Securing IoT Data: FDUP-RDICA Fully Decentralized Approach for Privacy-Preserving and Efficient Data Integrity

被引:4
作者
Peng, Su [1 ]
Kumar, Neeraj [2 ,3 ]
Alsamhi, Saeed Hamood [4 ,5 ]
He, Qiang [6 ]
Zhao, Liang [7 ]
机构
[1] Hainan Univ, Sch Cryptol, Sch Cyberspace Secur, Haikou 570228, Peoples R China
[2] Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, India
[3] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Networks & Commun, Dammam 34212, Saudi Arabia
[4] Univ Galway, Insight Ctr Data Analyt, Galway H91 TK33, Ireland
[5] IBB Univ, Fac Engn, Ibb, Yemen
[6] Northeastern Univ, Sch Med & Biol Informat Engn, Shenyang 110169, Peoples R China
[7] Shenyang Aerosp Univ, Sch Comp Sci, Shenyang 110136, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 20期
基金
中国国家自然科学基金;
关键词
Internet of Things; Blockchains; Cloud computing; Performance evaluation; Security; Data integrity; Computer architecture; Blockchain; data integrity; Internet of Things (IoT); privacy-preserving; CLOUD STORAGE;
D O I
10.1109/JIOT.2024.3412224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By the limitations of storage capacity and computing power, Internet of Things (IoT) devices may prefer to outsource their valuable and sensitive data to cloud storage providers (CSPs) for further analysis, so it is critical to design protocols that can verify the integrity of these data remotely, while preserving the privacy of their owners. This article proposes a novel remote data integrity checking method for IoT, namely, FDUP-remote data integrity checking (RDIC), which achieves fully decentralized, efficient, and unconditionally privacy-preserving checking simultaneously, that is, the proof-checking is performed efficiently on the blockchain by the smart contracts integrated with native C/C++ codes, while the blockchain or any other entity cannot learn any information about the data content, even they have unbounded computing power. Furthermore, it is optimized for low-power IoT devices by greatly reducing the exponentiations of generating homomorphic verifiable tags to be nearly independent of the block size of the outsourced data. To defend against untrusted IoT and CSP, we present strict proofs and analyses in the aspect of correctness, soundness, and unconditionally privacy-preserving. The evaluation of theoretical performance and the prototype system deployed on a blockchain platform indicate that FDUP-RDIC is suitable for real-world IoT applications.
引用
收藏
页码:32824 / 32837
页数:14
相关论文
共 35 条
[1]  
[Anonymous], ETHEREUM COMMUNITY
[2]  
[Anonymous], 2020, iPerf-the ultimate speed test tool for TCP, UDP and SCTP: ESnet/lawrence Berkeley national laboratory
[3]  
[Anonymous], 2021, PCMag
[4]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]  
Bellare M, 1993, P 1 ACM C COMP COMM, P62, DOI DOI 10.1145/168588.168596
[6]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[7]  
Brands S. A., 1993, Rep. CS-R932
[8]  
Britannica Inc. Chicago IL USA, Internet of Things
[9]   Generic groups, collision resistance, and ECDSA [J].
Brown, DRL .
DESIGNS CODES AND CRYPTOGRAPHY, 2005, 35 (01) :119-152
[10]   Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT [J].
Fan, Kuan ;
Bao, Zijian ;
Liu, Mingxi ;
Vasilakos, Athanasios V. ;
Shi, Wenbo .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 :665-674