Dynamic Outsourced Data Audit Scheme for Merkle Hash Grid-Based Fog Storage With Privacy-Preserving

被引:0
|
作者
Gu, Ke [1 ,2 ]
Wang, XingQiang [1 ]
Li, Xiong [3 ]
机构
[1] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410114, Hunan, Peoples R China
[2] Adv Cryptog & Syst Secur Key Lab Sichuan Prov, Chengdu 610054, Sichuan, Peoples R China
[3] Univ Elect Sci & Technol China, Inst Cyber Secur, Sch Comp Sci & Engn, Chengdu 611731, Sichuan, Peoples R China
来源
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING | 2024年 / 9卷 / 04期
基金
中国国家自然科学基金;
关键词
Audit; data storage; fog computing; Merkle hash grid; privacy-preserving; CLOUD; EFFICIENT;
D O I
10.1109/TSUSC.2024.3362074
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of fog computing has been researched and concerned with its development, where malicious attacks pose a greater threat to distributed data storage based on fog computing. Also, the rapid increasing on the number of terminal devices has raised the importance of fog computing-based distributed data storage. In response to this demand, it is essential to establish a secure and privacy-preserving distributed data auditing method that enables security protection of stored data and effective control over identities of auditors. In this paper, we propose a dynamic outsourced data audit scheme for Merkle hash grid-based fog storage with privacy-preserving, where fog servers are used to undertake partial outsourced computation and data storage. Our scheme can provide the function of privacy-preserving for outsourced data by blinding original stored data, and supports data owners to define their auditing access policies by the linear secret-sharing scheme to control the identities of auditors. Further, the construction of Merkle hash grid is used to improve the efficiency of dynamic data operations. Also, a server locating approach is proposed to enable the third-part auditor to identify specific malicious data fog servers within distributed data storage. Under the proposed security model, the security of our scheme can be proved, which can further provide collusion resistance and privacy-preserving for outsourced data. Additionally, both theoretical and experimental evaluations illustrate the efficiency of our proposed scheme.
引用
收藏
页码:695 / 711
页数:17
相关论文
共 50 条
  • [41] A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
    Lu, Rongxing
    Heung, Kevin
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    IEEE ACCESS, 2017, 5 : 3302 - 3312
  • [42] Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks
    Shah, Kaushal A.
    Jinwala, Devesh C.
    COMPUTER JOURNAL, 2018, 61 (04) : 614 - 628
  • [43] A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid
    Zhang, Yueyu
    Chen, Jie
    Zhou, Hua
    Dang, Lanjun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (02): : 617 - 636
  • [44] PPMM-DA: Privacy-Preserving Multidimensional and Multisubset Data Aggregation With Differential Privacy for Fog-Based Smart Grids
    Zhao, Shuai
    Xu, Shuhua
    Han, Song
    Ren, Siqi
    Wang, Ye
    Chen, Zhixian
    Chen, Xiaoli
    Lin, Jianhong
    Liu, Weinan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 6096 - 6110
  • [45] A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain
    Xu, Guangquan
    Qi, Chen
    Dong, Wenyu
    Gong, Lixiao
    Liu, Shaoying
    Chen, Si
    Liu, Jian
    Zheng, Xi
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) : 698 - 709
  • [46] Dynamic Privacy-Preserving Anonymous Authentication Scheme for Condition-Matching in Fog-Cloud-Based VANETs
    Zhan, Yonghua
    Xie, Weipeng
    Shi, Rui
    Huang, Yunhu
    Zheng, Xianghan
    SENSORS, 2024, 24 (06)
  • [47] Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system
    Maurya, Chanchal
    Chaurasiya, Vijay Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (26) : 40443 - 40472
  • [48] Privacy-preserving aggregate signcryption scheme with allowing dynamic updating of pseudonyms for fog-based smart grids
    Kunchang Li
    Yifan Yang
    Shuhao Wang
    Peer-to-Peer Networking and Applications, 2022, 15 : 2101 - 2115
  • [49] A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains
    Zhang, Chuan
    Wang, Zihao
    Liang, Jinwen
    Liu, Mengxuan
    Deng, Haotian
    Zhu, Liehuang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2540 - 2553
  • [50] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Wang, Lina
    Choo, Kim-Kwang Raymond
    APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 : 31 - 43