Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT

Authors
Liu, DengzhiDing, YongdongYu, GengZhong, ZhaomanSong, Yuanzhao
Issue Date
Apr-2024
Publisher
ELSEVIER
Keywords
Industry 5.0; IIoT; Data storage auditing; Regenerating code; ZSS signature
Citation
INTERNET OF THINGS, v.25
Journal Title
INTERNET OF THINGS
Volume
25
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/90932
DOI
10.1016/j.iot.2024.101084
ISSN
2543-1536
2542-6605
Abstract
A human-centered, sustainable development technological concept from industry 5.0 is rapidly sparking extensive discussions in the academic and professional communities. Massive data need to be outsourced to nearby fog nodes and remote cloud servers due to the constrained resource of terminals in industrial Internet of things (IIoT) in future industry 5.0. However, terminals are skeptical about the credibility of the outsourced data due to the loss of physical data possession. Existing data storage auditing schemes in cloud computing will be performed with high latency, which is not suitable for cloud-fog-assisted IIoT. To improve the computational efficiency and reduce the communication overhead, in this paper, a privacy-preserving dynamic auditing for regenerating code-based storage in cloud-fog-assisted IIoT is proposed. First, a generalized framework of exact reparation regenerating code is employed to encode the data file, which can improve the data storage security in cloud-fog-assisted IIoT. Then, the ZSS signature is used to generate the authentication tag for each encoded data segment. Moreover, a proper data structure is designed to store the encoded data and authenticators in storage servers based on the properties of exact reparation regenerating code, which can efficiently make full use of the fragmented storage space and significantly reduce the latency of data update. Security analysis shows that the proposed scheme provides the resistance of forgery attacks, replacing attacks, replaying attacks and ensures the data privacy. Performance analysis demonstrates that the proposed scheme can be performed with low computational cost and communication overhead that can be well used in cloud-fog-assisted IIoT.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE