CFAuditChain: Audit BlockChain Based On Cuckoo Filter
Log blockchain can be used to ensure the integrity of log data. However, current methods are facing the problems of throughput mismatch and rough audit granularity. Packaging multiple logs to generate integrity proofs improves throughput but reduces audit granularity, and the auditor can only locate...
Saved in:
Published in | Computer journal Vol. 67; no. 6; pp. 2208 - 2218 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Oxford University Press
24.06.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Log blockchain can be used to ensure the integrity of log data. However, current methods are facing the problems of throughput mismatch and rough audit granularity. Packaging multiple logs to generate integrity proofs improves throughput but reduces audit granularity, and the auditor can only locate the tampering log packet instead of specific records. This paper proposes CFAuditChain, an audit blockchain based on a cuckoo filter, where the proof of existence (PoE) of the single log is calculated while calculating the integrity proof of packet logs. The PoE is saved in the cuckoo filter and stored using blockchain for immutability. Therefore, the auditor can verify the credibility of each log based on the filter when the integrity proof of a log packet does not match. The theoretical analysis and experimental results show that CFAuditChain provides the granularity of audit logs down to the records level at an acceptable cost. |
---|---|
AbstractList | Log blockchain can be used to ensure the integrity of log data. However, current methods are facing the problems of throughput mismatch and rough audit granularity. Packaging multiple logs to generate integrity proofs improves throughput but reduces audit granularity, and the auditor can only locate the tampering log packet instead of specific records. This paper proposes CFAuditChain, an audit blockchain based on a cuckoo filter, where the proof of existence (PoE) of the single log is calculated while calculating the integrity proof of packet logs. The PoE is saved in the cuckoo filter and stored using blockchain for immutability. Therefore, the auditor can verify the credibility of each log based on the filter when the integrity proof of a log packet does not match. The theoretical analysis and experimental results show that CFAuditChain provides the granularity of audit logs down to the records level at an acceptable cost. |
Author | Liu, Kang Lu, Yang Chen, Zhong Tan, Shiyi Liang, Wei Sun, Huiping |
Author_xml | – sequence: 1 givenname: Kang surname: Liu fullname: Liu, Kang – sequence: 2 givenname: Yang surname: Lu fullname: Lu, Yang – sequence: 3 givenname: Shiyi surname: Tan fullname: Tan, Shiyi – sequence: 4 givenname: Wei surname: Liang fullname: Liang, Wei email: liangwei6@chinatelecom.cn – sequence: 5 givenname: Huiping surname: Sun fullname: Sun, Huiping email: sunhp@ss.pku.edu.cn – sequence: 6 givenname: Zhong surname: Chen fullname: Chen, Zhong |
BookMark | eNqFjz1PwzAQhi1UJNLCyuyVIe3Zjr_Y2ogAUqUuMEeuP0TaNK7iRoJ_T2m6oxvu9Op9TnqmaNLFziP0SGBOQLOFjYdd1y6238YRxm5QRgoBOQUhJygDIJAXgsIdmqa0AwAKWmSIl9VycM2p_DJN94wvN1610e4vCV6Z5B3edLgc7D5GXDXtyff36DaYNvmH656hz-rlo3zL15vX93K5zi2l6pQTDsEwbTlnkgWiC6WZO49WUhkJjkrNvJaCe6WCc9ZI4nTg0oYt9eAEm6H5-Nf2MaXeh_rYNwfT_9QE6j_pepSur9Jn4GkE4nD8r_sL7ZJbMQ |
