Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator

With the explosive growth in the number of IoT devices, ensuring the integrity of the massive data generated by these devices has become an important issue. Due to the limitation of hardware, most past data integrity verification schemes randomly select partial data blocks and then perform integrity validation on those blocks instead of examining the entire dataset. This will result in that unsampled data blocks cannot be detected even if they are tampered with. To solve this problem, we propose a new and effective integrity auditing mechanism of sensor data based on a bilinear map accumulator. Using the proposed approach will examine all the data blocks in the dataset, not just some of the data blocks, thus, eliminating the possibility of any cloud manipulation. Compared with other schemes, our proposed solution has been proved to be highly secure for all necessary security requirements, including tag forgery, data deletion, replacement, replay, and data leakage attacks. The solution reduces the computational and storage costs of cloud storage providers and verifiers, and also supports dynamic operations for data owners to insert, delete, and update data by using a tag index table (TIT). Compared with existing schemes based on RSA accumulator, our scheme has the advantages of fast verification and witness generation and no need to map data blocks to prime numbers. The new solution supports all the characteristics of a data integrity verification scheme.

[1]  Helger Lipmaa,et al.  Secure Accumulators from Euclidean Rings without Trusted Setup , 2012, ACNS.

[2]  Xiong Li,et al.  A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..

[3]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[4]  Yueshen Xu,et al.  Collaborative QoS Prediction for Mobile Service with Data Filtering and SlopeOne Model , 2017, Mob. Inf. Syst..

[5]  Yueshen Xu,et al.  QoS Prediction for Service Recommendation with Deep Feature Learning in Edge Computing Environment , 2019, Mob. Networks Appl..

[6]  Jean-Jacques Quisquater,et al.  Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.

[7]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[8]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[9]  Jin Wang,et al.  Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[10]  Yueshen Xu,et al.  Collaborative Service Selection via Ensemble Learning in Mixed Mobile Network Environments , 2017, Entropy.

[11]  Guangjie Han,et al.  Edge Computing-Based Intelligent Manhole Cover Management System for Smart Cities , 2018, IEEE Internet of Things Journal.

[12]  Yongjun Ren,et al.  Digital Continuity Guarantee Based on Data Consistency in Cloud Storage , 2018, ICCCS.

[13]  Yongjun Ren,et al.  A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system , 2019, J. Inf. Secur. Appl..

[14]  Arun Kumar Sangaiah,et al.  An empower hamilton loop based data collection algorithm with mobile agent for WSNs , 2019, Human-centric Computing and Information Sciences.

[15]  Josh Benaloh,et al.  One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.

[16]  Yueshen Xu,et al.  Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems , 2017, Sensors.

[17]  Marcel Waldvogel,et al.  Establishing trust in distributed storage providers , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[18]  Jin Wang,et al.  Spatial and semantic convolutional features for robust visual object tracking , 2018, Multimedia Tools and Applications.

[19]  Josep Domingo-Ferrer,et al.  Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.

[20]  David Hutchison,et al.  The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.

[21]  Sherali Zeadally,et al.  Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..

[22]  Stefanos Gritzalis,et al.  Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities , 2018, IEEE Transactions on Industrial Informatics.

[23]  Hye-Jin Kim,et al.  An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..

[24]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[25]  Jianli Pan,et al.  Future Edge Cloud and Edge Computing for Internet of Things Applications , 2018, IEEE Internet of Things Journal.

[26]  Fan Wu,et al.  A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things , 2018, IEEE Internet of Things Journal.

[27]  Jin Wang,et al.  An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks , 2019, Int. J. Distributed Sens. Networks.

[28]  Arun Kumar Sangaiah,et al.  Obstacle avoidance of mobile robots using modified artificial potential field algorithm , 2019, Other Conferences.

[29]  Jinyue Xia,et al.  Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds , 2019, IEEE Transactions on Dependable and Secure Computing.

[30]  Ching-Han Chen,et al.  Edge Computing Gateway of the Industrial Internet of Things Using Multiple Collaborative Microcontrollers , 2018, IEEE Network.

[31]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[32]  Chin-Teng Lin,et al.  Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment , 2018, IEEE Access.

[33]  Yan Leng,et al.  Secure data storage based on blockchain and coding in edge computing. , 2019, Mathematical biosciences and engineering : MBE.

[34]  Bo Gao,et al.  Fog Computing-Assisted Energy-Efficient Resource Allocation for High-Mobility MIMO-OFDMA Networks , 2018, Wirel. Commun. Mob. Comput..

[35]  Sai Ji,et al.  Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks , 2018, Mob. Inf. Syst..

[36]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[37]  Jin Wang,et al.  A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks , 2018 .

[38]  Sushil Jajodia,et al.  Integrity and Internal Control in Information Systems VI , 2013, IFIP International Federation for Information Processing.

[39]  Fei Yu,et al.  On Efficient Processing of Continuous Reverse Skyline Queries in Wireless Sensor Networks , 2017, KSII Trans. Internet Inf. Syst..

[40]  Ayad F. Barsoum,et al.  Provable Possession and Replication of Data over Cloud Servers , 2011 .

[41]  Arun Kumar Sangaiah,et al.  Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things , 2019, Applied Sciences.

[42]  Xuetao Wei,et al.  Communication-Efficient Data Aggregation Tree Construction for Complex Queries in IoT Applications , 2019, IEEE Internet of Things Journal.

[43]  Adeel Anjum,et al.  A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends , 2017, Comput. Secur..

[44]  Weisong Shi,et al.  Falcon: An ambient temperature aware thermal control policy for IoT gateways , 2017, Sustain. Comput. Informatics Syst..

[45]  Wenbing Wu,et al.  An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks , 2019 .

[46]  Lan Nguyen,et al.  Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.

[47]  Walid I. Khedr,et al.  Cryptographic Accumulator-Based Scheme for Critical Data Integrity Verification in Cloud Storage , 2019, IEEE Access.

[48]  Yan Leng,et al.  Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network , 2019, Sensors.

[49]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[50]  LiuWei,et al.  An empower hamilton loop based data collection algorithm with mobile agent for WSNs , 2019 .

[51]  Schahram Dustdar,et al.  Going Back to the Roots—The Evolution of Edge Computing, An IoT Perspective , 2018, IEEE Internet Computing.

[52]  Jin Wang,et al.  RETRACTED ARTICLE: The visual object tracking algorithm research based on adaptive combination kernel , 2019, Journal of Ambient Intelligence and Humanized Computing.

[53]  Ivan Damgård,et al.  Supporting Non-membership Proofs with Bilinear-map Accumulators , 2008, IACR Cryptol. ePrint Arch..

[54]  M. Anwar Hasan,et al.  Provable Multicopy Dynamic Data Possession in Cloud Computing Systems , 2015, IEEE Transactions on Information Forensics and Security.