A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory

نویسندگان

چکیده

Currently, many companies and institutions use centralized or distributed databases to store massive amounts of data. However, the untrusted third-party auditors can result in security issues because these may be malicious tamper with delete user This poses a significant challenge for ensuring reliability data verification results. Although introducing auditor help address this issue, it also untrustworthy collude database service provider forge false In study, we propose integrity scheme using smart contracts (DIV-SC) environment. Our approach utilizes blockchain technology as decentralized auditor, that information stored on is immutable cannot tampered maliciously. addition, deployed ensure procedures are correct not affected by any party. We leverage game theory improve multiple verifications, reduce time overall performance. proposed reduces total consumption up 53.44% while increasing number verifiable times nearly 3.8 times, compared conventional schemes.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Sensor-Based Scheme for Activity Recognition in Smart Homes using Dempster-Shafer Theory of Evidence

This paper proposes a scheme for activity recognition in sensor based smart homes using Dempster-Shafer theory of evidence. In this work, opinion owners and their belief masses are constructed from sensors and employed in a single-layered inference architecture. The belief masses are calculated using beta probability distribution function. The frames of opinion owners are derived automatically ...

متن کامل

using game theory techniques in self-organizing maps training

شبکه خود سازمانده پرکاربردترین شبکه عصبی برای انجام خوشه بندی و کوانتیزه نمودن برداری است. از زمان معرفی این شبکه تاکنون، از این روش در مسائل مختلف در حوزه های گوناگون استفاده و توسعه ها و بهبودهای متعددی برای آن ارائه شده است. شبکه خودسازمانده از تعدادی سلول برای تخمین تابع توزیع الگوهای ورودی در فضای چندبعدی استفاده می کند. احتمال وجود سلول مرده مشکلی اساسی در الگوریتم شبکه خودسازمانده به حسا...

Framework for Multi-Cloud Using Integrity Verification Using CPDP Scheme

Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We prese...

متن کامل

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

A Double-Efficient Integrity Verification Scheme to Cloud Storage Data

This paper proposed two integrity verification schemes based on Schnorr Signature Scheme. One is safety integrity verification scheme (SIVS). Another is efficient integrity verification scheme (EIVS). They are difference in characteristics. EIVS has good computational costs while SIVS has high security guarantee. However, they are similar in work. The cloud storage server will choose a set of f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2023

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2023.3284850