CFAuditChain: Audit BlockChain Based On Cuckoo Filter

Log blockchain can be used to ensure the integrity of log data. However, current methods are facing the problems of throughput mismatch and rough audit granularity. Packaging multiple logs to generate integrity proofs improves throughput but reduces audit granularity, and the auditor can only locate...

Full description

Saved in:
Bibliographic Details
Published inComputer journal Vol. 67; no. 6; pp. 2208 - 2218
Main Authors Liu, Kang, Lu, Yang, Tan, Shiyi, Liang, Wei, Sun, Huiping, Chen, Zhong
Format Journal Article
LanguageEnglish
Published Oxford University Press 24.06.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Log blockchain can be used to ensure the integrity of log data. However, current methods are facing the problems of throughput mismatch and rough audit granularity. Packaging multiple logs to generate integrity proofs improves throughput but reduces audit granularity, and the auditor can only locate the tampering log packet instead of specific records. This paper proposes CFAuditChain, an audit blockchain based on a cuckoo filter, where the proof of existence (PoE) of the single log is calculated while calculating the integrity proof of packet logs. The PoE is saved in the cuckoo filter and stored using blockchain for immutability. Therefore, the auditor can verify the credibility of each log based on the filter when the integrity proof of a log packet does not match. The theoretical analysis and experimental results show that CFAuditChain provides the granularity of audit logs down to the records level at an acceptable cost.
AbstractList Log blockchain can be used to ensure the integrity of log data. However, current methods are facing the problems of throughput mismatch and rough audit granularity. Packaging multiple logs to generate integrity proofs improves throughput but reduces audit granularity, and the auditor can only locate the tampering log packet instead of specific records. This paper proposes CFAuditChain, an audit blockchain based on a cuckoo filter, where the proof of existence (PoE) of the single log is calculated while calculating the integrity proof of packet logs. The PoE is saved in the cuckoo filter and stored using blockchain for immutability. Therefore, the auditor can verify the credibility of each log based on the filter when the integrity proof of a log packet does not match. The theoretical analysis and experimental results show that CFAuditChain provides the granularity of audit logs down to the records level at an acceptable cost.
