Certificateless public key cryptography based provable data possession scheme in edge environment

In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suit...

Full description

Saved in:
Bibliographic Details
Main Authors: Ziyuan WANG, Ruizhong DU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2022-07-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022130/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539958364438528
author Ziyuan WANG
Ruizhong DU
author_facet Ziyuan WANG
Ruizhong DU
author_sort Ziyuan WANG
collection DOAJ
description In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of devices.Based on this, a certificateless public key cryptography based provable data possession scheme was proposed for the edge environment, combining the online/offline signature idea, where the user device only needed to perform light computation when uploading data in the case of semi-trusted edge nodes, leaving the rest of the computation to be performed in the offline phase.The scheme used edge nodes for auditing work while supporting auditing in different storage states, as well as privacy protection and other features.The security analysis shows that the proposed scheme is proven to be secure by being able to effectively combat three types of adversary attacks under a stochastic prediction model.Experimental comparisons with other schemes show that the proposed scheme has lowest time overhead.
format Article
id doaj-art-16f5b00982374568bed985c64ae7b7e6
institution Kabale University
issn 1000-436X
language zho
publishDate 2022-07-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-16f5b00982374568bed985c64ae7b7e62025-01-14T06:29:39ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2022-07-0143627259394873Certificateless public key cryptography based provable data possession scheme in edge environmentZiyuan WANGRuizhong DUIn the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of devices.Based on this, a certificateless public key cryptography based provable data possession scheme was proposed for the edge environment, combining the online/offline signature idea, where the user device only needed to perform light computation when uploading data in the case of semi-trusted edge nodes, leaving the rest of the computation to be performed in the offline phase.The scheme used edge nodes for auditing work while supporting auditing in different storage states, as well as privacy protection and other features.The security analysis shows that the proposed scheme is proven to be secure by being able to effectively combat three types of adversary attacks under a stochastic prediction model.Experimental comparisons with other schemes show that the proposed scheme has lowest time overhead.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022130/edge computingprovable data possessiononline/offline signaturecertificateless public key cryptography
spellingShingle Ziyuan WANG
Ruizhong DU
Certificateless public key cryptography based provable data possession scheme in edge environment
Tongxin xuebao
edge computing
provable data possession
online/offline signature
certificateless public key cryptography
title Certificateless public key cryptography based provable data possession scheme in edge environment
title_full Certificateless public key cryptography based provable data possession scheme in edge environment
title_fullStr Certificateless public key cryptography based provable data possession scheme in edge environment
title_full_unstemmed Certificateless public key cryptography based provable data possession scheme in edge environment
title_short Certificateless public key cryptography based provable data possession scheme in edge environment
title_sort certificateless public key cryptography based provable data possession scheme in edge environment
topic edge computing
provable data possession
online/offline signature
certificateless public key cryptography
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022130/
work_keys_str_mv AT ziyuanwang certificatelesspublickeycryptographybasedprovabledatapossessionschemeinedgeenvironment
AT ruizhongdu certificatelesspublickeycryptographybasedprovabledatapossessionschemeinedgeenvironment