Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Cloud data auditing scheme based on voting and Ethereum smart contracts
He HUANG, Yu JIN
Journal of Computer Applications    2024, 44 (7): 2093-2101.   DOI: 10.11772/j.issn.1001-9081.2023071036
Abstract228)   HTML11)    PDF (2265KB)(103)       Save

Ensuring cloud data integrity has become a security challenge that needs to be solved immediately. Widely-utilized blockchain technology provides a suitable solution to deal with this security challenge. The existing schemes combining blockchain and smart contract technology in which miners perform auditing validation work, suffer from low auditing efficiency, high communication overhead, and heavy auditing burden on Data Owner (DO). In response to the above issues, a Cloud data Auditing Scheme based on Voting mechanism and Ethereum smart Contracts (CASVEC) was proposed. Firstly, a Decentralized Autonomous Organization (DAO) was designed and deployed on Ethereum by combining voting mechanism and smart contract technology. The nodes of DAO voted to elect an auditing node to replace miners for the auditing verification work, effectively solving the defect of low efficiency in validation audit proof phase. Besides, reputation value was designed to ensure fairness and reliability of the voting process. Secondly, only a few on-chain resources were used to store final auditing results to reduce data volume during communication process, thus effectively solving the problem of high communication overhead in validation audit proof phase. Furthermore, DO only needed to delegate one audit request and retrieve final audit result from DAO. In the above process, DO had no need to call smart contracts so frequently to exchange related information, lightening the auditing burden of DO. Finally, from the theoretical analysis and experimental result perspectives, it was verified that compared with current blockchain-based cloud auditing schemes, CASVEC can significantly reduce time overhead and communication overhead of validation audit proof phase, as well as DO time overhead of audit phase.

Table and Figures | Reference | Related Articles | Metrics
Distributed secret share distribution scheme based on threshold warrant certificates
He HUANG Ya-di WANG Ji-hong WANG Heng-jun WANG
Journal of Computer Applications   
Abstract1701)      PDF (588KB)(1052)       Save
Ad Hoc network often supplies reliable authentication service for nodes by distributed certificate authority authentication model due to its dynamic topology and other characteristics; however, the problem of secure auditing is not solved by existing schemes. Therefore, a distributed secret share distribution scheme was put forward based on threshold warrant certificates, which carried out strict auditing towards the nodes that applied for secret shares, and could effectively withstand several malicious nodes working together to recover the secret key of system, and make sure that only the credible and high-quality-service nodes were able to gain the secret shares. In the end, the security and success probability of the scheme were analyzed in theory, and its effectiveness was confirmed by simulations.
Related Articles | Metrics
Quantitative grading method for ceramic tile color difference based on improved FENet
YU Songsen, HE Huang, XUE Guopeng, CUI Hengtuo
Journal of Computer Applications    DOI: 10.11772/j.issn.1001-9081.2025030361
Online available: 16 June 2025