Author Liu, Kang
Lu, Yang
Chen, Zhong
Tan, Shiyi
Liang, Wei
Sun, Huiping
Author_xml – sequence: 1
  givenname: Kang
  surname: Liu
  fullname: Liu, Kang
– sequence: 2
  givenname: Yang
  surname: Lu
  fullname: Lu, Yang
– sequence: 3
  givenname: Shiyi
  surname: Tan
  fullname: Tan, Shiyi
– sequence: 4
  givenname: Wei
  surname: Liang
  fullname: Liang, Wei
  email: liangwei6@chinatelecom.cn
– sequence: 5
  givenname: Huiping
  surname: Sun
  fullname: Sun, Huiping
  email: sunhp@ss.pku.edu.cn
– sequence: 6
  givenname: Zhong
  surname: Chen
  fullname: Chen, Zhong
BookMark eNqFjz1PwzAQhi1UJNLCyuyVIe3Zjr_Y2ogAUqUuMEeuP0TaNK7iRoJ_T2m6oxvu9Op9TnqmaNLFziP0SGBOQLOFjYdd1y6238YRxm5QRgoBOQUhJygDIJAXgsIdmqa0AwAKWmSIl9VycM2p_DJN94wvN1610e4vCV6Z5B3edLgc7D5GXDXtyff36DaYNvmH656hz-rlo3zL15vX93K5zi2l6pQTDsEwbTlnkgWiC6WZO49WUhkJjkrNvJaCe6WCc9ZI4nTg0oYt9eAEm6H5-Nf2MaXeh_rYNwfT_9QE6j_pepSur9Jn4GkE4nD8r_sL7ZJbMQ
Cites_doi 10.1016/j.ipl.2005.11.003
10.9790/3021-021221721
10.1109/ACCESS.2023.3252030
10.1109/TDSC.2021.3092365
ContentType Journal Article
Copyright The British Computer Society 2024. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2024
Copyright_xml – notice: The British Computer Society 2024. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com 2024
DBID AAYXX
CITATION
DOI 10.1093/comjnl/bxad133
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1460-2067
EndPage 2218
ExternalDocumentID 10_1093_comjnl_bxad133
10.1093/comjnl/bxad133
GroupedDBID -E4
-~X
.2P
.DC
.I3
0R~
123
18M
1OL
1TH
29F
3R3
4.4
41~
48X
5VS
5WA
6J9
6TJ
70D
85S
9M8
AAIJN
AAJKP
AAJQQ
AAMVS
AAOGV
AAPQZ
AAPXW
AARHZ
AAUAY
AAUQX
AAVAP
AAYOK
ABAZT
ABDFA
ABDTM
ABEFU
ABEJV
ABEUO
ABGNP
ABIXL
ABNKS
ABPTD
ABQLI
ABSMQ
ABVGC
ABVLG
ABXVV
ABZBJ
ACBEA
ACFRR
ACGFS
ACGOD
ACIWK
ACNCT
ACUFI
ACUTJ
ACUXJ
ACVCV
ACYTK
ADEYI
ADEZT
ADGZP
ADHKW
ADHZD
ADIPN
ADMLS
ADOCK
ADQBN
ADRDM
ADRTK
ADVEK
ADYJX
ADYVW
ADZXQ
AECKG
AEGPL
AEGXH
AEJOX
AEKKA
AEKSI
AEMDU
AENEX
AENZO
AEPUE
AETBJ
AEWNT
AFFZL
AFIYH
AFOFC
AGINJ
AGKEF
AGMDO
AGORE
AGSYK
AHGBF
AHXPO
AI.
AIDUJ
AIJHB
AJBYB
AJEEA
AJEUX
AJNCP
ALMA_UNASSIGNED_HOLDINGS
ALTZX
ALUQC
ALXQX
ANAKG
APIBT
APJGH
APWMN
ASAOO
ATDFG
ATGXG
AXUDD
AZVOD
BAYMD
BCRHZ
BEFXN
BEYMZ
BFFAM
BGNUA
BHONS
BKEBE
BPEOZ
BQUQU
BTQHN
CAG
CDBKE
COF
CS3
CXTWN
CZ4
DAKXR
DFGAJ
DILTD
DU5
D~K
EBS
EE~
EJD
F9B
FA8
FLIZI
FLUFQ
FOEOM
GAUVT
GJXCC
H13
H5~
HAR
HW0
HZ~
H~9
IOX
J21
JAVBF
JXSIZ
KBUDW
KOP
KSI
KSN
M-Z
MBTAY
ML0
MVM
N9A
NGC
NMDNZ
NOMLY
NU-
O0~
O9-
OCL
ODMLO
OJQWA
OJZSN
OWPYF
O~Y
P2P
PAFKI
PEELM
PQQKQ
Q1.
