Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data

被引:2
|
作者
Tian, Hui [1 ,2 ,3 ]
Peng, Fang [1 ,2 ,3 ]
Quan, Hanyu [1 ,4 ]
Chang, Chin-Chen [5 ]
机构
[1] Natl Huaqiao Univ, Coll Comp Sci & Technol, Xiamen 361021, Peoples R China
[2] Wuhan Natl Lab Optoelect, Wuhan 430074, Peoples R China
[3] Natl Huaqiao Univ, Xiamen Key Lab Data Secur & BlockchainTechnol, Xiamen 361021, Peoples R China
[4] Natl Huaqiao Univ, Xiamen Key Lab Data Secur & Blockchain Technol, Xiamen 361021, Peoples R China
[5] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
基金
中国国家自然科学基金;
关键词
Public auditing; data integrity; internet of vehicles; cloud storage; data mapping table; DATA POSSESSION; SHARED DATA; EFFICIENT; SERVICES; PRIVACY;
D O I
10.1145/3433543
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Vehicles (IoV), with the help of cloud computing, can provide rich and powerful application services for vehicles and drivers by sharing and analysing various IoV data. However, how to ensure the integrity of IoV data with multiple sources and diversity outsourced in the cloud is still an open challenge. To address this concern, this paper first presents an identity-based public auditing scheme for cloud storage of IoV data, which can fully achieve the essential function and security requirements, such as classified auditing, multi-source auditing and privacy protection. Particularly, we design a new authenticated data structure, called data mapping table, to track the distribution of each type of IoV data to ensure fine and rapid audits. Moreover, our scheme can reduce the overheads for both the key management and the generation of block tags. We formally prove the security of the presented scheme and evaluate its performance by comprehensive comparisons with the state-of-the-art schemes designed for traditional scenarios. The theoretical analyses and experimental results demonstrate that our scheme can securely and efficiently realize public auditing for IoV data, and outperforms the previous ones in both the computation and communication overheads in most cases.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
    He, Debiao
    Wang, Huaqun
    Zhang, Jianhong
    Wang, Lina
    [J]. INFORMATION SCIENCES, 2017, 375 : 48 - 53
  • [2] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Wu, Li-bing
    Wang, Jing
    He, De-biao
    Khan, Muhammad-Khurram
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 1972 - 1977
  • [3] Cryptanalysis of an identity-based public auditing protocol for cloud storage
    Li-bing Wu
    Jing Wang
    De-biao He
    Muhammad-Khurram Khan
    [J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18 : 1972 - 1977
  • [4] Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
    Zhao, Chenbin
    Xu, Li
    Li, Jiguo
    Wang, Feng
    Fang, He
    [J]. IEEE ACCESS, 2019, 7 : 160459 - 160471
  • [5] A Lightweight Identity-Based Remote Data Auditing Scheme for Cloud Storage
    Deng, Lunzhi
    Yang, Benjuan
    Wang, Xiangbin
    [J]. IEEE ACCESS, 2020, 8 : 206396 - 206405
  • [6] Enabling identity-based cloud storage public auditing with quantum computers resistance
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (01) : 82 - 98
  • [7] Efficient Identity-Based Public Integrity Auditing of Shared Data in Cloud Storage With User Privacy Preserving
    Yan, Hao
    Gui, Wenming
    [J]. IEEE ACCESS, 2021, 9 : 45822 - 45831
  • [8] Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
    Li, Yannan
    Yu, Yong
    Min, Geyong
    Susilo, Willy
    Ni, Jianbing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (01) : 72 - 83
  • [9] Efficient Identity-based Public Auditing Scheme for Cloud Storage from Lattice Assumption
    Zhang, Xiaojun
    Xu, Chunxiang
    [J]. 2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 1819 - 1826
  • [10] Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10434 - 10445