An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing

被引:2
作者
Liu, Meng [1 ,2 ]
Wang, Xuan [1 ]
Yang, Chi [3 ]
Jiang, Zoe Lin [1 ]
Li, Ye [1 ]
机构
[1] Harbin Inst Technol, Shenzhen Grad Sch, Comp Applicat Res Ctr, Shenzhen 518055, Peoples R China
[2] Shandong Univ, Sch Mech Elect & Informat Engn, Weihai, Peoples R China
[3] CSIRO, Canberra, ACT, Australia
来源
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 2017年 / 13卷 / 01期
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
Internet of things data; cloud storage; integrity auditing; third-party auditing; pairing-based cryptography; INTEGRITY VERIFICATION; BIG DATA;
D O I
10.1177/1550147716686579
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, an increasing number of cloud users including both individuals and enterprises store their Internet of things data in cloud for benefits like cost saving. However, the cloud storage service is often regarded to be untrusted due to their loss of direct control over the data. Hence, it is necessary to verify the integrity of their data on cloud storage servers via a third party. In real cloud systems, it is very important to improve the performance of the auditing protocol. Hence, the well-designed and cost-effective auditing protocol is expected to meet with the performance requirement while the data size is very large in real cloud systems. In this article, we also propose an auditing protocol based on pairing-based cryptography, which can reduce the computation cost compared to the state-of-the-art third-party auditing protocol. Moreover, we also study how to determine the number of sectors to achieve the optimal performance of our auditing protocol in a case of the same challenged data. And an equation for computing the optimal number of sectors is proposed to further improve the performance of our auditing protocol. Both the mathematical analysis method and experiment results show that our solution is more efficient.
引用
收藏
页数:11
相关论文
共 24 条
[1]  
[Anonymous], 04429 LAAS
[2]  
[Anonymous], 2008, P 4 INT C SEC PRIV C, DOI 10.1145/1460877.1460889
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[5]  
Deswarte Y., 2003, INTEGRITY INTERNAL C, P1, DOI [10.1007/1-4020-7901-X_1, DOI 10.1007/1-4020-7901-X_1]
[6]   State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing [J].
Diaz, Manuel ;
Martin, Cristian ;
Rubio, Bartolome .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 67 :99-117
[7]  
Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
[8]  
Filho D. L. G., 2006, Cryptol. ePrint Arch., V1, P150
[9]  
Kim D, 2015, MULTIMED TOOLS APPL, V75, P1
[10]   Smart Objects as Building Blocks for the Internet of Things [J].
Kortuem, Gerd ;
Kawsar, Fahim ;
Fitton, Daniel ;
Sundramoorthy, Vasughi .
IEEE INTERNET COMPUTING, 2010, 14 (01) :44-51