Abstract

SummaryIn recent years, cloud storage technology is developed maturely, so data owners could deposit data to relieve the storage pressure. In vehicular communication networks, vehicles tend to use low‐latency networks to transfer the valid road information and vehicle information generated by smart sensors in real time. Vehicular edge computing (VEC) networks satisfy the low‐latency requirements of the vehicular communication networks. However, vehicles have no space to store a copy of the data locally like using a local storage service. Vehicles, as users of cloud storage, pay attention to the integrity of the data especially. Unfortunately, many existing auditing schemes for integrity are not fully applicable to the VEC paradigm, because of significant differences in security assumptions. In this paper, a dynamic public audit protocol is proposed to the VEC paradigm. First, a new threat model is defined to formalize noncollusive and collusive attacks according to VEC servers and cloud server providers. Second, we propose a novel auditing protocol based on hash‐balanced binary tree (HBBT) and describe the auditing process and dynamic operations. Third, security analysis and experimental analysis are completed to demonstrate the safety and effectiveness of the proposed scheme.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call