Q5Y
R44
RD5
RNI
ROL
ROX
ROZ
RUSNO
RW1
RXO
RZO
SC5
TAE
TJP
TN5
VH1
VOH
WH7
WHG
X7H
XJT
XOL
XSW
YAYTL
YKOAZ
YXANX
ZKX
ZY4
~91
AAYXX
CITATION
ID FETCH-LOGICAL-c228t-150fa39c55373f194893d3d39878a70d2793e9765e88fddca71d9f57cfb2e0d63
ISSN 0010-4620
IngestDate Tue Jul 01 02:55:11 EDT 2025
Mon Jun 30 08:34:40 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 6
Keywords cuckoo filter
log blockchain
audit
high-throughput
Language English
License This article is published and distributed under the terms of the Oxford University Press, Standard Journals Publication Model (https://academic.oup.com/pages/standard-publication-reuse-rights)
https://academic.oup.com/pages/standard-publication-reuse-rights
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c228t-150fa39c55373f194893d3d39878a70d2793e9765e88fddca71d9f57cfb2e0d63
PageCount 11
ParticipantIDs crossref_primary_10_1093_comjnl_bxad133
oup_primary_10_1093_comjnl_bxad133
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-06-24
PublicationDateYYYYMMDD 2024-06-24
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-06-24
  day: 24
PublicationDecade 2020
PublicationTitle Computer journal
PublicationYear 2024
Publisher Oxford University Press
Publisher_xml – name: Oxford University Press
References Rampal Singh (2024062414154577400_ref25) 2012; 02
Tian (2024062414154577400_ref20) 2017
Chen (2024062414154577400_ref13) 2021; 19
Efraimidis (2024062414154577400_ref29) 2006; 97
(2024062414154577400_ref19); 108
2024062414154577400_ref21
2024062414154577400_ref7
2024062414154577400_ref4
2024062414154577400_ref5
2024062414154577400_ref2
Paccagnella (2024062414154577400_ref1) 2020
Bhanot (2024062414154577400_ref3) 2015; 9
2024062414154577400_ref28
2024062414154577400_ref27
2024062414154577400_ref26
(2024062414154577400_ref8); 87
2024062414154577400_ref23
2024062414154577400_ref22
Schwartz (2024062414154577400_ref6)
Zhao (2024062414154577400_ref16); 11
Corp (2024062414154577400_ref15)
2024062414154577400_ref9
2024062414154577400_ref10
2024062414154577400_ref32
2024062414154577400_ref31
2024062414154577400_ref30
2024062414154577400_ref18
2024062414154577400_ref17
2024062414154577400_ref14
Tian (2024062414154577400_ref24) 2023
2024062414154577400_ref12
2024062414154577400_ref11
References_xml – volume-title: Computer Security–ESORICS 2009: 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 14
  ident: 2024062414154577400_ref26
– volume: 97
  start-page: 181
  year: 2006
  ident: 2024062414154577400_ref29
  article-title: Weighted random sampling with a reservoir
  publication-title: Inf. Process. Lett.
  doi: 10.1016/j.ipl.2005.11.003
– volume-title: IEEE INFOCOM 2018-IEEE conference on computer communications
  ident: 2024062414154577400_ref23
– volume-title: ICC 2019-2019 IEEE International Conference on Communications (ICC)
  ident: 2024062414154577400_ref12
– volume-title: Cryptology ePrint Archive
  ident: 2024062414154577400_ref18
– volume: 02
  start-page: 17
  year: 2012
  ident: 2024062414154577400_ref25
  article-title: Ensuring data storage security in cloud computing
  publication-title: IOSR J. Eng.
  doi: 10.9790/3021-021221721
– volume-title: 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)
  ident: 2024062414154577400_ref30
– volume-title: 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN)
  ident: 2024062414154577400_ref17
– ident: 2024062414154577400_ref9
  publication-title: USENIX security symposium
– volume-title: Security and Communication Networks
  ident: 2024062414154577400_ref4
– volume-title: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD)
  ident: 2024062414154577400_ref10
– volume: 108
  ident: 2024062414154577400_ref19
  publication-title: Computers and Security
– volume: 87
  ident: 2024062414154577400_ref8
  publication-title: Computers and Security
– start-page: 1
  volume-title: Public auditing of log integrity for shared cloud storage systems via blockchain
  year: 2023
  ident: 2024062414154577400_ref24
– volume-title: ICC 2022-IEEE International Conference on Communications
  ident: 2024062414154577400_ref14
– volume: 11
  start-page: 21712
  ident: 2024062414154577400_ref16
  article-title: A blockchain-facilitated secure sensing data processing and logging system
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3252030
– volume-title: Security and Privacy in New Computing Environments: Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings 2
  ident: 2024062414154577400_ref21
– volume-title: 2010 Proceedings IEEE Infocom
  ident: 2024062414154577400_ref22
– volume-title: 2021 IEEE Symposium on Computers and Communications (ISCC)
  ident: 2024062414154577400_ref31
– volume-title: Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies
  ident: 2024062414154577400_ref28
– ident: 2024062414154577400_ref6
  article-title: Sony hack: FBI issues malware alert
– volume-title: Custos: practical tamper-evident auditing of operating systems using trusted execution
  year: 2020
  ident: 2024062414154577400_ref1
– volume: 9
  start-page: 289
  year: 2015
  ident: 2024062414154577400_ref3
  article-title: A review and comparative analysis of various encryption algorithms
  publication-title: Int. J. Secur. Its Appl.
