Abstract

Cyber-Physical-Social System (CPSS) provides users secure and high-quality mobile service applications to share and exchange data in the cyberspace and physical world. With the explosive growth of data, it is necessary to introduce cloud storage service, which allows devices frequently resort to the cloud for data storage and sharing, into CPSS. In this paper, we propose a data storage and sharing scheme for CPSS with the help of cloud storage service. Since data integrity assurance is an inevitable problem in cloud storage, we first design a secure and efficient data storage scheme based on the technology of public auditing and bilinear map, which also ensures the security of the verification. In order to meet the real-time and reliability requirements of the CPSS, the rewards of timeliness incentive and effectiveness incentive are considered in the scheme. Secondly, based on the proposed storage scheme and ElGamal encryption, we propose a lightweight access model for users to access the final data processed by cloud server. We formally prove the security of the proposed scheme, and conduct performance evaluation to validate its high efficiency. The experimental results show that the proposed scheme has lower overheads in communication and access as compared to the technique CDS.

Highlights

  • Cyber-Physical-Social Systems (CPSS) [1] integrate the cyber, physical and social spaces together to provide users with a convenient and intelligent environment [2], [3]

  • The CPSS allow a large number of social users to have more interaction than before by data sharing and exchanging, which results in the explosive growth of the data generated and collected from social and physical spaces [4]

  • The efficient is a research point should be concerned, so we introduce the technique of public auditing to ensure the integrity of outsourced data

Read more

Summary

A Data Storage and Sharing Scheme for Cyber-Physical-Social Systems

LONGXIA HUANG 1, GONGXUAN ZHANG2, (Senior Member, IEEE), AND SHUI YU 3, (Senior Member, IEEE).

INTRODUCTION
RELATED WORK
DESIGN GOALS AND SYSTEM MODELS
THE PROPOSED SCHEME
THE DETAILS OF DATA CHECKING
THE DETAILS OF DATA ACCESS
SECURITY ANALYSIS
PRIOR KNOWLEDGE
THE COMPUTATION OVERHEAD
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.