ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2018, Vol. 55 ›› Issue (10): 2199-2207.doi: 10.7544/issn1000-1239.2018.20180436

所属专题: 2018分布式安全与区块链技术研究专题

• 信息安全 • 上一篇    下一篇



  1. 1(桂林电子科技大学计算机与信息安全学院 广西桂林 541004);2(广州大学数学与信息科学学院 广州 510006) (
  • 出版日期: 2018-10-01
  • 基金资助: 
    国家自然科学基金项目(61662016, 61772147);广东自然科学基金基础研究重大项目(2015A030308016);广东教育厅科研团队项目(2015KCXTD014);广州市教育局协同创新重大项目(1201610005);国家密码发展基金(MMJJ20170117);桂林电子科技大学优秀研究生论文培优计划(16YJPYSS14);桂林电子科技大学研究生创新项目(2018YJCX50)

Blockchain-Based Verification Scheme for Deletion Operation in Cloud

Liu Yining1, Zhou Yuanjian1, Lan Rushi1, Tang Chunming2   

  1. 1(School of Computer and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi 541004);2(School of Mathematics and Information Science, Guangzhou University, Guangzhou 510006)
  • Online: 2018-10-01

摘要: 云服务器可以为用户提供任何时间、任何地点的服务,并极大地降低用户成本,提高使用的便利性,如今越来越多的用户将自己的数据存储在云服务器.然而,关于云存储中的安全问题不时得到披露,影响到用户对云存储的信任,因此必须足够重视云存储及云服务中的安全问题.例如未经身份验证的用户不可以访问云服务器,云服务器不按用户的要求删除数据应该能被发现并惩罚.为了解决这些问题,提出了一种基于区块链的云数据删除验证协议.首先,用户通过调用智能合约向云服务器证明自己的身份,并且创建数据删除的请求交易,然后云服务器删除数据并生成一条嵌有删除证据的区块链(证据链).无论云服务器是否恶意,用户都可以验证数据删除结果.安全性分析表明:提出的协议可以在没有第三方可信机构的情况下完成数据的公开验证,同时可以抵抗窃听攻击、假冒攻击等.

关键词: 云服务器, 公开验证, 区块链, 数据删除, 智能合约

Abstract: Nowadays, more and more users upload their data to the cloud server, since the cloud can provide the service for users any time and at any place. Therefore, the cloud service facilitates the data usability and reduces the cost. However, the information leakage accidents have been reported frequently over the world, that is to say the cloud server is not fully trusted, and the security issue in cloud service must be paid enough attention. For example, illegal user may want to access the cloud server, and perhaps the cloud server does not delete the data according the user’s requirement. In order to address these concerns, a verification scheme for deletion operation in cloud is presented using block-chain technology, which can make the deletion operation more transparent. In our scheme, the user calls the smart contract to prove his identity to the cloud server, and creates the request transaction for data deletion; then the cloud server deletes the data and generates a block chain with the evidence (evidence chain). Even if the cloud server is dishonest, the user can still verify the data deletion result. Moreover, the proposed scheme is analyzed to really achieve the public verification of data without the third-party trusted organization, the impersonation attacks resistance, and the eavesdropping attacks resistance, etc.

Key words: cloud server, public verification, blockchain, data deletion, smart contract