ESDI: An efficient and secure data integrity verification scheme for indoor navigation

被引:0
作者
Liu, Mingxi [1 ,2 ]
Yang, Tailong [1 ]
Shi, Wenbo [1 ]
Vasilakos, Athanasios V.
Lu, Ning [1 ,2 ]
机构
[1] Northeastern Univ, Coll Comp Sci & Engn, 3-11 Wenhua Rd, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ Qinhuangdao, Hebei Key Lab Marine Percept Network & Data Proc, 143 Taishan Rd, Qinhuangdao 066004, Hebei, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2025年 / 168卷
基金
中国国家自然科学基金;
关键词
Indoor navigation; Blockchain; Data integrity verification; Dynamic data updating; ZSS signature; Security protocol; ARCHITECTURE; CLOUD;
D O I
10.1016/j.future.2025.107759
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, indoor navigation software is typically embedded in smartphones as mobile applications. These apps enable users to access cloud-based data while retrieving indoor navigation information. However, cloud data faces risks of tampering and deletion, necessitating verification of its integrity by users. While smartphones possess certain computational capabilities, prolonged execution of computationally intensive tasks can lead to rapid battery depletion. Additionally, excessive storage demands may prompt users to frequently close or even uninstall the apps to free up memory. This paper presents a blockchain-based data integrity verification scheme tailored for indoor navigation. To address storage overhead, we introduce a user-frequency-based selection technique that designates certain blockchain nodes as light nodes. We further propose a Merkle Hash Tree-based proof extraction method to facilitate efficient proof transfer between different types of nodes. Our approach incorporates an efficient Zhang-Safavi-Susilo (ZSS) signature-based data auditing protocol. By leveraging a data label placement mechanism during signature generation, our scheme supports tamper-proof batch verification, significantly reducing computational overhead. To enable dynamic data updates, we design a novel dynamic data structure, the Red-Black Hash Table, which enhances efficiency in handling updates. Through rigorous security analysis, we demonstrate that our scheme effectively defends against forgery, replay, and replacement attacks. We implemented and simulated our solution on smartphones and indoor navigation apps, conducting experimental evaluations using indoor positioning data. We take audit initialization overhead, audit verification computation overhead, evidence storage overhead, consensus computation overhead, etc. as important experimental indicators. Performance results indicate that our scheme, Efficient and Secure Data Integrity (ESDI), improves auditing efficiency by approximately 54% on average compared to existing approaches.
引用
收藏
页数:12
相关论文
共 50 条
[21]   Blockchain-Based Data Integrity Verification Scheme in AIoT Cloud-Edge Computing Environment [J].
Li, Yi ;
Shen, Jian ;
Ji, Sai ;
Lai, Ying-Hsun .
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 :12556-12565
[22]   An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT [J].
Yu, Jiguo ;
Yan, Biwei ;
Qi, Huayi ;
Wang, Shengling ;
Cheng, Wei .
IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (01) :178-191
[23]   A secure and efficient authentication and data sharing scheme for Internet of based on blockchain [J].
Fan, Qing ;
Chen, Jianhua ;
Deborah, Lazarus Jegatha ;
Luo, Min .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 117
[24]   A secure and efficient outsourced computation on data sharing scheme for privacy computing [J].
Fan, Kai ;
Liu, Tingting ;
Zhang, Kuan ;
Li, Hui ;
Yang, Yintang .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 :169-176
[25]   Fuzzy Verification Method for Indoor-Navigation Systems [J].
Petrova, O. ;
Tabunshchyk, G. ;
Kapliienko, T. ;
Kapliienko, O. .
2018 14TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET), 2018, :65-68
[26]   Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain [J].
Zhang, Lejun ;
Peng, Minghui ;
Wang, Weizheng ;
Su, Yansen ;
Cui, Shuna ;
Kim, Seokhoon .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01) :499-515
[27]   A Secure and Efficient Data Sharing and Searching Scheme in Wireless Sensor Networks [J].
Zhu, Binrui ;
Susilo, Willy ;
Qin, Jing ;
Guo, Fuchun ;
Zhao, Zhen ;
Ma, Jixin .
SENSORS, 2019, 19 (11)
[28]   A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory [J].
He, Siqi ;
Xing, Xiaofei ;
Wang, Guojun ;
Sun, Zeyu .
IEEE ACCESS, 2023, 11 :59675-59687
[29]   A blockchain-based dynamic and traceable data integrity verification scheme for smart homes [J].
Chen, Chunliang ;
Wang, Liangliang ;
Long, Yu ;
Luo, Yiyuan ;
Chen, Kefei .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 130
[30]   Integrity Verification Scheme for Dynamic Cloud data based on Multi-branching Tree [J].
Li Haoyu ;
Li Qingpeng ;
Zhang Longjun ;
Gao Zhiqiang .
PROCEEDINGS OF 2017 9TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2017, :365-368