Loading…

A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage

Edge computing has low transmission delay and unites more agile interconnected devices spread across geographies, which enables cloud-edge storage more suitable for distributed data sharing. This paper proposes a trustworthy and reliable multi-keyword search (TRMS) in blockchain-assisted cloud-edge...

Full description

Saved in:
Bibliographic Details
Published in:Peer-to-peer networking and applications 2024-03, Vol.17 (2), p.985-1000
Main Authors: Liu, Xingchen, Zhang, Shaohui, Huang, Haiping, Malekian, Reza
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Edge computing has low transmission delay and unites more agile interconnected devices spread across geographies, which enables cloud-edge storage more suitable for distributed data sharing. This paper proposes a trustworthy and reliable multi-keyword search (TRMS) in blockchain-assisted cloud-edge storage, where data users can choose a faster search based on edge servers or a wider search based on cloud servers. To acquire trustworthy search results and find reliable servers, the blockchain-based smart contract is introduced in our scheme, which will execute the search algorithm and update the score-based trust management model. In this way, search results and trust scores will be published and recorded on the blockchain. By checking search results, data users can judge whether the returned documents are top - k documents. Based on the trust management model, we can punish the malicious behavior of search servers, while data users can choose more reliable servers based on trust scores. To improve efficiency, we design a threshold-based depth-first search algorithm. Extensive experiments are simulated on Hyperledger Fabric v2.4.1, which demonstrate our scheme (with 16 threads) can reduce the time cost of index construction by 92% and the time cost of search by 82%, approximately. Security analysis and extensive experiments can prove the security and efficiency of the proposed scheme.
ISSN:1936-6442
1936-6450
1936-6450
DOI:10.1007/s12083-024-01635-9