Wang等[ | IS | Y | CE | MHT | N | Y | N | Y | 密钥共享方法 |
| Li等[ | MapReduce+密钥服务器 | Y | CE | MHT | N | Y | N | Y | 密钥服务器 |
| BDACD[ | Blockchain | Y | CE | T-MHT | Y | Y | Y | Y | N |
| 本文方案 | Blockchain | Y | MLE | Verkle Tree | Y | Y | Y | Y | Blockchain |
Tab. 2 Comparison of different schemes
| 方案 | 第三方实体 | 存储 去重 | 收敛 加密 | PoW | 避免单点 失效 | 抵制 暴力攻击 | 抵制 合谋攻击 | 数据 完整性 | 密钥管理 |
|---|---|---|---|---|---|---|---|---|---|
| Wang等[ | IS | Y | CE | MHT | N | Y | N | Y | 密钥共享方法 |
| Li等[ | MapReduce+密钥服务器 | Y | CE | MHT | N | Y | N | Y | 密钥服务器 |
| BDACD[ | Blockchain | Y | CE | T-MHT | Y | Y | Y | Y | N |
| 本文方案 | Blockchain | Y | MLE | Verkle Tree | Y | Y | Y | Y | Blockchain |
| 文件大小/MB | 密钥生成时间/s | 文件大小/MB | 密钥生成时间/s |
|---|---|---|---|
| 3 | 1.7 | 12 | 7.0 |
| 6 | 3.6 | 15 | 8.8 |
| 9 | 5.2 |
Tab. 3 Generation time of convergence key
| 文件大小/MB | 密钥生成时间/s | 文件大小/MB | 密钥生成时间/s |
|---|---|---|---|
| 3 | 1.7 | 12 | 7.0 |
| 6 | 3.6 | 15 | 8.8 |
| 9 | 5.2 |
| [1] | ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609. |
| [2] | REINSEL D, GANTZ J, RYDNING J. The digitization of the world from edge to core[EB/OL]. [2024-03-24].. |
| [3] | WANG L, WANG B, SONG W, et al. A key-sharing based secure deduplication scheme in cloud storage[J]. Information Sciences, 2019, 504: 48-60. |
| [4] | ZHANG Y, SU H, YANG M, et al. Secure deduplication based on Rabin fingerprinting over wireless sensing data in cloud computing[J]. Security and Communication Networks, 2018, 2018: No.9081814. |
| [5] | KUSZMAUL J. Verkle trees[EB/OL]. [2024-09-04].. |
| [6] | GAO X, YU J, SHEN W T, et al. Achieving low-entropy secure cloud data auditing with file and authenticator deduplication[J]. Information Sciences, 2021, 546: 177-191. |
| [7] | HALEVI S, HARNIK D, PINKAS B, et al. Proofs of ownership in remote storage systems[C]// Proceedings of the 18th ACM Conference on Computer and Communications Security. New York: ACM, 2011: 491-500. |
| [8] | QI H, LI P, WANG C, et al. A hierarchical key management scheme for cross-domain secure deduplication[J]. Mobile Networks and Applications, 2023, 28(2): 473-485. |
| [9] | TANG X, GUO C, CHOO K K R, et al. A secure and lightweight cloud data deduplication scheme with efficient access control and key management[J]. Computer Communications, 2024, 222: 209-219. |
| [10] | 袁颖,朱洪亮,陈玉玲,等.基于数据持有性证明的完整性验证技术综述[J].计算机工程与应用,2019,55(18):1-7. |
| YUAN Y, ZHU H L, CHEN Y L, et al. Survey of data integrity verification technology based on provable data possession[J]. Computer Engineering and Applications, 2019, 55(18): 1-7. | |
| [11] | ZHANG F, WEN B, YAN Y, et al. Privacy protection multi-copy provable data possession supporting data reliability[C]// Proceedings of the 2023 International Conference on Blockchain and Trustworthy Systems, CCIS 1896. Singapore: Springer, 2024: 119-132. |
| [12] | ZHANG K, GUO Z, WANG L, et al. Revocable certificateless provable data possession with identity privacy in cloud storage[J]. Computer Standards and Interfaces, 2024, 90: No.103848. |
| [13] | 高婷婷,姚中原,贾淼,等.链上链下一致性保护技术综述[J]. 计算机应用,2024,44(12):3658-3668. |
| GAO T T, YAO Z Y, JIA M, et al. Overview of on-chain and off-chain consistency protection technologies[J]. Journal of Computer Applications, 2024, 44(12): 3658-3668. | |
| [14] | JUELS A, KALISKI B S, Jr. PORs: proofs of retrievability for large files[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 584-597. |
| [15] | TAN X, XIE Q, HAN L, et al. Proof of retrievability with flexible designated verification for cloud storage[J]. Computers and Security, 2023, 135: No.103486. |
| [16] | YUAN H, CHEN X, WANG J, et al. Blockchain-based public auditing and secure deduplication with fair arbitration[J]. Information Sciences, 2020, 541: 409-425. |
| [17] | XU Y, JIN C, QIN W, et al. BDACD: blockchain-based decentralized auditing supporting ciphertext deduplication[J]. Journal of Systems Architecture, 2024, 147: No.103053. |
| [18] | LIU S, YAO Y, TIAN G, et al. A blockchain-based compact audit-enabled deduplication in decentralized storage[J]. Computer Standards and Interfaces, 2023, 85: No.103718. |
| [19] | LI S, XU C, ZHANG Y, et al. Blockchain-based transparent integrity auditing and encrypted deduplication for cloud storage[J]. IEEE Transactions on Services Computing, 2023, 16(1): 134-146. |
| [20] | TIAN G, HU Y, WEI J, et al. Blockchain-based secure deduplication and shared auditing in decentralized storage[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(6): 3941-3954. |
