Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain

Download
217 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_29,
        author={Jia Wang and Fang Peng and Hui Tian and Wenqi Chen and Jing Lu},
        title={Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Public auditing Cloud forensics Cloud security Forensic investigation},
        doi={10.1007/978-3-030-21373-2_29}
    }
    
  • Jia Wang
    Fang Peng
    Hui Tian
    Wenqi Chen
    Jing Lu
    Year: 2019
    Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_29
Jia Wang1,*, Fang Peng1,*, Hui Tian1,*, Wenqi Chen1,*, Jing Lu1,*
  • 1: National Huaqiao University
*Contact email: jwang@hqu.edu.cn, pengfang@hqu.edu.cn, htian@hqu.edu.cn, wqchen@hqu.edu.cn, jlu@hqu.edu.cn

Abstract

Cloud storage security has been widely focused by the industry and academia in recent years. Differing from the previous researches on cloud data integrity audit, we pay more attention to the security of log generated during the operation of cloud data. While cloud data is damaged and tampered by various security threats (e.g. faulty operations, hacker attacks etc.), it is one of the most common methods to track accidents through log analysis. Therefore, ensuring the integrity of the log files is a prerequisite for completing the incident tracking. To this end, this paper proposes a public model for verifying the integrity of cloud log based on a third party auditor. In order to prevent the log data from being tampered with, we aggregate the log block tags by using the classic Merkle hash tree structure and generate the root node which will be stored in the blockchain. In addition, the proposed scheme does not leak any log content during public audit. The theoretical analysis and experimental results show that the scheme can effectively implement the security audit of cloud logs, which is better than the past in terms of computational complexity overhead.