Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT

被引:3
|
作者
Liu, Dengzhi [1 ,2 ,3 ]
Ding, Yongdong [1 ]
Yu, Geng [1 ]
Zhong, Zhaoman [1 ,3 ]
Song, Yuanzhao [4 ]
机构
[1] Jiangsu Ocean Univ, Sch Comp Engn, Lianyungang 210005, Peoples R China
[2] Jiangsu Inst Marine Resources Dev, Lianyungang 210005, Peoples R China
[3] Jiangsu Ocean Univ, Jiangsu Engn Res Ctr Intelligent Port, Lianyungang 210005, Peoples R China
[4] Gachon Univ, Dept Business, Seongnam 13120, Gyeonggi Do, South Korea
基金
美国国家科学基金会;
关键词
Industry; 5.0; IIoT; Data storage auditing; Regenerating code; ZSS signature; DISTRIBUTED STORAGE; SIGNATURE SCHEME; EFFICIENT; INTEGRITY;
D O I
10.1016/j.iot.2024.101084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A human-centered, sustainable development technological concept from industry 5.0 is rapidly sparking extensive discussions in the academic and professional communities. Massive data need to be outsourced to nearby fog nodes and remote cloud servers due to the constrained resource of terminals in industrial Internet of things (IIoT) in future industry 5.0. However, terminals are skeptical about the credibility of the outsourced data due to the loss of physical data possession. Existing data storage auditing schemes in cloud computing will be performed with high latency, which is not suitable for cloud-fog-assisted IIoT. To improve the computational efficiency and reduce the communication overhead, in this paper, a privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT is proposed. First, a generalized framework of exact reparation regenerating code is employed to encode the data file, which can improve the data storage security in cloud-fog-assisted IIoT. Then, the ZSS signature is used to generate the authentication tag for each encoded data segment. Moreover, a proper data structure is designed to store the encoded data and authenticators in storage servers based on the properties of exact reparation regenerating code, which can efficiently make full use of the fragmented storage space and significantly reduce the latency of data update. Security analysis shows that the proposed scheme provides the resistance of forgery attacks, replacing attacks, replaying attacks and ensures the data privacy. Performance analysis demonstrates that the proposed scheme can be performed with low computational cost and communication overhead that can be well used in cloud-fog-assisted IIoT.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing
    Xu, Yan
    Ding, Long
    Cui, Jie
    Zhong, Hong
    Yu, Jia
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3730 - 3739
  • [42] Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage
    Zhao, Yubo
    Chang, Jinyong
    COMPUTER NETWORKS, 2022, 216
  • [43] Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing
    Zhao, Pu
    Yu, Jia
    Zhang, Hanlin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (03) : 635 - 650
  • [44] Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage
    Guan, Xuening
    Chang, Jinyong
    Zhang, Wei
    COMPUTER COMMUNICATIONS, 2024, 224 : 285 - 301
  • [45] Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT
    Lee, Cheng-Yi
    Liu, Zi-Yuan
    Tso, Raylin
    Tseng, Yi-Fan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
  • [46] AN EFFICIENT, DYNAMIC, PRIVACY PRESERVING PUBLIC AUDITING METHOD ON UNTRUSTED CLOUD STORAGE
    Navajothi, R.
    Fenelon, S. Jean Adrien
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [47] Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data
    Shen, Wenting
    Yu, Jia
    Yang, Guangyang
    Zhang, Yue
    Fu, Zhangjie
    Hao, Rong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3319 - 3338
  • [48] A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme
    Xiao, Ke
    Geng, Ziye
    He, Yunhua
    Xu, Gang
    Wang, Chao
    Cheng, Wei
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 542 - 554
  • [49] Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage
    Du, Minxin
    Wang, Qian
    He, Meiqi
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2320 - 2332
  • [50] Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage
    Gautam, Deepika
    Prajapat, Sunil
    Kumar, Pankaj
    Das, Ashok Kumar
    Cengiz, Korhan
    Susilo, Willy
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 8159 - 8172