{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:42:59Z","timestamp":1769060579974,"version":"3.49.0"},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"3","funder":[{"name":"Cisco University Research Program Fund, CyberGrants","award":["698039"],"award-info":[{"award-number":["698039"]}]},{"name":"Silicon Valley Community Foundation and also partially supported by the European Research Council (ERC) under the European Union\u2019s Horizon 2020 research","award":["771527-BROWSEC"],"award-info":[{"award-number":["771527-BROWSEC"]}]},{"name":"Austrian Science Fund (FWF) through the projects PROFET","award":["P31621"],"award-info":[{"award-number":["P31621"]}]},{"name":"project","award":["W1255-N23"],"award-info":[{"award-number":["W1255-N23"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2025,9,30]]},"abstract":"<jats:p>Data owners upload large files to cloud storage servers, but malicious servers may potentially tamper data. To check integrity of remote data, Proof-of-retrievability (PoR) schemes were introduced. Existing PoR protocols assume that data owners and third-party auditors are honest and audit only the potentially malicious cloud server to check integrity of stored data. In this article, we consider a system where any party may attempt to cheat others and consider collusion cases. We design a protocol, Cumulus, that is secure under such adversarial assumptions and use blockchain smart contracts to act as mediator in case of dispute and payment settlement. We use state channels to reduce blockchain interactions in order to build a practical audit solution. The security of the protocol has been proven in Universal Composability (UC) framework. Finally, we illustrate several applications of our basic protocol and evaluate practicality of our approach via a prototype implementation for fairly selling large files over the Ethereum platform. We evaluate the prototype and show that our scheme has comparable performance.<\/jats:p>","DOI":"10.1145\/3672570","type":"journal-article","created":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T10:55:35Z","timestamp":1730804135000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Cumulus: Blockchain-Enabled Privacy-Preserving Data Audit in Cloud"],"prefix":"10.1145","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6142-9378","authenticated-orcid":false,"given":"Prabal","family":"Banerjee","sequence":"first","affiliation":[{"name":"Avail and Indian Statistical Institute, Kolkata, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4245-9680","authenticated-orcid":false,"given":"Nishant","family":"Nikam","sequence":"additional","affiliation":[{"name":"Unaffiliated"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3089-2535","authenticated-orcid":false,"given":"Subhra","family":"Mazumdar","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Indore, Indore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-6709","authenticated-orcid":false,"given":"Sushmita","family":"Ruj","sequence":"additional","affiliation":[{"name":"University of New South Wales, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,8,22]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMvcm0706789"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660310"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_31"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_19"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_11"},{"key":"e_1_3_3_7_2","unstructured":"Juan Benet. 2014. \\(\\{\\) IPFS \\(\\}\\) - Content Addressed Versioned \\(\\{\\) P2P \\(\\}\\) File System. arXiv:1407.3561v1. Retrieved from https:\/\/arxiv.org\/abs\/1407.3561v1"},{"key":"e_1_3_3_8_2","first-page":"1","article-title":"Filecoin: A decentralized storage network.","author":"Benet Juan","year":"2018","unstructured":"Juan Benet and Nicola Greco. 2018. Filecoin: A decentralized storage network. Protocol Labs (2018), 1\u201336.","journal-title":"Protocol Labs"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"e_1_3_3_10_2","unstructured":"Joseph Bonneau Jeremy Clark and Steven Goldfeder. 2015. On Bitcoin as a Public Randomness Source. Cryptology ePrint Archive Report 2015\/1015. Retrieved from https:\/\/eprint.iacr.org\/2015\/1015"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134060"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9216-2"},{"key":"e_1_3_3_15_2","first-page":"749","volume-title":"Proceedings of the International Conference on USENIX Security Symposium.","author":"Dautrich Jonathan","year":"2014","unstructured":"Jonathan Dautrich, Elaine Shi, and Emil Stefanov. 2014. Burst ORAM: Minimizing ORAM response times for bursty access patterns. In Proceedings of the International Conference on USENIX Security Symposium. USENIX, 749\u2013764. Retrieved from https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/dautrich"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_8"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00036"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243857"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00020"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"e_1_3_3_21_2","first-page":"678","article-title":"PoReps: Proofs of space on useful data","volume":"2018","author":"Fisch Ben","year":"2018","unstructured":"Ben Fisch. 