{"title":"基于属性的分层关键词审计与智能合约辅助下的批量故障定位","authors":"Jingting Xue;Shuqin Luo;Fagen Li;Wenzheng Zhang;Liang Liu;Yu Zhou;Xiaojun Zhang","doi":"10.1109/TCC.2024.3452324","DOIUrl":null,"url":null,"abstract":"Keyword-based auditing (KA) provides a means for users to verify the integrity of only the outsourced data they are interested in. Existing KA schemes employ relation authentication labels to conduct targeted audits with keywords, which significantly improves the cost-effectiveness. However, such schemes typically support only a single-challenge scenario, which may not always be practical. To overcome this constraint, we introduce a hierarchical challenge mechanism grounded in user attributes. This mechanism leverages inequality and affiliation relationships to comply with a predefined tree structure for access policies. Incorporated during the challenge-response phase of the auditing model, it permits users to initiate cross-challenges. Expanding upon this hierarchical mechanism, we propose an attribute-based hierarchical keyword auditing scheme, abbreviated as \n<inline-formula><tex-math>$\\mathcal{AHKA}$</tex-math></inline-formula>\n. \n<inline-formula><tex-math>$\\mathcal{AHKA}$</tex-math></inline-formula>\n combines searchable encryption to conduct cross-targeted audits and benefits from the hash collision mapping of Bloom filters to safeguard against keyword guessing attacks. Moreover, we design a fault localization algorithm based on a variant of the binary search technique. It locates in batch the faulty cloud servers and damaged data blocks after an audit failure. As an integral part of \n<inline-formula><tex-math>$\\mathcal{AHKA}$</tex-math></inline-formula>\n, the algorithm significantly enhances our scheme's practicability. Security analyses indicate that \n<inline-formula><tex-math>$\\mathcal{AHKA}$</tex-math></inline-formula>\n can effectively withstand both forgery and replace attacks on audit proofs. The smart contract component ensures that our scheme's processes can be monitored and regulated. Experimental data corroborate that deploying \n<inline-formula><tex-math>$\\mathcal{AHKA}$</tex-math></inline-formula>\n on the client side and on the blockchain is both efficient and feasible.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":"12 4","pages":"1232-1247"},"PeriodicalIF":5.3000,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attribute-Based Hierarchical Keyword Auditing With Batch Fault Localization Assisted by Smart Contracts\",\"authors\":\"Jingting Xue;Shuqin Luo;Fagen Li;Wenzheng Zhang;Liang Liu;Yu Zhou;Xiaojun Zhang\",\"doi\":\"10.1109/TCC.2024.3452324\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Keyword-based auditing (KA) provides a means for users to verify the integrity of only the outsourced data they are interested in. Existing KA schemes employ relation authentication labels to conduct targeted audits with keywords, which significantly improves the cost-effectiveness. However, such schemes typically support only a single-challenge scenario, which may not always be practical. To overcome this constraint, we introduce a hierarchical challenge mechanism grounded in user attributes. This mechanism leverages inequality and affiliation relationships to comply with a predefined tree structure for access policies. Incorporated during the challenge-response phase of the auditing model, it permits users to initiate cross-challenges. Expanding upon this hierarchical mechanism, we propose an attribute-based hierarchical keyword auditing scheme, abbreviated as \\n<inline-formula><tex-math>$\\\\mathcal{AHKA}$</tex-math></inline-formula>\\n. \\n<inline-formula><tex-math>$\\\\mathcal{AHKA}$</tex-math></inline-formula>\\n combines searchable encryption to conduct cross-targeted audits and benefits from the hash collision mapping of Bloom filters to safeguard against keyword guessing attacks. Moreover, we design a fault localization algorithm based on a variant of the binary search technique. It locates in batch the faulty cloud servers and damaged data blocks after an audit failure. As an integral part of \\n<inline-formula><tex-math>$\\\\mathcal{AHKA}$</tex-math></inline-formula>\\n, the algorithm significantly enhances our scheme's practicability. Security analyses indicate that \\n<inline-formula><tex-math>$\\\\mathcal{AHKA}$</tex-math></inline-formula>\\n can effectively withstand both forgery and replace attacks on audit proofs. The smart contract component ensures that our scheme's processes can be monitored and regulated. Experimental data corroborate that deploying \\n<inline-formula><tex-math>$\\\\mathcal{AHKA}$</tex-math></inline-formula>\\n on the client side and on the blockchain is both efficient and feasible.\",\"PeriodicalId\":13202,\"journal\":{\"name\":\"IEEE Transactions on Cloud Computing\",\"volume\":\"12 4\",\"pages\":\"1232-1247\"},\"PeriodicalIF\":5.3000,\"publicationDate\":\"2024-08-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cloud Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10660487/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cloud Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10660487/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Attribute-Based Hierarchical Keyword Auditing With Batch Fault Localization Assisted by Smart Contracts
Keyword-based auditing (KA) provides a means for users to verify the integrity of only the outsourced data they are interested in. Existing KA schemes employ relation authentication labels to conduct targeted audits with keywords, which significantly improves the cost-effectiveness. However, such schemes typically support only a single-challenge scenario, which may not always be practical. To overcome this constraint, we introduce a hierarchical challenge mechanism grounded in user attributes. This mechanism leverages inequality and affiliation relationships to comply with a predefined tree structure for access policies. Incorporated during the challenge-response phase of the auditing model, it permits users to initiate cross-challenges. Expanding upon this hierarchical mechanism, we propose an attribute-based hierarchical keyword auditing scheme, abbreviated as
$\mathcal{AHKA}$
.
$\mathcal{AHKA}$
combines searchable encryption to conduct cross-targeted audits and benefits from the hash collision mapping of Bloom filters to safeguard against keyword guessing attacks. Moreover, we design a fault localization algorithm based on a variant of the binary search technique. It locates in batch the faulty cloud servers and damaged data blocks after an audit failure. As an integral part of
$\mathcal{AHKA}$
, the algorithm significantly enhances our scheme's practicability. Security analyses indicate that
$\mathcal{AHKA}$
can effectively withstand both forgery and replace attacks on audit proofs. The smart contract component ensures that our scheme's processes can be monitored and regulated. Experimental data corroborate that deploying
$\mathcal{AHKA}$
on the client side and on the blockchain is both efficient and feasible.
期刊介绍:
The IEEE Transactions on Cloud Computing (TCC) is dedicated to the multidisciplinary field of cloud computing. It is committed to the publication of articles that present innovative research ideas, application results, and case studies in cloud computing, focusing on key technical issues related to theory, algorithms, systems, applications, and performance.