• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023
Citation: Fu Yao, Li Qingdan, Zhang Zehui, Gao Tiegang. Data Integrity Verification Scheme for Privacy Protection and Fair Payment[J]. Journal of Computer Research and Development, 2022, 59(6): 1343-1355. DOI: 10.7544/issn1000-1239.20210023

Data Integrity Verification Scheme for Privacy Protection and Fair Payment

Funds: This work was supported by the National Science and Technology Major Project of China (2018YFB0204304) and the Key Project of the Natural Science Foundation of Tianjin (21JCZDJC00130).
More Information
  • Published Date: May 31, 2022
  • With the emergence of cloud storage, increasing users tend to migrate their data to cloud for management and maintenance, which can save time and money on the series of work. To ensure the integrity of data stored in the efficient yet unreliable cloud, data owners may adopt a data integrity verification model. In the pay-per-use cloud environment, data owners not only pay for the service to cloud server provider, but also pay an additional fee to the third party auditor (TPA) in order to perform verification operations. However, TPA is not always available in the actual, which makes the integrity of data become a potential vulnerability. In view of the untrustworthy of TPA and the realization of service-payment fairness, we propose a novel verification scheme for privacy protection and fair payment. Firstly, we introduce a novel type of data authentication structure—the rank-based Merkle Hash tree to realize the integrity verification of data index and support verifiable dynamic update of block. Secondly, in order to achieve privacy protection and reduce communication overhead, a non-interactive dynamic provable data possession is presented. Finally, combined with blockchain, smart contract is applied to achieve service-payment fairness among data owners, cloud storage server and TPA, so that all parties can act honestly according to the rules. Performance analysis and experiments show that the proposed scheme can effectively protect the privacy of user data, realize fair payment, and achieve lower computational cost and communication overhead of the entire system.
  • Related Articles

    [1]Zhang Huijuan, Huang Qinyang, Hu Shiyan, Yang Qing, Zhang Jingwei. Link Prediction Driven by High-Order Relations in Complete Graph[J]. Journal of Computer Research and Development, 2024, 61(7): 1825-1835. DOI: 10.7544/issn1000-1239.202221045
    [2]Wang Peiyan, Duan Lei, Guo Zhengshan, Jiang Weipeng, Zhang Yidan. Knowledge Hypergraph Link Prediction Model Based on Tensor Decomposition[J]. Journal of Computer Research and Development, 2021, 58(8): 1599-1611. DOI: 10.7544/issn1000-1239.2021.20210315
    [3]Luo Hao, Yan Guanghui, Zhang Meng, Bao Junbo, Li Juncheng, Liu Ting, Yang Bo, Wei Jun. Research on Node Importance Fused Multi-Information for Multi-Relational Social Networks[J]. Journal of Computer Research and Development, 2020, 57(5): 954-970. DOI: 10.7544/issn1000-1239.2020.20190331
    [4]Liu Qiao, Han Minghao, Yang Xiaohui, Liu Yao, Wu Zufeng. Representation Learning Based Relational Inference Algorithm with Semantical Aspect Awareness[J]. Journal of Computer Research and Development, 2017, 54(8): 1682-1692. DOI: 10.7544/issn1000-1239.2017.20170200
    [5]Hong Yu, Zhu Shanshan, Ding Siyuan, Yao Jianmin, Zhu Qiaoming, Zhou Guodong. Implicit Discourse Relation Inference Based on the External Relation[J]. Journal of Computer Research and Development, 2015, 52(11): 2476-2487. DOI: 10.7544/issn1000-1239.2015.20140803
    [6]Wang Yongqing, Xie Lunguo, Fu Qingchao. Moveable Bubble Flow Control and Adaptive Routing Mechanism in Torus Networks[J]. Journal of Computer Research and Development, 2014, 51(8): 1854-1862. DOI: 10.7544/issn1000-1239.2014.20121097
    [7]Zhang Fengbin and Wang Tianbo. Real Value Negative Selection Algorithm with the n-Dimensional Chaotic Map[J]. Journal of Computer Research and Development, 2013, 50(7): 1387-1398.
    [8]Che Haiyan, Feng Tie, Zhang Jiachen, Chen Wei, and Li Dali. Automatic Knowledge Extraction from Chinese Natural Language Documents[J]. Journal of Computer Research and Development, 2013, 50(4): 834-842.
    [9]Hu Kai, Wang Zhe, Jiang Shu, and Yin Baolin. A Performance Model of k-Ary n-Cube Under Communication Locality[J]. Journal of Computer Research and Development, 2011, 48(11): 2083-2093.
    [10]Chen Huahong, Luo Xiaonan, Ling Ruotian, Ma Jianping. A Mesh Simplification Algorithm Based on n-Edges-Mesh Collapse[J]. Journal of Computer Research and Development, 2008, 45(6).
  • Cited by

    Periodical cited type(3)

    1. 王嘉诚,王凯,王昊奋,杜渂,何之栋,阮彤,刘井平. 面向远程监督命名实体识别的噪声检测. 计算机研究与发展. 2024(04): 916-928 . 本站查看
    2. 王鹏,刘小明,杨关,刘杰,刘阳. 基于潜层关系增强的实体和关系联合抽取. 计算机工程与设计. 2024(06): 1780-1788 .
    3. 郑志蕴,徐亚媚,李伦,张行进,李钝. 融合位置特征注意力与关系增强机制的远程监督关系抽取. 小型微型计算机系统. 2023(12): 2678-2684 .

    Other cited types(8)

Catalog

    Article views (240) PDF downloads (132) Cited by(11)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return