浏览全部资源
扫码关注微信
1. 南京邮电大学计算机学院,江苏 南京 210023
2. 南京航空航天大学计算机科学与技术学院,江苏 南京 210016
3. 武汉大学国家网络安全学院,湖北 武汉 430072
4. 福建师范大学数学与信息学院,福建 福州 350007
[ "王化群(1974− ),男,江苏南京人,博士,南京邮电大学教授、博士生导师,主要研究方向为应用密码学、区块链技术、未来移动通信安全等" ]
[ "刘哲(1986− ),男,江苏南京人,博士,南京航空航天大学教授、博士生导师,主要研究方向为密码学、区块链技术、人工智能安全与应用等" ]
[ "何德彪(1980− ),男,湖北武汉人,博士,武汉大学教授、博士生导师,主要研究方向为密码协议、信息安全、区块链技术与应用等" ]
[ "李继国(1970− ),男,黑龙江富裕人,博士,福建师范大学教授、博士生导师,主要研究方向为密码学理论与技术、信息安全、云计算安全" ]
网络出版日期:2021-07,
纸质出版日期:2021-07-25
移动端阅览
王化群, 刘哲, 何德彪, 等. 公有云中身份基多源IoT终端数据PDP方案[J]. 通信学报, 2021,42(7):52-60.
Huaqun WANG, Zhe LIU, Debiao HE, et al. Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud[J]. Journal on communications, 2021, 42(7): 52-60.
王化群, 刘哲, 何德彪, 等. 公有云中身份基多源IoT终端数据PDP方案[J]. 通信学报, 2021,42(7):52-60. DOI: 10.11959/j.issn.1000-436x.2021077.
Huaqun WANG, Zhe LIU, Debiao HE, et al. Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud[J]. Journal on communications, 2021, 42(7): 52-60. DOI: 10.11959/j.issn.1000-436x.2021077.
针对公有云中多源物联网(IoT)数据完整性验证问题,提出了一种身份基多源 IoT 终端数据可证明数据持有(ID-MPDP)方案。首先,给出了ID-MPDP方案的系统模型和安全模型的形式化定义。然后,使用RSA设计了具体的ID-MPDP方案。最后,给出了该方案的性能分析和安全性分析。性能分析和安全性分析结果表明,该方案是可证安全的、高效和可转换的,并具有以下优势:可用于多源IoT终端的数据完整性检测;具有较低的块扩展率;使用身份基公钥密码技术,消除了证书管理;满足可转换性。
To solve the problem of multi-source IoT data integrity verification
identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly
the formal definitions of system model and security model of ID-MPDP were given.Then
the specific ID-MPDP scheme was designed by using RSA.Finally
the performance analysis and security analysis of ID-MPDP were given.Through performance analysis and security analysis
ID-MPDP was provably secure
efficient and convertible.It has the following advantages
such as it can be used for the integrity checking for multi-source IoT terminal data
it has lower block expansion rate
it eliminates the certification management cost by using the identity-based public key cryptography and it is convertible.
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . New York:ACM Press , 2007 : 598 - 607 .
JUELS A , KALISKI B S J . PoRs:proofs of retrievability for large files [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . New York:ACM Press , 2007 : 584 - 597 .
SHACHAM H , WATERS B . Compact proofs of retrievability [J ] . Journal of Cryptology , 2013 , 26 : 442 - 483 .
WANG H Q , WANG Q H , HE D B . Blockchain-based private provable data possession [J ] . IEEE Transactions on Dependable and Secure Computing , 2019 , PP ( 99 ): 1 .
LI Y N , YU Y , CHEN R N , et al . IntegrityChain:provable data possession for decentralized storage [J ] . IEEE Journal on Selected Areas in Communications , 2020 , 38 ( 36 ): 1205 - 1217 .
CHEN R N , LI Y N , YU Y , et al . Blockchain-based dynamic provable data possession for smart cities [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 35 ): 4143 - 4154 .
NI J B , ZHANG K , YU Y , et al . Identity-based provable data possession from RSA assumption for secure cloud storage [J ] . IEEE Transactions on Dependable and Secure Computing , 2020 , PP ( 99 ): 1 .
WANG H Q , WU Q H , QIN B , et al . Identity-based remote data possession checking in public clouds [J ] . IET Information Security , 2014 , 8 ( 32 ): 114 - 121 .
GUO W , ZHANG H , QIN S J , et al . Outsourced dynamic provable data possession with batch update for secure cloud storage [J ] . Future Generation Computer Systems , 2019 , 95 : 309 - 322 .
ZHOU L , FU A M , YANG G M , et al . Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics [J ] . IEEE Transactions on Dependable and Secure Computing , 2020 , PP ( 99 ): 1 .
WANG H Q , HE D B , FU A M , et al . Provable data possession with outsourced data transfer [J ] . IEEE Transactions on Services Computing , 2019 , PP ( 99 ): 1 .
WANG H Q , HE D B , YU J , et al . Incentive and unconditionally anonymous identity-based public provable data possession [J ] . IEEE Transactions on Services Computing , 2019 , 12 ( 35 ): 824 - 835 .
裴定一 , 祝跃飞 . 算法数论 [M ] .第2版. 北京 : 科学出版社 , 2015 .
PEI D Y , ZHU Y F . Algorithmic number theory.second edition [M ] . Beijing : Science Press , 2015 .
YU Y , XUE L , AU M H , et al . Cloud data integrity checking with an identity-based auditing mechanism from RSA [J ] . Future Generation Computer Systems , 2016 , 62 : 85 - 91 .
ZHANG J H , LI P Y , SUN Z , et al . ID-based data integrity auditing scheme from RSA with resisting key exposure [C ] // Provable Security . Berlin:Springer , 2016 : 83 - 100 .
0
浏览量
591
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构