Cites_doi | 10.1016/j.ipl.2005.11.003 10.9790/3021-021221721 10.1109/ACCESS.2023.3252030 10.1109/TDSC.2021.3092365 |
ContentType | Journal Article |
Copyright | The British Computer Society 2024. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2024 |
Copyright_xml | – notice: The British Computer Society 2024. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2024 |
DBID | AAYXX CITATION |
DOI | 10.1093/comjnl/bxad133 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1460-2067 |
EndPage | 2218 |
ExternalDocumentID | 10_1093_comjnl_bxad133 10.1093/comjnl/bxad133 |
GroupedDBID | -E4 -~X .2P .DC .I3 0R~ 123 18M 1OL 1TH 29F 3R3 4.4 41~ 48X 5VS 5WA 6J9 6TJ 70D 85S 9M8 AAIJN AAJKP AAJQQ AAMVS AAOGV AAPQZ AAPXW AARHZ AAUAY AAUQX AAVAP AAYOK ABAZT ABDFA ABDTM ABEFU ABEJV ABEUO ABGNP ABIXL ABNKS ABPTD ABQLI ABSMQ ABVGC ABVLG ABXVV ABZBJ ACBEA ACFRR ACGFS ACGOD ACIWK ACNCT ACUFI ACUTJ ACUXJ ACVCV ACYTK ADEYI ADEZT ADGZP ADHKW ADHZD ADIPN ADMLS ADOCK ADQBN ADRDM ADRTK ADVEK ADYJX ADYVW ADZXQ AECKG AEGPL AEGXH AEJOX AEKKA AEKSI AEMDU AENEX AENZO AEPUE AETBJ AEWNT AFFZL AFIYH AFOFC AGINJ AGKEF AGMDO AGORE AGSYK AHGBF AHXPO AI. AIDUJ AIJHB AJBYB AJEEA AJEUX AJNCP ALMA_UNASSIGNED_HOLDINGS ALTZX ALUQC ALXQX ANAKG APIBT APJGH APWMN ASAOO ATDFG ATGXG AXUDD AZVOD BAYMD BCRHZ BEFXN BEYMZ BFFAM BGNUA BHONS BKEBE BPEOZ BQUQU BTQHN CAG CDBKE COF CS3 CXTWN CZ4 DAKXR DFGAJ DILTD DU5 D~K EBS EE~ EJD F9B FA8 FLIZI FLUFQ FOEOM GAUVT GJXCC H13 H5~ HAR HW0 HZ~ H~9 IOX J21 JAVBF JXSIZ KBUDW KOP KSI KSN M-Z MBTAY ML0 MVM N9A NGC NMDNZ NOMLY NU- O0~ O9- OCL ODMLO OJQWA OJZSN OWPYF O~Y P2P PAFKI PEELM PQQKQ Q1. Q5Y R44 RD5 RNI ROL ROX ROZ RUSNO RW1 RXO RZO SC5 TAE TJP TN5 VH1 VOH WH7 WHG X7H XJT XOL XSW YAYTL YKOAZ YXANX ZKX ZY4 ~91 AAYXX CITATION |
ID | FETCH-LOGICAL-c228t-150fa39c55373f194893d3d39878a70d2793e9765e88fddca71d9f57cfb2e0d63 |
ISSN | 0010-4620 |
IngestDate | Tue Jul 01 02:55:11 EDT 2025 Mon Jun 30 08:34:40 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | cuckoo filter log blockchain audit high-throughput |
Language | English |
License | This article is published and distributed under the terms of the Oxford University Press, Standard Journals Publication Model (https://academic.oup.com/pages/standard-publication-reuse-rights) https://academic.oup.com/pages/standard-publication-reuse-rights |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c228t-150fa39c55373f194893d3d39878a70d2793e9765e88fddca71d9f57cfb2e0d63 |
PageCount | 11 |
ParticipantIDs | crossref_primary_10_1093_comjnl_bxad133 oup_primary_10_1093_comjnl_bxad133 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-06-24 |
PublicationDateYYYYMMDD | 2024-06-24 |
PublicationDate_xml | – month: 06 year: 2024 text: 2024-06-24 day: 24 |
PublicationDecade | 2020 |
PublicationTitle | Computer journal |
PublicationYear | 2024 |
Publisher | Oxford University Press |
Publisher_xml | – name: Oxford University Press |
