期刊文献+

基于智能合约的工业互联网数据公开审计方案 被引量:2

Public Auditing Scheme for Industrial Internet Data Based on Smart Contracts
下载PDF
导出
摘要 随着工业互联网产生的数据量日益增加,越来越多的企业选择将工业互联网数据外包存储在云服务器上以节省存储开销.为了防止外包存储的数据被篡改或删除,企业需要定期对其进行审计.提出了一种基于智能合约的工业互联网数据公开审计方案.该方案基于博弈论的思想,设计了一系列智能合约,以高效地抵抗参与者恶意行为.与现有抗合谋的公开审计方案相比,该方案不依赖于复杂的密码学工具实现对参与者恶意行为的抵抗,使得其更为高效,进而能够更好地应用于海量且频繁更新的工业互联网数据场景中.特别地,所设计的博弈合约作为一种独立的工具,能够与现有的公开审计方案有效结合,在不降低其审计效率的同时,增加方案的安全性.在本地环境和以太坊公有测试链Ropsten上对博弈合约以及整体方案进行了一系列的测试,结果表明,所设计的合约运行花费低且对运行环境适应性强,对原有完整性审计方案的效率影响小;同时,与其他抗审计者恶意行为的完整性方案相比,该方案更为高效. As the amount of data generated by the Industrial Internet grows, more and more companies are choosing to outsource the storage for their Industrial Internet data to cloud servers to save storage costs. To prevent the outsourced data from being tampered or deleted, companies need to audit the data integrity regularly. This study proposes a public auditing scheme for Industrial Internet data based on smart contracts. Particularly, a series of game-theory based smart contracts are designed which can efficiently mitigate malicious participators including the third-party auditor and the cloud server. Compared to existing collusion-resistant public auditing schemes, the proposed scheme does not rely on complex cryptographic tools to achieve resistance to participant malicious behavior, and thu s is more efficient and suitable to Industrial Internet applications where huge amount of data need to be frequently updated. Specifica lly, the game-based contract designed in this study as an individual solution, can be effectively combined with existing publi c auditing schemes to turn out a public auditing scheme with better security without losing efficiency. Finally, a series of tests are conducted on the proposed contract in the local environment and Ropsten, the common test chain for Ethereum. The results show that the designed contract is cheap to run and adaptable to the operating environment, has little impact on the efficiency of the original integrity audit soluti on, and is more efficient than other integrity schemes that resist the malicious behavior of auditors.
作者 李涛 杨安家 翁健 郭梓繁 LI Tao;YANG An-Jia;WENG Jian;GUO Zi-Fan(College of Cyber Security,Jinan University,Guangzhou 510632,China;National Joint Engineering Research Center of Network Security Detection and Protection Technology(Jinan University),Guangzhou 510632,China;Guangdong Provincial Key Laboratory of Data Security and Privacy Protection(Jinan University),Guangzhou,510632,China)
出处 《软件学报》 EI CSCD 北大核心 2023年第3期1491-1511,共21页 Journal of Software
基金 广东省重点领域研发计划(2020B0101360001) 国家重点研发计划(2021ZD0112802,2020YFB1005600,2017YFB0802200,2018YFB100370) 国家自然科学基金(62072215,U1736203,61825203)。
关键词 工业互联网 云存储 公开审计 智能合约 博弈论 industrial Internet cloud storage public auditing smart contract game theory
  • 相关文献

参考文献4

二级参考文献42

  • 1刘苍劲.知识经济的兴起和应采取的对策[J].北京大学学报(哲学社会科学版),1998,35(4):83-89. 被引量:19
  • 2Ren K, Wang C, Wang Q, Yu J. Research progress of data security in cloud computing. In: China Cryptography Development Report 2013. Beijing: China Quality Inspection Press, 2014 : 71 -94. 被引量:1
  • 3Armbrust M, Fox A, Griffith R, Joseph A. D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010, 53 (4) :50-58 . [doi:10.1145/1721654.1721672]. 被引量:1
  • 4Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D. Provable data possession at untrusted stores. In: Proc. of the ACM CCS. 2007. 598-609. [doi: 10.1145/1315245.1315318. 被引量:1
  • 5Wang BY, Li BC, Li H. Oruta: Privacy-Preserving public auditing for shared data in the cloud. In: Proc. of the IEEE Cloud. 2012. 295-302. [doi: 10.1109/CLOUD.2012.46. 被引量:1
  • 6Ren K, Wang C, Wang Q. Security challenges for the public cloud. IEEE Internet Computing, 2012, 16 (1) :69-73 . [doi:10.1109/MIC.2012.14]. 被引量:1
  • 7Song D, Shi E, Fischer I, Shankar U. Cloud data protection for the masses. IEEE Computer, 2012,45 (1) :39-45 . [doi:10.1109/MC.2012.1]. 被引量:1
  • 8Wang C, Chow SMS, Wang Q, Ren K, Lou WJ. Privacy-Preserving public auditing for secure cloud storage. IEEE Trans. on Computers, 2013, 62 (2) :362-375 . [doi:10.1109/TC.2011.245]. 被引量:1
  • 9Wang Q, Wang C, Ren K, Lou WJ, Li J. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. on Parallel and Distributed Systems, 2011, 22 (5) :847-859 . [doi:10.1109/TPDS.2010.183]. 被引量:1
  • 10Singh R, Kumar S, Agrahari SK. Ensuring data storage security in cloud computing. Int'l Journal of Engineering and Computer Science, 2012 :2319-7242 . 被引量:1

共引文献117

同被引文献17

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部