共 50 条
Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
被引:68
|作者:
Tian, Hui
[1
]
Nan, Fulin
[1
]
Chang, Chin-Chen
[2
]
Huang, Yongfeng
[3
]
Lu, Jing
[4
]
Du, Yongqian
[1
]
机构:
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Feng Chia Univ, Dept Informat & Comp Sci, Taichung 40724, Taiwan
[3] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[4] Natl Huaqiao Univ, Network Technol Ctr, Xiamen 361021, Peoples R China
基金:
中国国家自然科学基金;
关键词:
Public auditing;
Data storage;
Privacy protection;
Data integrity;
Fog-to-cloud computing;
Internet of things;
EFFICIENT;
INTERNET;
THINGS;
D O I:
10.1016/j.jnca.2018.12.004
中图分类号:
TP3 [计算技术、计算机技术];
学科分类号:
0812 ;
摘要:
With increasing popularity of fog-to-cloud based Internet of Things (IoT), how to ensure the integrity of IoT data outsourced in clouds has become one of the biggest security challenges. However, little effort has been put into addressing the problem. To fill this gap, this paper presents a tailor-made public auditing scheme for data storage in fog-to-cloud based IoT scenarios, which can achieve all indispensable performance and security requirements. Particularly, we design a tag-transforming strategy based on the bilinear mapping technique to convert the tags generated by mobile sinks to the ones created by the fog nodes in the phase of proof generation, which cannot only effectively protect the identity privacy, but also reduce the communication and computational costs in the verification phase; moreover, we present a zero-knowledge proof mechanism to verify the integrity of IoT data from various generators (e.g., mobile sinks and fog nodes) while achieving perfect data-privacy preserving. We formally prove the security of our scheme and evaluate its performance by theoretical analysis and comprehensive experiments. The results demonstrate that our scheme can efficiently achieve secure auditing for data storage in fog-to-cloud based IoT scenarios, and outperforms the straight-forward solution in communication and computational costs as well as energy consumption.
引用
收藏
页码:59 / 69
页数:11
相关论文