Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security

Enterprise multimedia can provide various services for enterprises and staffs, such as minutes of the meeting, staff training and internal news release. The format of enterprise multimedia data includes images, videos, documents, etc. The diversity and complexity of the multimedia data content increase the difficulty of storage and processing of the data. Using the nearest edge nodes to store and process the enterprise multimedia data can reduce the investment of the local storage hardware, and improve the utilization rate of peripheral dispersing devices. However, edge nodes are not fully trusted. The lack of service managers in edge computing determines that the stored enterprise multimedia data suffers from many security threats. To guarantee the security of the multimedia data in enterprises, an efficient data integrity auditing scheme is proposed for edge computing in this paper that can be used in enterprise multimedia security. Note that the technology of the homomorphic authenticator is used to construct the proposed scheme, which determines that our scheme can provide data integrity auditing with high efficiency. To reduce the financial loss caused by data corrupted for enterprise, the enterprise multimedia data are backed up in the remote cloud. Moreover, the data storage structure of One-way Linked Information Table (OLIT) is used to store the history multimedia data for enterprise, which provides high efficiency of the data recovery. In security analysis, the correctness proof is provided, and the data update auditing and the replay attack resistance are also analyzed. Performance analysis shows that our scheme has low computational cost that can be employed in the practical enterprise multimedia security.

[1]  Jon Louis Bentley,et al.  Multidimensional Binary Search Trees in Database Applications , 1979, IEEE Transactions on Software Engineering.

[2]  Jiawei Han,et al.  Selective Materialization: An Efficient Method for Spatial Data Cube Construction , 1998, PAKDD.

[3]  P. S. Grover,et al.  Multimedia Security Gateway Protocol to achieve anonymity in delivering multimedia data using watermarking , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[4]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[5]  Jiun-In Guo,et al.  EURASIP Journal on Applied Signal Processing 2003:13, 1291–1305 c ○ 2003 Hindawi Publishing Corporation Design and Realization of a New Signal Security System for Multimedia Data Transmission , 2003 .

[6]  Byung-Ha Ahn,et al.  More on the multimedia data security for e-commerce , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..

[7]  Kian-Lee Tan,et al.  Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.

[8]  Sandro Bimonte,et al.  Towards a spatial multidimensional model , 2005, DOLAP '05.

[9]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[10]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[11]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, ASIACRYPT.

[12]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[13]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[14]  Asif Ullah Khan,et al.  Proposed Method for Multimedia Data Security Using Cyclic Elliptic Curve, Chaotic System, and Authentication Using Neural Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[15]  Xinyi Huang,et al.  Provably Secure Group Key Management Approach Based upon Hyper-Sphere , 2014, IEEE Transactions on Parallel and Distributed Systems.

[16]  Robert John Walters,et al.  The second international workshop on enterprise security , 2015 .

[17]  Kye-Dong Jung,et al.  Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage , 2016, Multimedia Tools and Applications.

[18]  Xinyi Huang,et al.  Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing , 2016, IEEE Transactions on Computers.

[19]  Chih-Hsien Hsia,et al.  Finger-vein recognition based on parametric-oriented corrections , 2016, Multimedia Tools and Applications.

[20]  Chen Xiao,et al.  A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).

[21]  Weisong Shi,et al.  The Promise of Edge Computing , 2016, Computer.

[22]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[23]  Victor Chang,et al.  Enterprise security and privacy: Why adding IoT and big data makes it so much more difficult , 2017, 2017 International Conference on Engineering and Technology (ICET).

[24]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[25]  Jian Shen,et al.  A secure identity-based dynamic group data sharing scheme for cloud computing , 2017 .

[26]  Huaqun Wang,et al.  Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems , 2017, IEEE Access.

[27]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[28]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[29]  Zdenek Becvar,et al.  Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.

[30]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[31]  Victor I. Chang Data analytics and visualization for inspecting cancers and genes , 2017, Multimedia Tools and Applications.

[32]  Jian Shen,et al.  Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks , 2018, Int. J. Sens. Networks.

[33]  Chih-Hsien Hsia Improved Finger-Vein Pattern Method Using Wavelet-based for Real-Time Personal Identification System , 2018 .

[34]  Chih-Hsien Hsia,et al.  New Verification Strategy for Finger-Vein Recognition System , 2018, IEEE Sensors Journal.

[35]  Chen Wang,et al.  Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks , 2018 .

[36]  Mingwu Zhang,et al.  Accountable mobile E-commerce scheme in intelligent cloud system transactions , 2018, J. Ambient Intell. Humaniz. Comput..

[37]  Jian Shen,et al.  Privacy-Preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing , 2018, Inscrypt.

[38]  Chen Wang,et al.  CATE: Cloud-Aided Trustworthiness Evaluation Scheme for Incompletely Predictable Vehicular Ad Hoc Networks , 2019, IEEE Transactions on Vehicular Technology.

[39]  Chen Wang,et al.  Neighborhood trustworthiness‐based vehicle‐to‐vehicle authentication scheme for vehicular ad hoc networks , 2019, Concurr. Comput. Pract. Exp..

[40]  Jian Shen,et al.  Secure real-time image protection scheme with near-duplicate detection in cloud computing , 2019, Journal of Real-Time Image Processing.

[41]  Jian Shen,et al.  Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing , 2020, IEEE Transactions on Emerging Topics in Computing.

[42]  Chen Wang,et al.  Logarithmic encryption scheme for cyber-physical systems employing Fibonacci Q-matrix , 2020, Future Gener. Comput. Syst..

[43]  Dengzhi Liu,et al.  Secure Real-Time Traffic Data Aggregation With Batch Verification for Vehicular Cloud in VANETs , 2020, IEEE Transactions on Vehicular Technology.