Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT

被引:3
|
作者
Liu, Dengzhi [1 ,2 ,3 ]
Ding, Yongdong [1 ]
Yu, Geng [1 ]
Zhong, Zhaoman [1 ,3 ]
Song, Yuanzhao [4 ]
机构
[1] Jiangsu Ocean Univ, Sch Comp Engn, Lianyungang 210005, Peoples R China
[2] Jiangsu Inst Marine Resources Dev, Lianyungang 210005, Peoples R China
[3] Jiangsu Ocean Univ, Jiangsu Engn Res Ctr Intelligent Port, Lianyungang 210005, Peoples R China
[4] Gachon Univ, Dept Business, Seongnam 13120, Gyeonggi Do, South Korea
基金
美国国家科学基金会;
关键词
Industry; 5.0; IIoT; Data storage auditing; Regenerating code; ZSS signature; DISTRIBUTED STORAGE; SIGNATURE SCHEME; EFFICIENT; INTEGRITY;
D O I
10.1016/j.iot.2024.101084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A human-centered, sustainable development technological concept from industry 5.0 is rapidly sparking extensive discussions in the academic and professional communities. Massive data need to be outsourced to nearby fog nodes and remote cloud servers due to the constrained resource of terminals in industrial Internet of things (IIoT) in future industry 5.0. However, terminals are skeptical about the credibility of the outsourced data due to the loss of physical data possession. Existing data storage auditing schemes in cloud computing will be performed with high latency, which is not suitable for cloud-fog-assisted IIoT. To improve the computational efficiency and reduce the communication overhead, in this paper, a privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT is proposed. First, a generalized framework of exact reparation regenerating code is employed to encode the data file, which can improve the data storage security in cloud-fog-assisted IIoT. Then, the ZSS signature is used to generate the authentication tag for each encoded data segment. Moreover, a proper data structure is designed to store the encoded data and authenticators in storage servers based on the properties of exact reparation regenerating code, which can efficiently make full use of the fragmented storage space and significantly reduce the latency of data update. Security analysis shows that the proposed scheme provides the resistance of forgery attacks, replacing attacks, replaying attacks and ensures the data privacy. Performance analysis demonstrates that the proposed scheme can be performed with low computational cost and communication overhead that can be well used in cloud-fog-assisted IIoT.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Efficient chameleon hashing-based privacy-preserving auditing in cloud storage
    Zhang, Jianhong
    Zhao, Xubing
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 47 - 56
  • [22] Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage
    Yu, Yong
    Mu, Yi
    Ni, Jianbing
    Deng, Jiang
    Huang, Ke
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 28 - 40
  • [23] A privacy-preserving code-based authentication protocol for Internet of Things
    Noureddine Chikouche
    Pierre-Louis Cayrel
    El Hadji Modou Mboup
    Brice Odilon Boidje
    The Journal of Supercomputing, 2019, 75 : 8231 - 8261
  • [24] Privacy-Preserving Public Auditing for Shared Data in Mobile Cloud Storage
    Zhao, Xia'nan
    Wang, Dongsheng
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 486 - 491
  • [25] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [27] User stateless privacy-preserving TPA auditing scheme for cloud storage
    Zhao, Haichun
    Yao, Xuanxia
    Zheng, Xuefeng
    Qiu, Tie
    Ning, Huansheng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 129 : 62 - 70
  • [28] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [29] A privacy-preserving code-based authentication protocol for Internet of Things
    Chikouche, Noureddine
    Cayrel, Pierre-Louis
    Mboup, El Hadji Modou
    Boidje, Brice Odilon
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (12): : 8231 - 8261
  • [30] Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT
    Yang, Yutao
    Miao, Yinbin
    Ying, Zuobin
    Ning, Jianting
    Meng, Xiangdong
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18): : 16990 - 17001