Secure Consistency Verification for Untrusted Cloud Storage by Public Blockchains

04/14/2019
by   Kai Li, et al.
0

This work presents ContractChecker, a Blockchain-based security protocol for verifying the storage consistency between the mutually distrusting cloud provider and clients. Unlike existing protocols, the ContractChecker uniquely delegates log auditing to the Blockchain, and has the advantages in reducing client cost and lowering requirements on client availability, lending itself to modern scenarios with mobile and web clients. The ContractChecker collects the logs from both clients and the cloud server, and verifies the consistency by cross-checking the logs. By this means, it does not only detects the attacks from malicious clients and server forging their logs, but also is able to mitigate those attacks and recover the system from them. In addition, we design new attacks against ContractChecker exploiting various limits in real Blockchain systems (e.g., write unavailability, Blockchain forks, contract race conditions). We analyze and harden the security of ContractChecker protocols against the proposed new attacks. For evaluating the cost, we build a functional prototype of the ContractChecker on Ethereum/Solidity. By experiments on private and public Ethereum testnets, we extensively evaluate the cost of the ContractChecker in comparison with that of existing client-based log auditing works. The result shows the ContractChecker can scale to hundreds of clients and save client costs by more than one order of magnitude.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/26/2018

Requirements for Ethereum Private Sidechains

The Enterprise Ethereum Client Specification by the Enterprise Ethereum ...
research
04/10/2017

Prover efficient public verification of dense or sparse/structured matrix-vector multiplication

With the emergence of cloud computing services, computationally weak dev...
research
09/24/2018

The Sorry State of TLS Security in Enterprise Interception Appliances

Network traffic inspection, including TLS traffic, in enterprise environ...
research
06/01/2022

Mining Function Homology of Bot Loaders from Honeypot Logs

Self-contained loaders are widely adopted in botnets for injecting loadi...
research
08/28/2019

Immutable Log Storage as a Service

Logs contain critical information about the quality of the rendered serv...
research
02/28/2022

Bonsai: A Generalized Look at Dual Deduplication

Cloud Service Providers (CSPs) offer a vast amount of storage space at c...
research
07/19/2021

Indexing structures for the PLS blockchain

This paper studies known indexing structures from a new point of view: m...

Please sign up or login with your details

Forgot password? Click here to reset