首页> 外文期刊>International Journal of Distributed Sensor Networks >An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
【24h】

An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios

机译:基于FOG-to-Cloud计算的有效和安全的数据审计方案,用于物联网场景

获取原文
           

摘要

With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. This article proposes an efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios, which can better meet performance and security requirements. The proposed scheme realizes data sharing under the condition of protecting privacy by encrypting sensitive information. Using the private key separation method, the private key is divided into two parts using identity information generation and random selection which are, respectively, held by the user and the fog center. Then, using the two-time signature method, the Internet of things and fog computing center use two parts of the private key to generate the original signature and final signature in two separate times. Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. Security analysis and performance evaluation show that the proposed scheme is safe and efficient.
机译:随着基于雾到云计算的东西的广泛使用,如何确保上传到云上传的数据的完整性已成为最重要的安全问题之一。本文提出了一种基于FOG-to-Cloud计算的有效和安全的数据审核方案,用于用于内容的情景,可以更好地满足性能和安全要求。该方案通过加密敏感信息来实现保护隐私的条件下的数据共享。使用私钥分离方法,私钥使用用户和雾中心分别占用的身份信息生成和随机选择分为两个部分。然后,使用两次签名方法,事物和雾计算中心的Internet使用私钥的两个部分来在两个单独的时间内生成原始签名和最终签名。由于雾计算中心仅具有使用身份信息生成的私钥的一部分,因此由于雾中心持有的私钥泄漏,系统的安全性不会损坏,并且雾中心显着参与在签名生成过程中,这显着降低了物联网设备的计算和通信开销。安全性分析和绩效评估表明,该方案安全有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号