References | Rampal Singh (2024062414154577400_ref25) 2012; 02 Tian (2024062414154577400_ref20) 2017 Chen (2024062414154577400_ref13) 2021; 19 Efraimidis (2024062414154577400_ref29) 2006; 97 (2024062414154577400_ref19); 108 2024062414154577400_ref21 2024062414154577400_ref7 2024062414154577400_ref4 2024062414154577400_ref5 2024062414154577400_ref2 Paccagnella (2024062414154577400_ref1) 2020 Bhanot (2024062414154577400_ref3) 2015; 9 2024062414154577400_ref28 2024062414154577400_ref27 2024062414154577400_ref26 (2024062414154577400_ref8); 87 2024062414154577400_ref23 2024062414154577400_ref22 Schwartz (2024062414154577400_ref6) Zhao (2024062414154577400_ref16); 11 Corp (2024062414154577400_ref15) 2024062414154577400_ref9 2024062414154577400_ref10 2024062414154577400_ref32 2024062414154577400_ref31 2024062414154577400_ref30 2024062414154577400_ref18 2024062414154577400_ref17 2024062414154577400_ref14 Tian (2024062414154577400_ref24) 2023 2024062414154577400_ref12 2024062414154577400_ref11 |
References_xml | – volume-title: Computer Security–ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 14 ident: 2024062414154577400_ref26 – volume: 97 start-page: 181 year: 2006 ident: 2024062414154577400_ref29 article-title: Weighted random sampling with a reservoir publication-title: Inf. Process. Lett. doi: 10.1016/j.ipl.2005.11.003 – volume-title: IEEE INFOCOM 2018-IEEE conference on computer communications ident: 2024062414154577400_ref23 – volume-title: ICC 2019-2019 IEEE International Conference on Communications (ICC) ident: 2024062414154577400_ref12 – volume-title: Cryptology ePrint Archive ident: 2024062414154577400_ref18 – volume: 02 start-page: 17 year: 2012 ident: 2024062414154577400_ref25 article-title: Ensuring data storage security in cloud computing publication-title: IOSR J. Eng. doi: 10.9790/3021-021221721 – volume-title: 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) ident: 2024062414154577400_ref30 – volume-title: 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN) ident: 2024062414154577400_ref17 – ident: 2024062414154577400_ref9 publication-title: USENIX security symposium – volume-title: Security and Communication Networks ident: 2024062414154577400_ref4 – volume-title: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) ident: 2024062414154577400_ref10 – volume: 108 ident: 2024062414154577400_ref19 publication-title: Computers and Security – volume: 87 ident: 2024062414154577400_ref8 publication-title: Computers and Security – start-page: 1 volume-title: Public auditing of log integrity for shared cloud storage systems via blockchain year: 2023 ident: 2024062414154577400_ref24 – volume-title: ICC 2022-IEEE International Conference on Communications ident: 2024062414154577400_ref14 – volume: 11 start-page: 21712 ident: 2024062414154577400_ref16 article-title: A blockchain-facilitated secure sensing data processing and logging system publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3252030 – volume-title: Security and Privacy in New Computing Environments: Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings 2 ident: 2024062414154577400_ref21 – volume-title: 2010 Proceedings IEEE Infocom ident: 2024062414154577400_ref22 – volume-title: 2021 IEEE Symposium on Computers and Communications (ISCC) ident: 2024062414154577400_ref31 – volume-title: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies ident: 2024062414154577400_ref28 – ident: 2024062414154577400_ref6 article-title: Sony hack: FBI issues malware