2018. PoReps: Proofs of space on useful data. IACR Cryptology ePrint Archive 2018 (2018), 678.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.007"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_11"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660380"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0276212"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102545"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3144430"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-71852-7_14"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986664"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103718"},{"key":"e_1_3_3_35_2","unstructured":"Ben Lynn. 2019. PBC Library - Pairing-Based Cryptography. Retrieved from https:\/\/crypto.stanford.edu\/pbc\/"},{"key":"e_1_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Rahul Mishra Dharavath Ramesh Salil S Kanhere and Damodar Reddy Edla. 2022. Enabling efficient deduplication and secure decentralized public auditing for cloud storage: A redactable blockchain approach. ACM Transactions on Management Information Systems (2022).","DOI":"10.1145\/3578555"},{"key":"e_1_3_3_37_2","unstructured":"Tal Moran and Ilan Orlov. 2016. Simple Proofs of Space-Time and Rational Proofs of Storage. Cryptology ePrint Archive Paper 2016\/035. Retrieved from https:\/\/eprint.iacr.org\/2016\/035"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/1462153.1462155"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2820713"},{"key":"e_1_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3036641"},{"key":"e_1_3_3_41_2","unstructured":"Sunoo Park Albert Kwon Georg Fuchsbauer Peter Ga\u017ei Jo\u00ebl Alwen and Krzysztof Pietrzak. 2015. SpaceMint: A Cryptocurrency Based on Proofs of Space. Cryptology ePrint Archive Report 2015\/528. Retrieved from https:\/\/eprint.iacr.org\/2015\/528"},{"key":"e_1_3_3_42_2","first-page":"203","volume-title":"Journal of Mathematical Cryptology","volume":"12","author":"Paterson Maura B.","year":"2016","unstructured":"Maura B. Paterson, Douglas R. Stinson, and Jalaj Upadhyay. 2016. Multi-prover proof of retrievability. Journal of Mathematical Cryptology 12 (2016), 203\u2013220."},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102454"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10838-008-9062-0"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897915"},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2017.2767584"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.5555\/1361397.1361408"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3237221"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102427"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3114160"},{"key":"e_1_3_3_52_2","unstructured":"Nik U. 2022. Golang Documentation of PBC Library. Retrieved from https:\/\/godoc.org\/github.com\/Nik-U\/pbc"},{"key":"e_1_3_3_53_2","unstructured":"David Vorick and Luke Champine. 2014. Sia: Simple Decentralized Storage. Technical Report. Retrieved from https:\/\/sia.tech\/sia.pdf"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.01.051"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2656461"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11203-9_19"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","unstructured":"Shawn Wilkinson Tome Boshevski Josh Brandoff James Prestwich Gordon Hall Patrick Gerbes Philip Hutchins and Chris Pollard. 2014. Storj A Peer-to-Peer Cloud Storage Network. Technical Report. 01933973. DOI: 10.1016\/j.appdev.2004.09.001","DOI":"10.1016\/j.appdev.2004.09.001"},{"key":"e_1_3_3_59_2","unstructured":"Gavin Wood. 2014. Ethereum: A Secure Decentralised Generalised Transaction Ledger EIP-150 Revision. In Ethereum Project Yellow Paper. Retrieved from https:\/\/arxiv.org\/abs\/1011.1669v3"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.06.002"},{"key":"e_1_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3005610"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102453"},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3159152"},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848154"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.06.007"},{"key":"e_1_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3057771"},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2631951"},{"key":"e_1_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2015.05.001"}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:29:20Z","timestamp":1755880160000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672570"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,22]]},"references-count":67,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9,30]]}},"alternative-id":["10.1145\/3672570"],"URL":"https:\/\/doi.org\/10.1145\/3672570","relation":{},"ISSN":["2769-6480"],"issn-type":[{"value":"2769-6480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,22]]},"assertion":[{"value":"2023-04-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}