当前位置: X-MOL 学术Int. J. Distrib. Sens. Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
International Journal of Distributed Sensor Networks ( IF 1.9 ) Pub Date : 2020-05-01 , DOI: 10.1177/1550147720916623
Jun-Feng Tian 1, 2 , Hao-Ning Wang 1, 2
Affiliation  

With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. This article proposes an efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios, which can better meet performance and security requirements. The proposed scheme realizes data sharing under the condition of protecting privacy by encrypting sensitive information. Using the private key separation method, the private key is divided into two parts using identity information generation and random selection which are, respectively, held by the user and the fog center. Then, using the two-time signature method, the Internet of things and fog computing center use two parts of the private key to generate the original signature and final signature in two separate times. Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. Security analysis and performance evaluation show that the proposed scheme is safe and efficient.

中文翻译:

基于雾到云计算的物联网场景高效安全数据审计方案

随着基于雾到云计算的物联网设备的广泛使用,如何保证上传到云端的数据的完整性成为最重要的安全问题之一。本文针对物联网场景提出了一种基于雾到云计算的高效、安全的数据审计方案,能够更好地满足性能和安全要求。该方案通过对敏感信息进行加密,在保护隐私的条件下实现数据共享。采用私钥分离方法,通过身份信息生成和随机选择将私钥分为两部分,分别由用户和雾中心持有。然后,使用二次签名方法,物联网和雾计算中心使用两部分私钥,分两次生成原始签名和最终签名。由于雾计算中心只有一部分使用身份信息生成的私钥,因此不会因雾计算中心持有的部分私钥泄露而损害系统安全,雾计算中心显着参与在签名生成过程中,显着降低了物联网设备的计算和通信开销。安全性分析和性能评估表明,所提出的方案是安全有效的。系统安全不会因雾中心持有的部分私钥泄露而受到破坏,雾中心大量参与签名生成过程,显着降低了物联网的计算和通信开销设备。安全性分析和性能评估表明,所提出的方案是安全有效的。不会因雾中心持有的部分私钥泄露而破坏系统安全,雾中心大量参与签名生成过程,显着降低了物联网的计算和通信开销设备。安全性分析和性能评估表明,所提出的方案是安全有效的。
更新日期:2020-05-01
down
wechat
bug