alert – volume-title: Custos: practical tamper-evident auditing of operating systems using trusted execution year: 2020 ident: 2024062414154577400_ref1 – volume: 9 start-page: 289 year: 2015 ident: 2024062414154577400_ref3 article-title: A review and comparative analysis of various encryption algorithms publication-title: Int. J. Secur. Its Appl. – volume-title: Proceedings of the 1st ACM Conference on Advances in Financial Technologies ident: 2024062414154577400_ref32 – ident: 2024062414154577400_ref15 article-title: IBM totalstorage dr 550 – volume: 19 start-page: 3286 year: 2021 ident: 2024062414154577400_ref13 article-title: Delia: distributed efficient log integrity audit based on hierarchal multi-party state channel publication-title: IEEE Trans. Dependable Secure Comput. doi: 10.1109/TDSC.2021.3092365 – volume-title: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) ident: 2024062414154577400_ref7 – volume-title: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) ident: 2024062414154577400_ref11 – start-page: 2175 volume-title: Enabling public auditability for operation behaviors in cloud storage year: 2017 ident: 2024062414154577400_ref20 – volume-title: IFIP International Information Security Conference ident: 2024062414154577400_ref2 – volume-title: Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012 ident: 2024062414154577400_ref5 – volume-title: Proceedings of the 2013 international workshop on Security in cloud computing ident: 2024062414154577400_ref27 |
SSID | ssj0002096 |
Score | 2.3701944 |
Snippet | Log blockchain can be used to ensure the integrity of log data. However, current methods are facing the problems of throughput mismatch and rough audit... |
SourceID | crossref oup |
SourceType | Index Database Publisher |
StartPage | 2208 |
Title | CFAuditChain: Audit BlockChain Based On Cuckoo Filter |
Volume | 67 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1ZS8QwEA66vvjiLd4EEXwo1TZHD9_W1UXE48EV9WlpkxSr0hXZBfXXO2my23rhQaGkQ5rSfNOZyXRmgtAWy0RMVajcOIupy5Qn3UjywOXST2mUUpEmOjn59Cw4umTH1_y6SiEos0v66Y54_TKv5D-oAg1w1Vmyf0B2NCgQoA34whkQhvOvMG61mzqponWrl_faw6evnH3QT_clzdkHHSWd88JpDcR9r-e084dhOO6wOoHd1cGpP1AH6OQDE2xhNZsmlZSbGqVjvae3-Ute3Wg90Fcqr7sUCNOhT6RyKX6TqlgXoyC8WUDMDxVlJCcLPFfXgq-LVnuVf5aTxItqOpcQI4Q_yXNT6woQuiseoJE-J9I3hTM-VMn-vvM4miCwhCANNNE8OD25GOlp4pW7t41eZlTSk-6aMXbtCO9MFp0GWbNAOjNoyi4dcNPwwSwaU8Ucmh4CiK2Unke8zhZ7uGzjiilwyRT4vMCGKbBhigV02T7stI5cuzuGKwiJ-i5Y8llCY8E5DWnmx7qKkIQjjsIoCT1JQPIqMDa5iqJMSpGEvowzHoosJfBJBnQRNYpeoZYQljTR-8IJJmTGPCb0v-eEpaHPBRExk8toezgB3UdTBKVrghdo10xV107VMtqE-fmh08pvOq2iyYo111Cj_zRQ62D_9dMNC-QbYdZb5w |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CFAuditChain%3A+Audit+BlockChain+Based+On+Cuckoo+Filter&rft.jtitle=Computer+journal&rft.au=Liu%2C+Kang&rft.au=Lu%2C+Yang&rft.au=Tan%2C+Shiyi&rft.au=Liang%2C+Wei&rft.date=2024-06-24&rft.pub=Oxford+University+Press&rft.issn=0010-4620&rft.eissn=1460-2067&rft.volume=67&rft.issue=6&rft.spage=2208&rft.epage=2218&rft_id=info:doi/10.1093%2Fcomjnl%2Fbxad133&rft.externalDocID=10.1093%2Fcomjnl%2Fbxad133 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0010-4620&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0010-4620&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0010-4620&client=summon |