ESDI: An efficient and secure data integrity verification scheme for indoor navigation

被引:0
作者
Liu, Mingxi [1 ,2 ]
Yang, Tailong [1 ]
Shi, Wenbo [1 ]
Vasilakos, Athanasios V.
Lu, Ning [1 ,2 ]
机构
[1] Northeastern Univ, Coll Comp Sci & Engn, 3-11 Wenhua Rd, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ Qinhuangdao, Hebei Key Lab Marine Percept Network & Data Proc, 143 Taishan Rd, Qinhuangdao 066004, Hebei, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2025年 / 168卷
基金
中国国家自然科学基金;
关键词
Indoor navigation; Blockchain; Data integrity verification; Dynamic data updating; ZSS signature; Security protocol; ARCHITECTURE; CLOUD;
D O I
10.1016/j.future.2025.107759
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, indoor navigation software is typically embedded in smartphones as mobile applications. These apps enable users to access cloud-based data while retrieving indoor navigation information. However, cloud data faces risks of tampering and deletion, necessitating verification of its integrity by users. While smartphones possess certain computational capabilities, prolonged execution of computationally intensive tasks can lead to rapid battery depletion. Additionally, excessive storage demands may prompt users to frequently close or even uninstall the apps to free up memory. This paper presents a blockchain-based data integrity verification scheme tailored for indoor navigation. To address storage overhead, we introduce a user-frequency-based selection technique that designates certain blockchain nodes as light nodes. We further propose a Merkle Hash Tree-based proof extraction method to facilitate efficient proof transfer between different types of nodes. Our approach incorporates an efficient Zhang-Safavi-Susilo (ZSS) signature-based data auditing protocol. By leveraging a data label placement mechanism during signature generation, our scheme supports tamper-proof batch verification, significantly reducing computational overhead. To enable dynamic data updates, we design a novel dynamic data structure, the Red-Black Hash Table, which enhances efficiency in handling updates. Through rigorous security analysis, we demonstrate that our scheme effectively defends against forgery, replay, and replacement attacks. We implemented and simulated our solution on smartphones and indoor navigation apps, conducting experimental evaluations using indoor positioning data. We take audit initialization overhead, audit verification computation overhead, evidence storage overhead, consensus computation overhead, etc. as important experimental indicators. Performance results indicate that our scheme, Efficient and Secure Data Integrity (ESDI), improves auditing efficiency by approximately 54% on average compared to existing approaches.
引用
收藏
页数:12
相关论文
共 50 条
[31]   Integrity Verification Scheme for Dynamic Cloud data based on Multi-branching Tree [J].
Li Haoyu ;
Li Qingpeng ;
Zhang Longjun ;
Gao Zhiqiang .
PROCEEDINGS OF 2017 9TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2017, :365-368
[32]   Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage [J].
Khedr, Walid, I ;
Khater, Heba M. ;
Mohamed, Ehab R. .
IEEE ACCESS, 2019, 7 :65635-65651
[33]   Verification Control Algorithm of Data Integrity Verification in Remote Data sharing [J].
Xu, Guangwei ;
Li, Shan ;
Lai, Miaolin ;
Gan, Yanglan ;
Feng, Xiangyang ;
Huang, Qiubo ;
Li, Li ;
Li, Wei .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2022, 16 (02) :565-586
[34]   Map Data Representation for Indoor Navigation [J].
Jeamwatthanachai, Watthanasak ;
Wald, Mike ;
Wills, Gary .
INTERNATIONAL CONFERENCE ON INFORMATION SOCIETY (I-SOCIETY 2016), 2016, :91-96
[35]   Secure data migration from fair contract signing and efficient data integrity auditing in cloud storage [J].
Yang, Changsong ;
Liu, Yueling ;
Ding, Yong ;
Liang, Hai .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 239
[36]   Secure and Efficient Data Sharing for Indoor Positioning with Federated Learning in Mobile Blockchain Networks [J].
Zuo, Yiping ;
Guo, Zhengxin ;
Dai, Chen ;
Guo, Jiajia ;
Xiao, Fu ;
Jin, Shi .
2024 IEEE 99TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2024-SPRING, 2024,
[37]   BAIV: An Efficient Blockchain-Based Anonymous Authentication and Integrity Preservation Scheme for Secure Communication in VANETs [J].
Maria, Azees ;
Rajasekaran, Arun Sekar ;
Al-Turjman, Fadi ;
Altrjman, Chadi ;
Mostarda, Leonardo .
ELECTRONICS, 2022, 11 (03)
[38]   A blockchain-based secure data sharing scheme with efficient attribute revocation [J].
Li, Siyue ;
Niu, Kele ;
Wu, Bin .
JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 159
[39]   DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract [J].
He, Siqi ;
Xing, Xiaofei ;
Wang, Guojun .
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, :1290-1295
[40]   A Secure Storage and Deletion Verification Scheme of Microgrid Data Based on Integrating Blockchain into Edge Computing [J].
Zhang, Lihua ;
Liu, Chunhui ;
Li, Boping ;
Fang, Haodong ;
Gu, Jinguang .
ELECTRONICS, 2022, 11 (23)