Abstract

FOG-enabled cyber-physical systems (FOG-CPSs) open new security challenges as the local edge devices are easier to compromise than a traditional cloud server. Remote data integrity checking (RDIC) plays an important role in safeguarding against data corruption from a storage server. Certificateless cryptography (CLPKC)-based RDIC schemes do not suffer from the drawbacks of the public key infrastructure (PKI)-based RDIC protocols. Most of the CLPKC-based RDIC schemes proposed in the literature deal with personal data. However, in a FOG-CPS, it is also important to audit a data file shared by a group of edge devices. Most of the existing group shared data auditing schemes lack mechanisms to defend against a semi-trusted data auditor applicable for a FOG-CPS scenario. In order to address these issues, in this paper, we propose a novel CLPKC-based group shared data auditing protocol tailored to the specific security requirements of a FOG-CPS. Besides, we perform a detailed cryptanalysis of two existing CLPKC-based privacy-preserving group shared data auditing schemes. The formal security analysis of our proposed protocol establishes metadata and data integrity proof unforgeability and claimed zero-knowledge privacy and reliability properties through rigorous proofs in the random oracle model setting. Performance evaluations establish the efficiency of our proposed protocol.

Highlights

  • After the introduction of FOG computing by Cisco [1], considering the capability of FOG to provide computing at the edge of the network while preserving the advantages of cloud computing such as ubiquity, decentralized management, and so on, FOG-assisted cyber-physical system (CPS) (FOG-CPS) [2,3,4,5,6,7,8] is emerging as a new research domain to address the data management issues of CPS. e ability of FOG-assisted CPS (FOG-CPS) to provide services at the physical proximity of the network is very much useful in ensuring the low-latency and reliability requirements of the real-time jobs in a CPS

  • An remote data integrity checking (RDIC) protocol involves two phases, namely, (a) preprocessing phase: in which, a cloud user, using its security credentials, generates some metadata from the data blocks of its data file and outsources the metadata along with the data file to the cloud service provider (CSP), and (b) verification phase: in which, a trusted data auditor sends a challenge message to the CSP, who computes a proof of possession on the challenged data file using the stored metadata and data. e auditor verifies the proof generated by the CSP to determine the integrity of the stored data file [41]

  • To address the limitations of the existing research as discussed above, we have proposed a novel group shared data auditing protocol tailored to the specific security requirements of a FOG-CPS. e proposed data auditing protocol takes advantage of the localized storage and computing facilities available at the edge of the FOG-CPS network by delegating an edge device geographically close to the storage resources to perform the data auditing task

Read more

Summary

Introduction

It opens new security challenges since the local edge devices are much easier to compromise by an attacker than a traditional cloud server, and it cannot be fully trusted. A few privacy-preserving CLPKC-based shared data auditing protocols have been proposed by the researchers [23, 24, 39] for traditional cloud storage systems None of these schemes can ensure the reliability criteria of the auditing service against a semi-trusted data auditor in a FOG-CPS, as defined above. We have performed a detailed cryptanalysis of the CLPKC-based privacy-preserving shared data auditing schemes proposed in [23, 39] to pinpoint the exact vulnerabilities in the metadata generation mechanisms used in these protocols.

Related Work
Preliminaries
Cryptanalysis of Existing Schemes
Proposed System Model
Proposed Basic CLS-RDIC Protocol
The Proposed Complete Protocol
Method of the attack
Security Analysis
Performance Analysis and Comparisons
10. Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call