ESDI: An efficient and secure data integrity verification scheme for indoor navigation

被引:0
|
作者
Liu, Mingxi [1 ,2 ]
Yang, Tailong [1 ]
Shi, Wenbo [1 ]
Vasilakos, Athanasios V.
Lu, Ning [1 ,2 ]
机构
[1] Northeastern Univ, Coll Comp Sci & Engn, 3-11 Wenhua Rd, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ Qinhuangdao, Hebei Key Lab Marine Percept Network & Data Proc, 143 Taishan Rd, Qinhuangdao 066004, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
Indoor navigation; Blockchain; Data integrity verification; Dynamic data updating; ZSS signature; Security protocol; ARCHITECTURE; CLOUD;
D O I
10.1016/j.future.2025.107759
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, indoor navigation software is typically embedded in smartphones as mobile applications. These apps enable users to access cloud-based data while retrieving indoor navigation information. However, cloud data faces risks of tampering and deletion, necessitating verification of its integrity by users. While smartphones possess certain computational capabilities, prolonged execution of computationally intensive tasks can lead to rapid battery depletion. Additionally, excessive storage demands may prompt users to frequently close or even uninstall the apps to free up memory. This paper presents a blockchain-based data integrity verification scheme tailored for indoor navigation. To address storage overhead, we introduce a user-frequency-based selection technique that designates certain blockchain nodes as light nodes. We further propose a Merkle Hash Tree-based proof extraction method to facilitate efficient proof transfer between different types of nodes. Our approach incorporates an efficient Zhang-Safavi-Susilo (ZSS) signature-based data auditing protocol. By leveraging a data label placement mechanism during signature generation, our scheme supports tamper-proof batch verification, significantly reducing computational overhead. To enable dynamic data updates, we design a novel dynamic data structure, the Red-Black Hash Table, which enhances efficiency in handling updates. Through rigorous security analysis, we demonstrate that our scheme effectively defends against forgery, replay, and replacement attacks. We implemented and simulated our solution on smartphones and indoor navigation apps, conducting experimental evaluations using indoor positioning data. We take audit initialization overhead, audit verification computation overhead, evidence storage overhead, consensus computation overhead, etc. as important experimental indicators. Performance results indicate that our scheme, Efficient and Secure Data Integrity (ESDI), improves auditing efficiency by approximately 54% on average compared to existing approaches.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Secure and Efficient Data Integrity Verification Scheme for Cloud Data Storage
    Garg, Neenu
    Nehra, Anushka
    Baza, Mohamed
    Kumar, Neeraj
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [2] Public data integrity verification scheme for secure cloud storage
    Ping Y.
    Zhan Y.
    Lu K.
    Wang B.
    Ping, Yuan (pyuan.lhn@xcu.edu.cn); Wang, Baocang (bcwang79@aliyun.com), 1600, MDPI AG (11):
  • [3] Public Data Integrity Verification Scheme for Secure Cloud Storage
    Ping, Yuan
    Zhan, Yu
    Lu, Ke
    Wang, Baocang
    INFORMATION, 2020, 11 (09)
  • [4] One secure data integrity verification scheme for cloud storage
    Fan, Yongkai
    Lin, Xiaodong
    Tan, Gang
    Zhang, Yuqing
    Dong, Wei
    Lei, Jing
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 : 376 - 385
  • [5] A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature
    Zhu, Hongliang
    Yuan, Ting
    Chen, Yuling
    Zha, Taxing
    Xi, Wanting
    Jia, Bin
    Xin, Yang
    IEEE ACCESS, 2019, 7 : 90036 - 90044
  • [6] An Efficient Data Integrity Verification and Fault-tolerant Scheme
    Gan, Hui
    Chen, Long
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 1157 - 1160
  • [7] An Efficient Data Integrity Verification Scheme For Distributed Fog Computing Architecture
    Sellami, Youssef
    Imine, Youcef
    Gallais, Antoine
    2022 18TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2022,
  • [8] Efficient memory integrity verification and encryption for secure processors
    Suh, GE
    Clarke, D
    Gassend, B
    van Dijk, M
    Devadas, S
    36TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, 2003, : 339 - 350
  • [9] SWHash: An Efficient Data Integrity Verification Scheme Appropriate for USB Flash Disk
    Cheng, Yong
    Wang, Zhiying
    Wu, Jiangjiang
    Mei, Songzhu
    Ren, Jiangchun
    Ma, Jun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 381 - 388
  • [10] An efficient iO-based data integrity verification scheme for cloud storage
    Lixue SUN
    Chunxiang XU
    Yuan ZHANG
    Kefei CHEN
    ScienceChina(InformationSciences), 2019, 62 (05) : 237 - 239