| [21] | KWON H, HAHN C, KANG K, et al. Secure deduplication with reliable and revocable key management in fog computing[J]. Peer-to-Peer Networking and Applications, 2019, 12: 850-864. |
| [22] | KIM W B, LEE I Y. Survey on data deduplication in cloud storage environments[J]. Journal of Information Processing Systems, 2021, 17(3): 658-673. |
| [23] | 伍高飞,袁紫依,孙思贤,等.云数据安全去重技术研究综述[J].密码学报,2023,10(6):1099-1117. |
| WU G F, YUAN Z Y, SUN S X, et al. A survey on secure data deduplication techniques in cloud[J]. Journal of Cryptologic Research, 2023, 10(6): 1099-1117. | |
| [24] | BELLARE M, KEELVEEDHI S, RISTENPART T. Message-locked encryption and secure deduplication[C]// Proceedings of the 2013 International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 7881. Berlin: Springer, 2013: 296-312. |
| [25] | DI PIETRO R, SORNIOTTI A. Boosting efficiency and security in proof of ownership for deduplication[C]// Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2012: 81-82. |
| [26] | MIAO Y, GAI K, ZHU L, et al. Blockchain-based shared data integrity auditing and deduplication[J]. IEEE Transactions on Dependable and Secure Computing, 2024, 21(4): 3688-3703. |
| [27] | LI J W, LI J, XIE D, et al. Secure auditing and deduplicating data in cloud[J]. IEEE Transactions on Computers, 2016, 65(8): 2386-2396. |
| [1] | Sheping ZHAI, Pengju ZHU, Rui YANG, Jiayiteng LIU. Blockchain-based identity management system for internet of things [J]. Journal of Computer Applications, 2025, 45(9): 2873-2881. |
| [2] | Wei GAO, Lihua LIU, Bintao HE, Fang’an DENG. Research advances in blockchain consensus mechanisms and improvement algorithms [J]. Journal of Computer Applications, 2025, 45(9): 2848-2864. |
| [3] | Wei SHE, Tianxiang MA, Haige FENG, Zhao TIAN, Wei LIU. Blockchain covert communication method based on contract call concealment [J]. Journal of Computer Applications, 2025, 45(9): 2865-2872. |
| [4] | Di WANG. P-Dledger: blockchain edge node security architecture [J]. Journal of Computer Applications, 2025, 45(8): 2630-2636. |
| [5] | Haiyang PENG, Weixing JI, Fawang LIU. Blockchain-based data notarization model for autonomous driving simulation testing [J]. Journal of Computer Applications, 2025, 45(8): 2421-2427. |
| [6] | Shuo ZHANG, Guokai SUN, Yuan ZHUANG, Xiaoyu FENG, Jingzhi WANG. Dynamic detection method of eclipse attacks for blockchain node analysis [J]. Journal of Computer Applications, 2025, 45(8): 2428-2436. |
| [7] | Yuxuan CHEN, Haibin ZHENG, Zhenyu GUAN, Boheng SU, Yujue WANG, Zhenwei GUO. Blockchain sharding mechanism in asynchronous network based on HoneyBadgerBFT and DAG [J]. Journal of Computer Applications, 2025, 45(7): 2092-2100. |
| [8] | Li’e WANG, Caiyi LIN, Yongdong LI, Xingcheng FU, Xianxian LI. Digital content copyright protection and fair tracking scheme based on blockchain [J]. Journal of Computer Applications, 2025, 45(6): 1756-1765. |
| [9] | Xin SHAO, Zigang CHEN, Xingchun YANG, Haihua ZHU, Wenjun LUO, Long CHEN, Yousheng ZHOU. Vehicular digital evidence preservation and access control based on consortium blockchain [J]. Journal of Computer Applications, 2025, 45(6): 1902-1910. |
| [10] | Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI. Privacy protection method for consortium blockchain based on SM2 linkable ring signature [J]. Journal of Computer Applications, 2025, 45(5): 1564-1572. |
| [11] | Xiaojun ZHANG, Yunpu HAO, Lei LI, Chenyang LI, Ziyu ZHOU. Data tamper-proof batch auditing scheme based on industrial cloud storage systems [J]. Journal of Computer Applications, 2025, 45(3): 891-895. |
| [12] | Bimang SUN, Wunan WAN, Shibin ZHANG, Jinquan ZHANG. Multi-domain access control scheme in blockchain based on SM2 homomorphic encryption [J]. Journal of Computer Applications, 2025, 45(11): 3432-3439. |
| [13] | Mei TANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG. Survey of DDoS protection research based on blockchain [J]. Journal of Computer Applications, 2025, 45(11): 3416-3423. |
| [14] | Tingda SHEN, Konglin ZHU, Lin ZHANG. Semi-centralized cross-chain bridge design based on hash time lock and incentive mechanism [J]. Journal of Computer Applications, 2025, 45(11): 3440-3445. |
| [15] | Fei WANG, Hengdi WANG, Konglin ZHU, Lin ZHANG. Adaptive online blockchain sharding algorithm based on trusted execution environments [J]. Journal of Computer Applications, 2025, 45(11): 3424-3431. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||