Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Papers|更新时间:2024-06-05
|
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
Journal on CommunicationsVol. 42, Issue 7, Pages: 52-60(2021)
作者机构:
1. 南京邮电大学计算机学院,江苏 南京 210023
2. 南京航空航天大学计算机科学与技术学院,江苏 南京 210016
3. 武汉大学国家网络安全学院,湖北 武汉 430072
4. 福建师范大学数学与信息学院,福建 福州 350007
作者简介:
基金信息:
The National Natural Science Foundation of China(61941116);The National Natural Science Foundation of China(61972294);The National Natural Science Foundation of China(62072104)
Huaqun WANG, Zhe LIU, Debiao HE, et al. Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud[J]. Journal on Communications, 2021, 42(7): 52-60.
DOI:
Huaqun WANG, Zhe LIU, Debiao HE, et al. Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud[J]. Journal on Communications, 2021, 42(7): 52-60. DOI: 10.11959/j.issn.1000-436x.2021077.
Identity-based provable data possession scheme for multi-source IoT terminal data in public cloud
To solve the problem of multi-source IoT data integrity verification
identity-based provable data possession for multi-source IoT terminal in public cloud (ID-MPDP) was proposed.Firstly
the formal definitions of system model and security model of ID-MPDP were given.Then
the specific ID-MPDP scheme was designed by using RSA.Finally
the performance analysis and security analysis of ID-MPDP were given.Through performance analysis and security analysis
ID-MPDP was provably secure
efficient and convertible.It has the following advantages
such as it can be used for the integrity checking for multi-source IoT terminal data
it has lower block expansion rate
it eliminates the certification management cost by using the identity-based public key cryptography and it is convertible.
关键词
Keywords
references
ATENIESE G , BURNS R , CURTMOLA R , et al . Provable data possession at untrusted stores [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . New York:ACM Press , 2007 : 598 - 607 .
JUELS A , KALISKI B S J . PoRs:proofs of retrievability for large files [C ] // Proceedings of the 14th ACM Conference on Computer and Communications Security . New York:ACM Press , 2007 : 584 - 597 .
SHACHAM H , WATERS B . Compact proofs of retrievability [J ] . Journal of Cryptology , 2013 , 26 : 442 - 483 .
WANG H Q , WANG Q H , HE D B . Blockchain-based private provable data possession [J ] . IEEE Transactions on Dependable and Secure Computing , 2019 , PP ( 99 ): 1 .
LI Y N , YU Y , CHEN R N , et al . IntegrityChain:provable data possession for decentralized storage [J ] . IEEE Journal on Selected Areas in Communications , 2020 , 38 ( 36 ): 1205 - 1217 .
CHEN R N , LI Y N , YU Y , et al . Blockchain-based dynamic provable data possession for smart cities [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 35 ): 4143 - 4154 .
NI J B , ZHANG K , YU Y , et al . Identity-based provable data possession from RSA assumption for secure cloud storage [J ] . IEEE Transactions on Dependable and Secure Computing , 2020 , PP ( 99 ): 1 .
WANG H Q , WU Q H , QIN B , et al . Identity-based remote data possession checking in public clouds [J ] . IET Information Security , 2014 , 8 ( 32 ): 114 - 121 .
GUO W , ZHANG H , QIN S J , et al . Outsourced dynamic provable data possession with batch update for secure cloud storage [J ] . Future Generation Computer Systems , 2019 , 95 : 309 - 322 .
ZHOU L , FU A M , YANG G M , et al . Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics [J ] . IEEE Transactions on Dependable and Secure Computing , 2020 , PP ( 99 ): 1 .
WANG H Q , HE D B , FU A M , et al . Provable data possession with outsourced data transfer [J ] . IEEE Transactions on Services Computing , 2019 , PP ( 99 ): 1 .
WANG H Q , HE D B , YU J , et al . Incentive and unconditionally anonymous identity-based public provable data possession [J ] . IEEE Transactions on Services Computing , 2019 , 12 ( 35 ): 824 - 835 .
裴定一 , 祝跃飞 . 算法数论 [M ] .第2版. 北京 : 科学出版社 , 2015 .
PEI D Y , ZHU Y F . Algorithmic number theory.second edition [M ] . Beijing : Science Press , 2015 .
YU Y , XUE L , AU M H , et al . Cloud data integrity checking with an identity-based auditing mechanism from RSA [J ] . Future Generation Computer Systems , 2016 , 62 : 85 - 91 .
ZHANG J H , LI P Y , SUN Z , et al . ID-based data integrity auditing scheme from RSA with resisting key exposure [C ] // Provable Security . Berlin:Springer , 2016 : 83 - 100 .