Open Access
ARTICLE
An Improved Blockchain-Based Cloud Auditing Scheme Using Dynamic Aggregate Signatures
1 Key Laboratory for Network and Information Security of the PAP, Chinese People’s Armed Police Force Engineering University, Xi’an, 710086, China
2Chinese People’s Liberation Army Unit 95183, Shaoyang, 422800, China
3 School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, 100876, China
4 Northwest Branch of China Telecom Quantum Information Technology Group Co., Ltd., Xi’an, 710016, China
* Corresponding Author: Xu An Wang. Email:
(This article belongs to the Special Issue: Challenges and Innovations in Multimedia Encryption and Information Security)
Computers, Materials & Continua 2026, 86(2), 1-31. https://doi.org/10.32604/cmc.2025.070030
Received 06 July 2025; Accepted 10 October 2025; Issue published 09 December 2025
Abstract
With the rapid expansion of the Internet of Things (IoT), user data has experienced exponential growth, leading to increasing concerns about the security and integrity of data stored in the cloud. Traditional schemes relying on untrusted third-party auditors suffer from both security and efficiency issues, while existing decentralized blockchain-based auditing solutions still face shortcomings in correctness and security. This paper proposes an improved blockchain-based cloud auditing scheme, with the following core contributions: Identifying critical logical contradictions in the original scheme, thereby establishing the foundation for the correctness of cloud auditing; Designing an enhanced mechanism that integrates multiple hashing with dynamic aggregate signatures, binding encrypted blocks through bilinear pairings and BLS signatures, and improving the scheme by setting parameters based on the Computational Diffie-Hellman (CDH) problem, significantly strengthening data integrity protection and anti-forgery capabilities; Introducing a random challenge mechanism and dynamic parameter adjustment strategy, effectively resisting various attacks such as forgery, tampering, and deletion, significantly improving the detection probability of malicious Cloud Service Providers (CSPs), and significantly reducing the proof generation overhead for CSPs while maintaining the same computational cost for Data Owners. Theoretical analysis and performance evaluation experiments demonstrate that the proposed scheme achieves significant improvements in both security and efficiency. Finally, the paper explores potential applications of the Enhanced Security Scheme in fields such as healthcare, drone swarms, and government office attendance systems, providing an effective approach for building secure, efficient, and decentralized cloud auditing systems.Keywords
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools