A verifiable data integrity scheme for distributed data sharing in fog computing architecture

被引:12
作者
Sellami, Youssef [1 ]
Imine, Youcef [1 ]
Gallais, Antoine [1 ]
机构
[1] Univ Polytech Hauts de France, LAMIH UMR CNRS 8201, Valenciennes, France
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2024年 / 150卷
关键词
Data integrity; Fog computing; Security; Lattice -based cryptography; Distributed networks; Identity based signatures; AUDITING PROTOCOL; CLOUD STORAGE; VERIFICATION;
D O I
10.1016/j.future.2023.08.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Fog computing is a promising computing paradigm that brings computing resources close to end users at the edge of the network. Hence, it handles large-scale, geographically distributed, and latencysensitive services. However, there are several security challenges that must be addressed due to the unreliable nature of this architecture. One can cite the verification of data integrity among the most critical issues in the context of fog computing. In fact, since data is often stored dynamically in a fully distributed manner, traditional solutions based on a centralized third-party auditor for integrity verification become unsuitable for such highly dynamic and distributed contexts. Indeed, the constant transfer of data to and from the central auditor results in high network latency and potential bottlenecks.Therefore, in this paper, we propose a new efficient public verification protocol that ensures the integrity of the data in fog computing architecture. Our solution protects data integrity and authenticity using the short integer solution problem (SIS) and identity-based signatures. Moreover, in order to legitimately modify the data, our protocol allows to distributively identify the data owners and to delegate their signatures to other entities in the architecture. Furthermore, it enables effective data integrity verification even when data is separately shared across several servers. This verification can be performed by any legitimate end user connected to the architecture, and without relying on any trusted third party. Finally, we prove that our protocol is highly efficient and outperforms existing solutions, as demonstrated by our extensive simulations and thorough security analysis that confirmed its security.
引用
收藏
页码:64 / 77
页数:14
相关论文
共 48 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
Aljumah A, 2018, 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), P237, DOI 10.1109/ICCCC.2018.8390464
[3]  
Blomer J., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P711, DOI 10.1145/301250.301441
[4]  
bloomberg, Metaverse market growth
[5]   New Landscapes of the Data Stream Processing in the era of Fog Computing [J].
Cardellini, Valeria ;
Mencagli, Gabriele ;
Talia, Domenico ;
Torquati, Massimo .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 99 :646-650
[6]  
de Assunçao MD, 2018, J NETW COMPUT APPL, V103, P1, DOI [10.1016/j.jnea.2017.12.001, 10.1016/j.jnca.2017.12.001]
[7]   Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog [J].
De Donno, Michele ;
Tange, Koen ;
Dragoni, Nicola .
IEEE ACCESS, 2019, 7 :150936-150948
[8]   Edge data integrity verification scheme supporting data dynamics and batch auditing [J].
Ding, Yan ;
Li, Yanping ;
Yang, Wenjie ;
Zhang, Kai .
JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128
[9]   A First Look at Identity Management Schemes on the Blockchain [J].
Dunphy, Paul ;
Petitcolas, Fabien A. P. .
IEEE SECURITY & PRIVACY, 2018, 16 (04) :20-29
[10]   One secure data integrity verification scheme for cloud storage [J].
Fan, Yongkai ;
Lin, Xiaodong ;
Tan, Gang ;
Zhang, Yuqing ;
Dong, Wei ;
Lei, Jing .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :376-385