A privacy preserving batch audit scheme for IoT based cloud data storage

被引:0
|
作者
Ganesh, S. Milton [1 ]
Priya, S. [2 ]
Ravi, Vinayakumar [3 ]
Alsuhibany, Suliman A. [4 ]
机构
[1] Anna Univ, Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604307, Tamilnadu, India
[2] Manipal Acad Higher Educ, Manipal Inst Technol Bengaluru, Dept Informat Technol, Manipal, India
[3] Prince Mohammad Bin Fahd Univ, Ctr Artificial Intelligence, Khobar, Saudi Arabia
[4] Qassim Univ, Coll Comp, Dept Comp Sci, Buraydah 51452, Saudi Arabia
关键词
Data auditing; Cloud storage; Internet of Things; Identity-based cryptography; VERIFICATION; CHECKING;
D O I
10.1007/s12083-024-01890-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the digitalization boom witnesses the culmination of the Internet of Things (IoT), the big data and the cloud storage which is further fueled by data analytics techniques to identify useful patterns from the data stored in the cloud to understand the business and the government processes alike. In this competitive scenario, it is equally important to ensure the intactness of the big data stored in the cloud from the IoT sensors. Though many data audit schemes have been proposed till date, very few notable works have been proposed towards IoT based data storage. Apart from this, the previous protocols incur relatively more computational and communication overheads and they lack support for privacy'. Hence, the proposed approach strives to provide data audit for the IoT based cloud data storage in three dimensions. Proposing a novel data audit protocol to suit the IoT based systems is the first dimension of this research work. The second dimension utilizes identity-based cryptography to provide anonymous identity thereby preserving the privacy of the data aggregation gateways. The third dimension ensures the proposed protocol to suit resource constrained environments with the relatively cheaper computation and the communication overheads. The implementation results provide convincing evidence that the proposed protocol performs better than the significant works existing in the literature.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] An Identity Privacy Preserving IoT Data Protection Scheme for Cloud Based Analytics
    Gehrmann, Christian
    Gunnarsson, Martin
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5744 - 5753
  • [2] An ORAM-based privacy preserving data sharing scheme for cloud storage
    Yuan, Dandan
    Song, Xiangfu
    Xu, Qiuliang
    Zhao, Minghao
    Wei, Xiaochao
    Wang, Hao
    Jiang, Han
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 39 : 1 - 9
  • [3] Efficient Privacy Preserving Data Audit in Cloud
    Hai-Van Dang
    Thai-Son Tran
    Duc-Than Nguyen
    Bui, Thach V.
    Dinh-Thuc Nguyen
    ADVANCED COMPUTATIONAL METHODS FOR KNOWLEDGE ENGINEERING, 2015, 358 : 185 - 196
  • [4] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [5] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    Cluster Computing, 2019, 22 : 9767 - 9775
  • [6] An IoT data sharing privacy preserving scheme
    Sun, Yan
    Yin, Lihua
    Sun, Zhe
    Tian, Zhihong
    Du, Xiaojiang
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 984 - 990
  • [7] An Improved Scheme of Privacy Preserving Based on Lagrange Interpolation in Cloud Storage
    Jin, Yu
    Wang, Yadan
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 424 - 428
  • [8] A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT
    Deng, Hua
    Qin, Zheng
    Sha, Letian
    Yin, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11601 - 11611
  • [9] Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
    Tu, Tengfei
    Rao, Lu
    Zhang, Hua
    Wen, Qiaoyan
    Xiao, Jia
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [10] A Wew Remote Data Integrity Checking Scheme for Cloud storage With Privacy Preserving
    Yan, Xiangtao
    Li, Yifa
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 704 - 708