TY - GEN
T1 - Secure consistency verification for untrusted cloud storage by public blockchains
AU - Li, Kai
AU - Tang, Yuzhe
AU - Kim, Beom Heyn Ben
AU - Xu, Jianliang
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019.
PY - 2019
Y1 - 2019
N2 - This work presents ContractChecker, a Blockchain-based security protocol for verifying the storage consistency between mutually distrusting cloud provider and clients. Unlike existing protocols, the ContractChecker uniquely delegates log auditing to the Blockchain, and has the advantages in reducing client cost and lowering requirements on client availability, lending itself to modern scenarios with mobile and web clients. The ContractChecker collects the logs from both clients and cloud server, and verifies the consistency by cross-checking the logs. By this means, it does not only detect the attacks from malicious clients and server forging their logs, but also is able to mitigate those attacks and recover the system from them. In addition, we design new attacks against ContractChecker exploiting various limits in real Blockchain systems (e.g., write unavailability, Blockchain forks, contract race conditions). We analyze and harden the security of ContractChecker protocols under these proposed new attacks. We implement a functional prototype of the ContractChecker on Ethereum/Solidity. By experiments on private and public Ethereum testnets, we extensively evaluate the cost of the ContractChecker in comparison with that of existing client-based log auditing works. The result shows the ContractChecker can scale to hundreds of clients and save client costs by more than one order of magnitude. The evaluation result verifies our design motivation of delegating log auditing to the Blockchain in ContractChecker.
AB - This work presents ContractChecker, a Blockchain-based security protocol for verifying the storage consistency between mutually distrusting cloud provider and clients. Unlike existing protocols, the ContractChecker uniquely delegates log auditing to the Blockchain, and has the advantages in reducing client cost and lowering requirements on client availability, lending itself to modern scenarios with mobile and web clients. The ContractChecker collects the logs from both clients and cloud server, and verifies the consistency by cross-checking the logs. By this means, it does not only detect the attacks from malicious clients and server forging their logs, but also is able to mitigate those attacks and recover the system from them. In addition, we design new attacks against ContractChecker exploiting various limits in real Blockchain systems (e.g., write unavailability, Blockchain forks, contract race conditions). We analyze and harden the security of ContractChecker protocols under these proposed new attacks. We implement a functional prototype of the ContractChecker on Ethereum/Solidity. By experiments on private and public Ethereum testnets, we extensively evaluate the cost of the ContractChecker in comparison with that of existing client-based log auditing works. The result shows the ContractChecker can scale to hundreds of clients and save client costs by more than one order of magnitude. The evaluation result verifies our design motivation of delegating log auditing to the Blockchain in ContractChecker.
KW - Blockchain applications
KW - Blockchain security
KW - Cloud storage
KW - Storage consistency
UR - http://www.scopus.com/inward/record.url?scp=85077508632&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85077508632&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-37228-6_3
DO - 10.1007/978-3-030-37228-6_3
M3 - Conference contribution
AN - SCOPUS:85077508632
SN - 9783030372279
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 39
EP - 62
BT - Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings
A2 - Chen, Songqing
A2 - Choo, Kim-Kwang Raymond
A2 - Fu, Xinwen
A2 - Lou, Wenjing
A2 - Mohaisen, Aziz
PB - Springer
T2 - 15th International Conference on Security and Privacy in Communication Networks, SecureComm 2019
Y2 - 23 October 2019 through 25 October 2019
ER -