Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT

被引:3
|
作者
Liu, Dengzhi [1 ,2 ,3 ]
Ding, Yongdong [1 ]
Yu, Geng [1 ]
Zhong, Zhaoman [1 ,3 ]
Song, Yuanzhao [4 ]
机构
[1] Jiangsu Ocean Univ, Sch Comp Engn, Lianyungang 210005, Peoples R China
[2] Jiangsu Inst Marine Resources Dev, Lianyungang 210005, Peoples R China
[3] Jiangsu Ocean Univ, Jiangsu Engn Res Ctr Intelligent Port, Lianyungang 210005, Peoples R China
[4] Gachon Univ, Dept Business, Seongnam 13120, Gyeonggi Do, South Korea
基金
美国国家科学基金会;
关键词
Industry; 5.0; IIoT; Data storage auditing; Regenerating code; ZSS signature; DISTRIBUTED STORAGE; SIGNATURE SCHEME; EFFICIENT; INTEGRITY;
D O I
10.1016/j.iot.2024.101084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A human-centered, sustainable development technological concept from industry 5.0 is rapidly sparking extensive discussions in the academic and professional communities. Massive data need to be outsourced to nearby fog nodes and remote cloud servers due to the constrained resource of terminals in industrial Internet of things (IIoT) in future industry 5.0. However, terminals are skeptical about the credibility of the outsourced data due to the loss of physical data possession. Existing data storage auditing schemes in cloud computing will be performed with high latency, which is not suitable for cloud-fog-assisted IIoT. To improve the computational efficiency and reduce the communication overhead, in this paper, a privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT is proposed. First, a generalized framework of exact reparation regenerating code is employed to encode the data file, which can improve the data storage security in cloud-fog-assisted IIoT. Then, the ZSS signature is used to generate the authentication tag for each encoded data segment. Moreover, a proper data structure is designed to store the encoded data and authenticators in storage servers based on the properties of exact reparation regenerating code, which can efficiently make full use of the fragmented storage space and significantly reduce the latency of data update. Security analysis shows that the proposed scheme provides the resistance of forgery attacks, replacing attacks, replaying attacks and ensures the data privacy. Performance analysis demonstrates that the proposed scheme can be performed with low computational cost and communication overhead that can be well used in cloud-fog-assisted IIoT.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
    Liu, Jian
    Huang, Kun
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1513 - 1528
  • [2] Cryptanalysis and Countermeasures on Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
    Liu, Mei-Ping
    Jiang, Rui
    Kong, Hua-Feng
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONIC INFORMATION ENGINEERING (CEIE 2016), 2016, 116 : 275 - 283
  • [3] Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage"
    Zhang, Jindan
    Lu, Rongxing
    Wang, Baocang
    Wang, Xu An
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1288 - 1289
  • [4] Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
    Tu, Tengfei
    Rao, Lu
    Zhang, Hua
    Wen, Qiaoyan
    Xiao, Jia
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [5] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [6] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [7] Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain
    Miao, Ying
    Huang, Qiong
    Xiao, Meiyan
    Li, Hongbo
    IEEE ACCESS, 2020, 8 : 139813 - 139826
  • [8] Privacy-Preserving Time-Based Auditing for Secure Cloud Storage
    Wang, Min
    Yu, Jia
    Shen, Wenting
    Hao, Rong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 7866 - 7878
  • [9] Preserving privacy using TPA for cloud storage based on regenerating code
    Nadlamani, Geeta F.
    Shaikh, Shabnam
    2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2016,
  • [10] Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code
    Pasupuleti, Syam Kumar
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (04) : 1 - 20