ESDI: An efficient and secure data integrity verification scheme for indoor navigation

被引:0
|
作者
Liu, Mingxi [1 ,2 ]
Yang, Tailong [1 ]
Shi, Wenbo [1 ]
Vasilakos, Athanasios V.
Lu, Ning [1 ,2 ]
机构
[1] Northeastern Univ, Coll Comp Sci & Engn, 3-11 Wenhua Rd, Shenyang 110819, Liaoning, Peoples R China
[2] Northeastern Univ Qinhuangdao, Hebei Key Lab Marine Percept Network & Data Proc, 143 Taishan Rd, Qinhuangdao 066004, Hebei, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2025年 / 168卷
基金
中国国家自然科学基金;
关键词
Indoor navigation; Blockchain; Data integrity verification; Dynamic data updating; ZSS signature; Security protocol; ARCHITECTURE; CLOUD;
D O I
10.1016/j.future.2025.107759
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, indoor navigation software is typically embedded in smartphones as mobile applications. These apps enable users to access cloud-based data while retrieving indoor navigation information. However, cloud data faces risks of tampering and deletion, necessitating verification of its integrity by users. While smartphones possess certain computational capabilities, prolonged execution of computationally intensive tasks can lead to rapid battery depletion. Additionally, excessive storage demands may prompt users to frequently close or even uninstall the apps to free up memory. This paper presents a blockchain-based data integrity verification scheme tailored for indoor navigation. To address storage overhead, we introduce a user-frequency-based selection technique that designates certain blockchain nodes as light nodes. We further propose a Merkle Hash Tree-based proof extraction method to facilitate efficient proof transfer between different types of nodes. Our approach incorporates an efficient Zhang-Safavi-Susilo (ZSS) signature-based data auditing protocol. By leveraging a data label placement mechanism during signature generation, our scheme supports tamper-proof batch verification, significantly reducing computational overhead. To enable dynamic data updates, we design a novel dynamic data structure, the Red-Black Hash Table, which enhances efficiency in handling updates. Through rigorous security analysis, we demonstrate that our scheme effectively defends against forgery, replay, and replacement attacks. We implemented and simulated our solution on smartphones and indoor navigation apps, conducting experimental evaluations using indoor positioning data. We take audit initialization overhead, audit verification computation overhead, evidence storage overhead, consensus computation overhead, etc. as important experimental indicators. Performance results indicate that our scheme, Efficient and Secure Data Integrity (ESDI), improves auditing efficiency by approximately 54% on average compared to existing approaches.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Data Integrity Verification Scheme for Privacy Protection and Fair Payment
    Fu Y.
    Li Q.
    Zhang Z.
    Gao T.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (06): : 1343 - 1355
  • [32] A New Data Integrity Verification Scheme with Low Communication Cost
    An, Fanglin
    Ye, Jun
    Guo, Zhen
    JOURNAL OF INTERNET TECHNOLOGY, 2023, 24 (02): : 283 - 290
  • [33] The Dynamic Data Integrity Verification and Recovery Scheme based on MHT
    Aizezi, Yasen
    Feng, Yuhua
    Yu, Li
    Sun, Guozi
    2018 15TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED VIDEO AND SIGNAL BASED SURVEILLANCE (AVSS), 2018, : 568 - 573
  • [34] A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment
    Cao, Laicheng
    He, Wenwen
    Guo, Xian
    Feng, Tao
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [35] Lightweight integrity verification scheme for cloud based group data
    Liu Y.-F.
    Wang Y.-J.
    Fu S.-J.
    Tongxin Xuebao/Journal on Communications, 2016, 37 : 140 - 146
  • [36] Data Integrity Verification Scheme Based on Blockchain Smart Contract
    Zhang, Kai
    Xiao, He
    Liu, Qiuming
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 857 - 863
  • [37] Performance of Merkle Signature Scheme in Data Integrity Verification at Client
    Mary, D. Sophia Navis
    Gopinathan, S.
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2020, 15 (04): : 1285 - 1293
  • [38] A secure regenerating code-based cloud storage with efficient integrity verification
    Lakshmi, V. S.
    Deepthi, P. P.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (09)
  • [39] An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data
    Reddy N.C.S.
    Madhuravani B.
    Sneha D.P.
    SN Computer Science, 2020, 1 (3)
  • [40] Secure watermark verification scheme
    Liu, YL
    Wen, G
    Yao, HX
    Song, YX
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2002, PROCEEDING, 2002, 2532 : 477 - 484