Science China Technological Sciences

, Volume 62, Issue 4, pp 698–701 | Cite as

DIRA: Enabling decentralized data integrity and reputation audit via blockchain

  • YiNing QiEmail author
  • YongFeng Huang


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ateniese G, Burns R C, Curtmola R, et al. Provable data possession at untrusted stores. ACM Conf Comput Commun Security, 2007, 14: 598–609Google Scholar
  2. 2.
    Juels A, Kaliski B S. Pors: Proofs of retrievability for large files. ACM Conf Comput Commun Security, 2007, 14: 584–597Google Scholar
  3. 3.
    Zhu Y, Hu H, Ahn G J, et al. Cooperative provable data possession for integrity verification in multicloud storage. IEEE Trans Parallel Distrib Syst, 2012, 23: 2231–2244CrossRefGoogle Scholar
  4. 4.
    Tang X, Qi Y, Huang Y. Reputation audit in multi-cloud storage through integrity verification and data dynamics. In: Proceedings of the 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). IEEE, 2016. 624–631CrossRefGoogle Scholar
  5. 5.
    Bowers K D, Juels A, Oprea A, et al. Proofs of retrievability: theory and implementation. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009. 43–54CrossRefGoogle Scholar
  6. 6.
    Shacham H, Waters B. Compact Proofs of Retrievability. J Cryptol, 2013, 26: 442–483MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Stefanov E, van Dijk M, Juels A, et al. Iris: A scalable cloud file system with efficient integrity checks. In: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC’12). New York: ACM, 2012. 229–238Google Scholar
  8. 8.
    Erway C C, Kupcu A, Papamanthou C, et al. Dynamic provable data possession. ACM Trans Inf Syst Secur, 2015, 17: 15CrossRefGoogle Scholar
  9. 9.
    Esiner E, Kachkeev A, Braunfeld S, et al. FlexDPDP: Flexlist-Based optimized dynamic provable data possession. ACM Trans Storage, 2016, 12: 23CrossRefGoogle Scholar
  10. 10.
    Wang Q, Wang C, Ren K, et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans Parallel Distrib Syst, 2011, 22: 847–859CrossRefGoogle Scholar
  11. 11.
    Mo Z, Zhou Y, Chen S, et al. Enabling non-repudiable data possession verification in cloud storage systems. In: Proceedings of the International Conference on Cloud Computing. Anchorage, 2014. 232–239Google Scholar
  12. 12.
    Sookhak M, Gani A, Talebian H, et al. Remote data auditing in cloud computing environments: A survey, taxonomy, and open issues. ACM Computing Surveys, 2015, 47: 65CrossRefGoogle Scholar
  13. 13.
    Maniatis P, Roussopoulos M, Giuli T J, et al. The LOCKSS peer-to-peer digital preservation system. ACM Trans Comput Syst, 2005, 23: 2–50CrossRefGoogle Scholar
  14. 14.
    Chen B, Curtmola R, Ateniese G, et al. Remote data checking for network coding-based distributed storage systems. In: Proceedings of the 2010 ACM workshop on Cloud Computing Security Workshop. New York: ACM, 2010. 31–42CrossRefGoogle Scholar
  15. 15.
    Wang C, Chow S S M,Wang Q, et al. Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans Comput, 2013, 62: 362–375MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Science in China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Electronic EngineeringTsinghua UniversityBeijingChina
  2. 2.Tsinghua National Laboratory for Information Science and TechnologyBeijingChina

Personalised recommendations