– volume-title: Proceedings of the 1st ACM Conference on Advances in Financial Technologies
  ident: 2024062414154577400_ref32
– ident: 2024062414154577400_ref15
  article-title: IBM totalstorage dr 550
– volume: 19
  start-page: 3286
  year: 2021
  ident: 2024062414154577400_ref13
  article-title: Delia: distributed efficient log integrity audit based on hierarchal multi-party state channel
  publication-title: IEEE Trans. Dependable Secure Comput.
  doi: 10.1109/TDSC.2021.3092365
– volume-title: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
  ident: 2024062414154577400_ref7
– volume-title: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
  ident: 2024062414154577400_ref11
– start-page: 2175
  volume-title: Enabling public auditability for operation behaviors in cloud storage
  year: 2017
  ident: 2024062414154577400_ref20
– volume-title: IFIP International Information Security Conference
  ident: 2024062414154577400_ref2
– volume-title: Financial Cryptography and Data Security: 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012
  ident: 2024062414154577400_ref5
– volume-title: Proceedings of the 2013 international workshop on Security in cloud computing
  ident: 2024062414154577400_ref27
SSID ssj0002096
Score 2.3701944
Snippet Log blockchain can be used to ensure the integrity of log data. However, current methods are facing the problems of throughput mismatch and rough audit...
SourceID crossref
oup
SourceType Index Database
Publisher
StartPage 2208
Title CFAuditChain: Audit BlockChain Based On Cuckoo Filter
Volume 67
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1ZS8QwEA66vvjiLd4EEXwo1TZHD9_W1UXE48EV9WlpkxSr0hXZBfXXO2my23rhQaGkQ5rSfNOZyXRmgtAWy0RMVajcOIupy5Qn3UjywOXST2mUUpEmOjn59Cw4umTH1_y6SiEos0v66Y54_TKv5D-oAg1w1Vmyf0B2NCgQoA34whkQhvOvMG61mzqponWrl_faw6evnH3QT_clzdkHHSWd88JpDcR9r-e084dhOO6wOoHd1cGpP1AH6OQDE2xhNZsmlZSbGqVjvae3-Ute3Wg90Fcqr7sUCNOhT6RyKX6TqlgXoyC8WUDMDxVlJCcLPFfXgq-LVnuVf5aTxItqOpcQI4Q_yXNT6woQuiseoJE-J9I3hTM-VMn-vvM4miCwhCANNNE8OD25GOlp4pW7t41eZlTSk-6aMXbtCO9MFp0GWbNAOjNoyi4dcNPwwSwaU8Ucmh4CiK2Unke8zhZ7uGzjiilwyRT4vMCGKbBhigV02T7stI5cuzuGKwiJ-i5Y8llCY8E5DWnmx7qKkIQjjsIoCT1JQPIqMDa5iqJMSpGEvowzHoosJfBJBnQRNYpeoZYQljTR-8IJJmTGPCb0v-eEpaHPBRExk8toezgB3UdTBKVrghdo10xV107VMtqE-fmh08pvOq2iyYo111Cj_zRQ62D_9dMNC-QbYdZb5w
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=CFAuditChain%3A+Audit+BlockChain+Based+On+Cuckoo+Filter&rft.jtitle=Computer+journal&rft.au=Liu%2C+Kang&rft.au=Lu%2C+Yang&rft.au=Tan%2C+Shiyi&rft.au=Liang%2C+Wei&rft.date=2024-06-24&rft.pub=Oxford+University+Press&rft.issn=0010-4620&rft.eissn=1460-2067&rft.volume=67&rft.issue=6&rft.spage=2208&rft.epage=2218&rft_id=info:doi/10.1093%2Fcomjnl%2Fbxad133&rft.externalDocID=10.1093%2Fcomjnl%2Fbxad133
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0010-4620&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0010-4620&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0010-4620&client=summon