Dynamic Outsourced Data Audit Scheme for Merkle Hash Grid-Based Fog Storage With Privacy-Preserving

被引:0
|
作者
Gu, Ke [1 ,2 ]
Wang, XingQiang [1 ]
Li, Xiong [3 ]
机构
[1] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410114, Hunan, Peoples R China
[2] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610054, Sichuan, Peoples R China
[3] Univ Elect Sci & Technol China, Inst Cyber Secur, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2024年 / 9卷 / 04期
基金
中国国家自然科学基金;
关键词
Audit; data storage; fog computing; Merkle hash grid; privacy-preserving; CLOUD; EFFICIENT;
D O I
10.1109/TSUSC.2024.3362074
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of fog computing has been researched and concerned with its development, where malicious attacks pose a greater threat to distributed data storage based on fog computing. Also, the rapid increasing on the number of terminal devices has raised the importance of fog computing-based distributed data storage. In response to this demand, it is essential to establish a secure and privacy-preserving distributed data auditing method that enables security protection of stored data and effective control over identities of auditors. In this paper, we propose a dynamic outsourced data audit scheme for Merkle hash grid-based fog storage with privacy-preserving, where fog servers are used to undertake partial outsourced computation and data storage. Our scheme can provide the function of privacy-preserving for outsourced data by blinding original stored data, and supports data owners to define their auditing access policies by the linear secret-sharing scheme to control the identities of auditors. Further, the construction of Merkle hash grid is used to improve the efficiency of dynamic data operations. Also, a server locating approach is proposed to enable the third-part auditor to identify specific malicious data fog servers within distributed data storage. Under the proposed security model, the security of our scheme can be proved, which can further provide collusion resistance and privacy-preserving for outsourced data. Additionally, both theoretical and experimental evaluations illustrate the efficiency of our proposed scheme.
引用
收藏
页码:695 / 711
页数:17
相关论文
共 50 条
  • [31] A lightweight privacy-preserving scheme with data integrity for smart grid communications
    Bao, Haiyong
    Chen, Le
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (04) : 1094 - 1110
  • [32] A Lightweight Privacy-Preserving Scheme for Metering Data Collection in Smart Grid
    Zeng, Xiaoli
    Liu, Qin
    Huang, Hejiao
    Jia, Xiaohua
    2017 IEEE 18TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2017,
  • [33] An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud
    Zhu, Hui
    Lu, Rongxing
    Huang, Cheng
    Chen, Le
    Li, Hui
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (09) : 7729 - 7739
  • [34] Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid
    Zuo, Xiangjian
    Li, Lixiang
    Peng, Haipeng
    Luo, Shoushan
    Yang, Yixian
    IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 395 - 406
  • [35] Lightweight and Privacy-preserving Fog-assisted Information Sharing Scheme for Health Big Data
    Tang, Wenjuan
    Zhang, Kuan
    Ren, Ju
    Zhang, Yaoxue
    Shen, Xuemin
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [36] A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit
    Yao, Shuan
    Zhang, Dawei
    ELECTRONIC RESEARCH ARCHIVE, 2022, 31 (02): : 729 - 753
  • [37] A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud
    Li, Dong
    Wu, Jiahui
    Le, Junqing
    Liao, Xiaofeng
    Xiang, Tao
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 457 - 469
  • [38] Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud
    Yang, Guangcan
    He, Yunhua
    Xiao, Ke
    Tang, Qifeng
    Xin, Yang
    Zhu, Hongliang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [39] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    APPLIED MATHEMATICS AND COMPUTATION, 2020, 386
  • [40] Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
    Wang X.
    Ma J.
    Miao Y.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (02): : 31 - 39