ESDI: An efficient and secure data integrity verification scheme for indoor navigation

被引:0
|
作者
Liu, Mingxi [1 ,2 ]
Yang, Tailong [1 ]
Shi, Wenbo [1 ]
Vasilakos, Athanasios V.
Lu, Ning [1 ,2 ]
机构
[1] Northeastern Univ, Coll Comp Sci & Engn, 3-11 Wenhua Rd, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ Qinhuangdao, Hebei Key Lab Marine Percept Network & Data Proc, 143 Taishan Rd, Qinhuangdao 066004, Hebei, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2025年 / 168卷
基金
中国国家自然科学基金;
关键词
Indoor navigation; Blockchain; Data integrity verification; Dynamic data updating; ZSS signature; Security protocol; ARCHITECTURE; CLOUD;
D O I
10.1016/j.future.2025.107759
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, indoor navigation software is typically embedded in smartphones as mobile applications. These apps enable users to access cloud-based data while retrieving indoor navigation information. However, cloud data faces risks of tampering and deletion, necessitating verification of its integrity by users. While smartphones possess certain computational capabilities, prolonged execution of computationally intensive tasks can lead to rapid battery depletion. Additionally, excessive storage demands may prompt users to frequently close or even uninstall the apps to free up memory. This paper presents a blockchain-based data integrity verification scheme tailored for indoor navigation. To address storage overhead, we introduce a user-frequency-based selection technique that designates certain blockchain nodes as light nodes. We further propose a Merkle Hash Tree-based proof extraction method to facilitate efficient proof transfer between different types of nodes. Our approach incorporates an efficient Zhang-Safavi-Susilo (ZSS) signature-based data auditing protocol. By leveraging a data label placement mechanism during signature generation, our scheme supports tamper-proof batch verification, significantly reducing computational overhead. To enable dynamic data updates, we design a novel dynamic data structure, the Red-Black Hash Table, which enhances efficiency in handling updates. Through rigorous security analysis, we demonstrate that our scheme effectively defends against forgery, replay, and replacement attacks. We implemented and simulated our solution on smartphones and indoor navigation apps, conducting experimental evaluations using indoor positioning data. We take audit initialization overhead, audit verification computation overhead, evidence storage overhead, consensus computation overhead, etc. as important experimental indicators. Performance results indicate that our scheme, Efficient and Secure Data Integrity (ESDI), improves auditing efficiency by approximately 54% on average compared to existing approaches.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Modelling a secure framework for data verification and integrity in cloud environment
    Nagesh, Puvvada
    Srinivasu, N.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022,
  • [22] A Cloud Data Integrity Verification Scheme Based on Blockchain
    Bai, Yi
    Zhou, Zequan
    Luo, Xiling
    Wang, Xiaochao
    Liu, Feng
    Xu, Yifu
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 357 - 363
  • [23] Secure Outsourced Data Transfer with Integrity Verification in Cloud Storage
    Ni, Jianbing
    Lin, Xiaodong
    Zhang, Kuan
    Yu, Yong
    Shen, Xuemin
    2016 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2016,
  • [24] HB+-MHT: Lightweight and Efficient Data Integrity Verification Scheme for Cloud Virtual Machines
    Yang, Zhi
    Li, Xiaopeng
    Jin, Shuyuan
    Sun, Lei
    Zhang, Zhao
    Yang, Baoshan
    Du, Xuehui
    Chao, Fan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [25] An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users
    Ganesh, S. Milton
    Manikandan, S. P.
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [26] A Blockchain-Based Efficient Data Integrity Verification Scheme in Multi-Cloud Storage
    Zhang, Yiran
    Geng, Huizheng
    Su, Li
    Lu, Li
    IEEE ACCESS, 2022, 10 : 105920 - 105929
  • [27] Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments
    Rong, Hong
    Wang, Huimei
    Liu, Jian
    Wu, Wei
    Xian, Ming
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 236 - 243
  • [28] Efficient HEVC Integrity Verification Scheme for Multimedia Cybersecurity Applications
    Faragallah, Osama S.
    Afifi, Ashraf
    El-Sayed, Hala S.
    Alzain, Mohammed A.
    Al-Amri, Jehad F.
    El-Samie, Fathi E. Abd
    El-Shafai, Walid
    IEEE ACCESS, 2020, 8 : 167069 - 167089
  • [29] An improved data integrity verification scheme in cloud storage system
    Zhou, En-Guang
    Li, Zhou-Jun
    Guo, Hua
    Jia, Yang-Li
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2014, 42 (01): : 150 - 154
  • [30] A symmetric cryptographic scheme for data integrity verification in cloud databases
    Ferretti, Luca
    Marchetti, Mirco
    Andreolini, Mauro
    Colajanni, Michele
    INFORMATION SCIENCES, 2018, 422 : 497 - 515