A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data

Scientific research achievements play a positive role in the promotion of social development. Scholarly big data include scholars' scientific research, experimental data, and their own identity information. The security of scholarly big data relates to the authors' reputation and the copyright of their works. This paper proposes a trusted third-party-aided searchable and verifiable data protection scheme that utilizes cloud computing technology. For a better description of the the protocol, we first present a user-differentiated system model and a cube data storage structure. On the basis of the novel system model and data structure, the scheme helps the users review the integrity of their uploaded or downloaded data at any time and search the online scholarly data with encrypted keywords. The security analysis and performance simulation demonstrate that the novel scheme is a secure and efficient scheme for scholarly big data applications.

[1]  Jian Zhang,et al.  Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks , 2017, Int. J. Sens. Networks.

[2]  Xingming Sun,et al.  Fast Motion Estimation Based on Content Property for Low-Complexity H.265/HEVC Encoder , 2016, IEEE Transactions on Broadcasting.

[3]  Jin Li,et al.  Identity-based chameleon hashing and signatures without key exposure , 2014, Inf. Sci..

[4]  Jingwei Li,et al.  MMB$^{cloud}$ -Tree: Authenticated Index for Verifiable Cloud Service Selection , 2017, IEEE Transactions on Dependable and Secure Computing.

[5]  Murat Kantarcioglu,et al.  Multi-Keyword search over encrypted data with scoring and search pattern obfuscation , 2015, International Journal of Information Security.

[6]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[7]  Rajkumar Buyya,et al.  Dynamic remote data auditing for securing big data storage in cloud computing , 2017, Inf. Sci..

[8]  Jian Shen,et al.  Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.

[9]  Li Ma,et al.  Temperature error correction based on BP neural network in meteorological wireless sensor network , 2017, Int. J. Sens. Networks.

[10]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[11]  Xingming Sun,et al.  Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.

[12]  Feng Xia,et al.  Big Scholarly Data: A Survey , 2017, IEEE Transactions on Big Data.

[13]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[14]  Xu An Wang,et al.  VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel , 2016, Peer-to-Peer Networking and Applications.

[15]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[16]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[17]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[18]  Feihong Gu,et al.  Compressive sensing of piezoelectric sensor response signal for phased array structural health monitoring , 2017, Int. J. Sens. Networks.

[19]  Yan Zhang,et al.  Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.

[20]  Jian Shen,et al.  Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[21]  LiJin,et al.  Identity-based chameleon hashing and signatures without key exposure , 2014 .

[22]  Jianhua Chen,et al.  Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[23]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[24]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[25]  Shahid Mumtaz,et al.  Social Big-Data-Based Content Dissemination in Internet of Vehicles , 2018, IEEE Transactions on Industrial Informatics.

[26]  Der-Jiunn Deng,et al.  Wireless Big Data Computing in Smart Grid , 2017, IEEE Wireless Communications.

[27]  Minjie Zhang,et al.  A belief propagation-based method for task allocation in open and dynamic cloud environments , 2017, Knowl. Based Syst..

[28]  Tinghuai Ma,et al.  KDVEM : a k-degree anonymity with vertex and edge modification algorithm , 2015, Computing.

[29]  Mohsen Guizani,et al.  Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.

[30]  Yulei Wu,et al.  Coverless Information Hiding Method Based on the Chinese Character Encoding , 2017 .

[31]  Minyi Guo,et al.  Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source of Attacks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[32]  Shengli Xie,et al.  Fair Energy Scheduling for Vehicle-to-Grid Networks Using Adaptive Dynamic Programming , 2016, IEEE Transactions on Neural Networks and Learning Systems.

[33]  Wen-Long Chin,et al.  Energy Big Data Security Threats in IoT-Based Smart Grid Communications , 2017, IEEE Communications Magazine.

[34]  Qiong Huang,et al.  An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks , 2017, Inf. Sci..

[35]  Dowon Hong,et al.  Symmetric searchable encryption with efficient range query using multi-layered linked chains , 2015, The Journal of Supercomputing.

[36]  Jia Yu,et al.  Strong Key-Exposure Resilient Auditing for Secure Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[37]  Wanlei Zhou,et al.  Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies , 2017, IEEE Communications Surveys & Tutorials.

[38]  Jianfeng Ma,et al.  New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.

[39]  Chao Yang,et al.  Auction Mechanisms for Energy Trading in Multi-Energy Systems , 2018, IEEE Transactions on Industrial Informatics.

[40]  Yong Yu,et al.  Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.

[41]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.

[42]  Chen Wang,et al.  Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks , 2016, IEEE Access.

[43]  Tao Jiang,et al.  Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation , 2016, IEEE Transactions on Computers.

[44]  Jian Shen,et al.  Organized topology based routing protocol in incompletely predictable ad-hoc networks , 2017, Comput. Commun..

[45]  Prasenjit Mitra,et al.  AlgorithmSeer: A System for Extracting and Searching for Algorithms in Scholarly Big Data , 2016, IEEE Transactions on Big Data.