An Efficient Data Integrity Verification Scheme For Distributed Fog Computing Architecture

被引:2
作者
Sellami, Youssef [1 ]
Imine, Youcef [1 ]
Gallais, Antoine [1 ]
机构
[1] Univ Polytech Hauts de France Valenciennes, LAMIH UMR CNRS 8201, Valenciennes, France
来源
2022 18TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB) | 2022年
关键词
Data integrity; Fog computing; Security; Lattice-based cryptography; Distributed networks;
D O I
10.1109/WIMOB55322.2022.9941581
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a promising computing paradigm that provides computing services close to end-users at edge of the network. Therefore, it supports large-scale, geographically distributed and latency-sensitive applications. However, due to its untrusty nature, numerous security challenges must be overcome. The integrity verification of the data in fog computing context is one of the main challenges to tackle. Indeed, most of existing solutions consider a centralized data storage context, and usually rely on a trusted third party to check data integrity. However, these approaches are not suitable for fog computing architecture, since the data is stored in a dynamic and a completely distributed manner. Motivated by these challenges, we propose in this paper, a new efficient public verification scheme that protects the integrity of the data in fog computing architecture. Our scheme secures data integrity and authenticity based on the short integer solution SIS problem and the identity-based signatures. In addition, it allows to efficiently verify the integrity of data, even when it is separately shared on multiple servers. This verification can be performed by any end-user on the architecture, and without relying on any trusted third party. Finally, we show through extensive simulation that our solution is highly effective and outperforms existing solutions.
引用
收藏
页数:6
相关论文
共 18 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
Aljumah A, 2018, 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC 2018), P237, DOI 10.1109/ICCCC.2018.8390464
[3]  
[Anonymous], 2019, SECUR COMMUN NETW, V2019
[4]  
[Anonymous], 2005, EFFICIENT CONTENT AU
[5]  
Blomer J., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P711, DOI 10.1145/301250.301441
[6]   Foundations and Evolution of Modern Computing Paradigms: Cloud, IoT, Edge, and Fog [J].
De Donno, Michele ;
Tange, Koen ;
Dragoni, Nicola .
IEEE ACCESS, 2019, 7 :150936-150948
[7]   Efficient identity based signature schemes based on pairings [J].
Hess, F .
SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 :310-324
[8]   Secure Cloud Storage Service Using Bloom Filters for the Internet of Things [J].
Jeong, Junho ;
Joo, Jong Wha J. ;
Lee, Yangsun ;
Son, Yunsik .
IEEE ACCESS, 2019, 7 :60897-60907
[9]  
L'Ecuyer P., 1994, Annals of Operations Research, V53, P77, DOI 10.1007/BF02136827
[10]   ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability [J].
Liang, Xueping ;
Shetty, Sachin ;
Tosh, Deepak ;
Kamhoua, Charles ;
Kwiat, Kevin ;
Njilla, Laurent .
2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, :468-477