A Blockchain-Based Security Model for Cloud Accounting Data

A Blockchain-Based Security Model for Cloud Accounting Data

Congcong Gou, Xiaoqing Deng
Copyright: © 2023 |Pages: 16
DOI: 10.4018/IJACI.332860
Article PDF Download
Open access articles are freely available for download

Abstract

The popularity of cloud accounting is due to its low cost of entry, efficient data processing, and high business efficiency. However, security issues in cloud storage can affect user trust in the service. To address these security issues, a blockchain-based encryption technology model for cloud accounting data security is proposed. Firstly, the feasibility of integrating blockchain technology and cloud accounting is analyzed. Then, an elliptic curve cryptography-based cloud accounting data security solution is proposed. Blockchain and evidence chain technology are used to ensure data security and support data privacy protection for cloud service providers and third-party auditors. The proposed solution has a small computational overhead, as it does not require exponentiation or bilinear pairing. Experimental results show the proposed solution can enhance user control over cloud accounting data, ensure data transmission security, and improve trust between users and cloud accounting service providers. Moreover, it is more efficient.
Article Preview
Top

Introduction

In recent years, the importance of cloud accounting has become increasingly significant, with many small- and medium-sized enterprises and organizations using cloud accounting. The cloud accounting model has become one of the main directions of accounting information development (Moll & Yigitbasioglu, 2019; Huttunen et al., 2019). Unlike traditional accounting models, users only need to store their accounting data in the cloud to obtain low-cost, efficient, and flexible online accounting services. At the same time, users can be freed from the high costs of updating accounting software, regularly maintaining financial information systems, and building data storage infrastructure.

Despite the significant advantages of cloud accounting, there are also security issues that users need to be aware of when enjoying the convenience of cloud storage services, including: a) the cloud storage model separates the ownership and control of user data, and the cloud service provider (CSP) may intentionally delete data that users do not frequently access for economic purposes; b) CSP (Content Security Policy) may experience software failures and hardware damage, leading to the loss or damage of user data; and c) data stored in the cloud may be maliciously damaged by other users (Parast et al., 2022). Ensuring and verifying the security and integrity of cloud accounting data and establishing an effective protection mechanism for cloud accounting data have become urgent tasks in promoting the development of cloud accounting.

To address the issue of cloud data integrity verification, audit schemes have emerged. Early cloud audit (CA) schemes generate absolute evidence, and auditors need to access all original data, resulting in significant computational and communication overhead (Gudeme et al., 2019). Provable data possession (PDP) schemes only select partial data for integrity auditing and can ultimately confirm the integrity of all data with a high probability, reducing the computational and communication overhead of auditors. PDP schemes use homomorphic tags, which can aggregate all tags and have high flexibility. Based on whether the auditor of the integrity scheme is the user or a TPA (Third Party Auditor), they can be divided into private CA schemes and public CA schemes (Rabaninejad et al., 2019).

In private CA schemes, the private key of users will not be leaked, but it requires significant computational and communication overhead, which is a burden for users with limited device resources. Public CA schemes delegate the data possession verification to TPA, and TPA can audit on behalf of users with only a small amount of public information, reducing the burden on users and being able to monitor the behaviors of users and the cloud (Wang et al., 2019). However, TPA schemes have the following disadvantages: a) single point of failure, as all users' cloud data are audited by a unique TPA, the entire audit system will collapse once the TPA fails; b) performance bottleneck, as the number of cloud users and the scale of cloud data increase, the audit time and network overhead of TPA schemes will increase significantly, making TPA the bottleneck of the entire audit system; and c) data privacy, in TPA schemes, TPA may combine user metadata and audit data to infringe user privacy (Razaque et al., 2021).

To reduce computational overhead and improve audit efficiency, many CA schemes based on elliptic curve cryptography (ECC) have been proposed. Xue et al. (2019) proposed an identity-based CA scheme based on ECC, which uses the user identity information as a public key to solve the complex certificate management problem. In addition, malicious deceptive behaviors from TPA can be detected by checking the audit results in batches. Huang et al. (2020) proposed a certificateless CA scheme to solve the complex certificate management issues and the key escrow problem, and batch auditing was also supported. Ming and Shi (2019) proposed a privacy-preserving certificateless CA scheme that has higher audit efficiency compared to the CA scheme based on Bohen-Lynn-Shacham (BLS) signatures.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 1 Issue (2023)
Volume 13: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing