{"title":"SESIV: Secure and efficient smart contract based integrity verification of outsourced data","authors":"Partha Sarathi Chakraborty, Somanath Tripathy","doi":"10.1016/j.jisa.2025.104121","DOIUrl":null,"url":null,"abstract":"<div><div>Securing remote data storage is a serious concern in cloud computing. Though it provides cost-saving benefits for data owners, it poses security risks due to losing physical control over data. As a result, ensuring data integrity through auditing services becomes essential while preserving privacy. Therefore, researchers propose many public data auditing schemes using third-party auditors to alleviate computational burdens on the user side. However, a concern in the public auditing approach is the susceptibility to malicious behaviour of third-party auditors, which might compromise the accuracy and timeliness of auditing results. Existing solutions built upon RSA signatures and bilinear pairings often incur substantial computation and communication costs, rendering their integrity verification models inefficient and impractical. Recent proposals have used blockchain technology for public auditing schemes to address these challenges. This work presents a secure and efficient privacy-preserving data integrity verification model using smart contract, for outsourced data. Further, we extend the proposed scheme to support multiple owners, batch integrity verification, and dynamic auditing. The proposed scheme leverages digital signatures and public-key cryptography to ensure data integrity and secure authentication. The key aspect of the proposed scheme is to validate data integrity with minimal computational overhead for the auditor with a verification time of 0.143 ms (independent of the number of shard messages <span><math><mi>n</mi></math></span> and number of challenge blocks <span><math><mi>c</mi></math></span>), which is 33.33% lower than that of WWH scheme. The security analysis and implementation result show that the proposed scheme is secure and efficient.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"93 ","pages":"Article 104121"},"PeriodicalIF":3.7000,"publicationDate":"2025-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625001589","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Securing remote data storage is a serious concern in cloud computing. Though it provides cost-saving benefits for data owners, it poses security risks due to losing physical control over data. As a result, ensuring data integrity through auditing services becomes essential while preserving privacy. Therefore, researchers propose many public data auditing schemes using third-party auditors to alleviate computational burdens on the user side. However, a concern in the public auditing approach is the susceptibility to malicious behaviour of third-party auditors, which might compromise the accuracy and timeliness of auditing results. Existing solutions built upon RSA signatures and bilinear pairings often incur substantial computation and communication costs, rendering their integrity verification models inefficient and impractical. Recent proposals have used blockchain technology for public auditing schemes to address these challenges. This work presents a secure and efficient privacy-preserving data integrity verification model using smart contract, for outsourced data. Further, we extend the proposed scheme to support multiple owners, batch integrity verification, and dynamic auditing. The proposed scheme leverages digital signatures and public-key cryptography to ensure data integrity and secure authentication. The key aspect of the proposed scheme is to validate data integrity with minimal computational overhead for the auditor with a verification time of 0.143 ms (independent of the number of shard messages and number of challenge blocks ), which is 33.33% lower than that of WWH scheme. The security analysis and implementation result show that the proposed scheme is secure and efficient.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.