Abstract

The Internet of Things (IoT) is also known as the Internet of everything. As an important part of the new generation of intelligent information technology, the IoT has attracted the attention both of researchers and engineers all over the world. Considering the limited capacity of smart products, the IoT mainly uses cloud computing to expand computing and storage resources. The massive data collected by the sensor are stored in the cloud storage server, also the cloud vulnerability will directly threaten the security and reliability of the IoT. In order to ensure data integrity and availability in the cloud and IoT storage system, users need to verify the integrity of remote data. However, the existing remote data integrity verification schemes are mostly based on the RSA and BLS signature mechanisms. The RSA-based scheme has too much computational overhead. The BLS signature-based scheme needs to adopt a specific hash function, and the batch signature efficiency in the big data environment is low. Therefore, for the computational overhead and signature efficiency issues of these two signature mechanisms, we propose a scheme of data integrity verification based on a short signature algorithm (ZSS signature), which supports privacy protection and public auditing by introducing a trusted third party (TPA). The computational overhead is effectively reduced by reducing hash function overhead in the signature process. Under the assumption of CDH difficult problem, it can resist adaptive chosen-message attacks. The analysis shows that the scheme has a higher efficiency and safety.

Highlights

  • With the introduction and widely used of new concepts and technologies such as mobile Internet, intelligent transportation and smart city, the number of devices connected to the Internet is increasing and more powerful storage and processing resources are needed

  • In order to solve the above problem, and improve the safety of Internet of Things (IoT), we present a new model for data integrity verification based on a short signature, that is, ZSS signature [7] in this paper

  • In the scheme based on the ZSS signature mechanism, the extra communication overhead generated by the client is mainly the signature value uploaded to the cloud service providers (CSP), which is approximately 160 bits

Read more

Summary

INTRODUCTION

With the introduction and widely used of new concepts and technologies such as mobile Internet, intelligent transportation and smart city, the number of devices connected to the Internet is increasing and more powerful storage and processing resources are needed. Yu et al [14] proposed an identity-based cloud data integrity detection scheme, which solves the complex problem of traditional PDP certificate management and uses RSA signature to support public audit and data dynamics. It uses random masking techniques to ensure data privacy and supports publicly audited [23] Based on this scheme, Mukundan et al [24] proposed a BLS-based data possession certification model that uses homomorphic tag technology to support public verification in a multi-copy cooperative storage environment. This paper proposes a data integrity verification scheme based on ZSS short-signature [7] to improve the efficiency of the signature, reduce the computation and storage overhead in the signing process. Definition 6 (Random Masking): Our approach ensures the privacy of user data during the auditing process by employing a random masking vi to hide μ, a linear combination of the data blocks

CHALLENGE GAMES
DATA INTEGRITY VERIFICATION SCHEME BASED ON BLS SIGNATURE
ZSS SIGNATURE
GOAL ANALYSIS
SECURITY ANALYSIS
PERFORMANCE ANALYSIS
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call