Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator

被引:41
|
作者
Ren, Yongjun [1 ]
Qi, Jian [1 ]
Liu, Yepeng [1 ]
Wang, Jin [2 ]
Kim, Gwang-Jun [3 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Peoples R China
[2] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha, Peoples R China
[3] Chonnam Natl Univ, Dept Comp Engn, 96-1 Mt, Gwangju, South Korea
关键词
Sensor data storage; accumulator; data integrity verification; INDUSTRIAL INTERNET; DATA POSSESSION; CLOUD; EDGE; THINGS; IOT; SCHEME; SECURITY; TAXONOMY; QUERIES;
D O I
10.1145/3380749
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the explosive growth in the number of IoT devices, ensuring the integrity of the massive data generated by these devices has become an important issue. Due to the limitation of hardware, most past data integrity verification schemes randomly select partial data blocks and then perform integrity validation on those blocks instead of examining the entire dataset. This will result in that unsampled data blocks cannot be detected even if they are tampered with. To solve this problem, we propose a new and effective integrity auditing mechanism of sensor data based on a bilinear map accumulator. Using the proposed approach will examine all the data blocks in the dataset, not just some of the data blocks, thus, eliminating the possibility of any cloud manipulation. Compared with other schemes, our proposed solution has been proved to be highly secure for all necessary security requirements, including tag forgery, data deletion, replacement, replay, and data leakage attacks. The solution reduces the computational and storage costs of cloud storage providers and verifiers, and also supports dynamic operations for data owners to insert, delete, and update data by using a tag index table (TIT). Compared with existing schemes based on RSA accumulator, our scheme has the advantages of fast verification and witness generation and no need to map data blocks to prime numbers. The new solution supports all the characteristics of a data integrity verification scheme.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud
    Li, Fuxiang
    Zhou, Fucai
    Yuan, Heqing
    Xu, Zifeng
    Wang, Qiang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (11): : 3238 - 3253
  • [2] Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage
    Khedr, Walid, I
    Khater, Heba M.
    Mohamed, Ehab R.
    [J]. IEEE ACCESS, 2019, 7 : 65635 - 65651
  • [3] PIR-based data integrity verification method in sensor network
    Yong-Ki Kim
    Kwangnam Choi
    Jaesoo Kim
    JungHo Seok
    [J]. Journal of Central South University, 2014, 21 : 3883 - 3888
  • [4] PIR-based data integrity verification method in sensor network
    Kim, Yong-Ki
    Choi, Kwangnam
    Kim, Jaesoo
    Seok, JungHo
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2014, 21 (10) : 3883 - 3888
  • [5] PIR-based data integrity verification method in sensor network
    Yong-Ki Kim
    Kwangnam Choi
    Jaesoo Kim
    JungHo Seok
    [J]. Journal of Central South University, 2014, 21 (10) : 3883 - 3888
  • [6] SCALABLE SYSTEM MAP LIBRARY FOR ADDRESS MAP AND DATA INTEGRITY VERIFICATION
    Srinivasa, Prashanth
    [J]. 2013 IEEE 26TH INTERNATIONAL SOC CONFERENCE (SOCC), 2013, : 250 - 255
  • [7] Verification-based data integrity mechanism in smart grid network
    Dari, El Yazid
    Bendahmane, Ahmed
    Essaaidi, Mohamed
    [J]. International Journal of Security and Networks, 2021, 16 (01) : 1 - 11
  • [8] A New Data Integrity Verification Mechanism for SaaS
    Shi, Yuliang
    Zhang, Kun
    Li, Qingzhong
    [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 236 - 243
  • [9] Data Integrity Mechanism Using Hashing Verification
    Hamamreh, Rushdi A.
    Jamoos, Mohammed A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 94 - 98
  • [10] Enhancing Accounting Informatization Through Cloud Data Integrity Verification: A Bilinear Pairing Approach
    Yu, Gui
    [J]. JOURNAL OF THE KNOWLEDGE ECONOMY, 2024,