Privacy-preserving public auditing for secure data storage in fog-to-cloud computing

被引:68
|
作者
Tian, Hui [1 ]
Nan, Fulin [1 ]
Chang, Chin-Chen [2 ]
Huang, Yongfeng [3 ]
Lu, Jing [4 ]
Du, Yongqian [1 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Feng Chia Univ, Dept Informat & Comp Sci, Taichung 40724, Taiwan
[3] Tsinghua Univ, Dept Elect Engn, Beijing 100084, Peoples R China
[4] Natl Huaqiao Univ, Network Technol Ctr, Xiamen 361021, Peoples R China
基金
中国国家自然科学基金;
关键词
Public auditing; Data storage; Privacy protection; Data integrity; Fog-to-cloud computing; Internet of things; EFFICIENT; INTERNET; THINGS;
D O I
10.1016/j.jnca.2018.12.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With increasing popularity of fog-to-cloud based Internet of Things (IoT), how to ensure the integrity of IoT data outsourced in clouds has become one of the biggest security challenges. However, little effort has been put into addressing the problem. To fill this gap, this paper presents a tailor-made public auditing scheme for data storage in fog-to-cloud based IoT scenarios, which can achieve all indispensable performance and security requirements. Particularly, we design a tag-transforming strategy based on the bilinear mapping technique to convert the tags generated by mobile sinks to the ones created by the fog nodes in the phase of proof generation, which cannot only effectively protect the identity privacy, but also reduce the communication and computational costs in the verification phase; moreover, we present a zero-knowledge proof mechanism to verify the integrity of IoT data from various generators (e.g., mobile sinks and fog nodes) while achieving perfect data-privacy preserving. We formally prove the security of our scheme and evaluate its performance by theoretical analysis and comprehensive experiments. The results demonstrate that our scheme can efficiently achieve secure auditing for data storage in fog-to-cloud based IoT scenarios, and outperforms the straight-forward solution in communication and computational costs as well as energy consumption.
引用
收藏
页码:59 / 69
页数:11
相关论文
共 50 条
  • [31] An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
    Tian, Jun-Feng
    Wang, Hao-Ning
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [32] Lattice-Based Privacy-Preserving and Forward-Secure Cloud Storage Public Auditing Scheme
    Li, Haifeng
    Liu, Liangliang
    Lan, Caihui
    Wang, Caifen
    Guo, He
    IEEE ACCESS, 2020, 8 : 86797 - 86809
  • [33] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    Anbuchelian, S.
    Sowmya, C. M.
    Ramesh, C.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 4): : S9767 - S9775
  • [34] Efficient and secure auditing scheme for privacy preserving data storage in cloud
    S. Anbuchelian
    C. M. Sowmya
    C. Ramesh
    Cluster Computing, 2019, 22 : 9767 - 9775
  • [35] Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud
    Tu, Tengfei
    Rao, Lu
    Zhang, Hua
    Wen, Qiaoyan
    Xiao, Jia
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [36] A survey of public auditing for secure data storage in cloud computing
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [37] Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage
    Gautam, Deepika
    Prajapat, Sunil
    Kumar, Pankaj
    Das, Ashok Kumar
    Cengiz, Korhan
    Susilo, Willy
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 8159 - 8172
  • [38] Pseudo-ID-based public auditing with privacy-preserving for cloud storage
    Liu, Xue-Yan
    He, Xiao-Mei
    Lu, Ting-Ting
    Journal of Computers (Taiwan), 2020, 31 (03) : 154 - 167
  • [39] Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
    Liu, Jian
    Huang, Kun
    Rong, Hong
    Wang, Huimei
    Xian, Ming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1513 - 1528
  • [40] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    Li, Hongwei, 1600, Institute of Electrical and Electronics Engineers Inc. (07): : 11460 - 11472