首页> 外文期刊>Journal of information security and applications >Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment
【24h】

Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment

机译:基于身份的undsider匿名云数据外包,同时为IOT环境传输

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

The integration of the Internet of Things (IoT) and cloud computing has become an attractive cloud-oriented big data processing paradigm, which is playing an important role in efficiency and productivity for digitalization of numerous IoT enabled industries. However, cloud-assisted IoT is also becoming an increasingly attractive target for various cyber-attacks, including the authenticity of outsourcing data, untrustworthiness of third parties, and data security and privacy. As a potential and promising solution to securely outsource data, we present the first construction for an efficient cloud data outsourcing system with simultaneous individual transmission preserving outsider anonymity of the subscribed consumer set. In our system, a data owner generates personalized data for each of the consumers in a group and transmits a common encrypted data for the group in such a way that the subscribed consumer set is completely hidden from the outsiders. Personalized data can be recovered only by an authorized consumer, while the common data can be decrypted by all the authorized consumer in that group. The communication bandwidth is compact in our construction, and the decryption algorithm requires significantly less computation cost. We design our scheme using asymmetric bilinear map over the prime order group to prevent fault attacks on symmetric bilinear map. Our construction is built in identity based setting without any non-standard q -type security assumption and does not use random oracles. Our scheme enjoys adaptive security against an indistinguishable chosen-plaintext attack under the hardness of the standard decisional bilinear Diffie-Hellman exponent problem. Furthermore, our design supports an exponential number of consumers as the size of the valid identity set grows exponentially with the security parameter, whereas it is only polynomial in the security parameter for the existing cloud data outsourcing systems. In particular, the implementation and performance analysis explicates the advantages of our design for resource-constrained IoT enabled frameworks.
机译:事物互联网(物联网)和云计算的整合已成为一个有吸引力的云导向大数据处理范式,这在效率和生产力方面发挥着重要作用,以实现众多IOT的行业的数字化。然而,云辅助物联网也成为各种网络攻击的越来越有吸引力的目标,包括外包数据的真实性,第三方的不可信赖,以及数据安全和隐私。作为安全和有希望的解决方案来安全地外包数据,我们为高效的云数据外包系统提供了一个高效的云数据外包系统,同时个体传输保留了订阅的消费者集的匿名。在我们的系统中,数据所有者为组中的每个消费者生成个性化数据,并以这样的方式向该组发送公共加密数据,使得订阅的消费者集完全隐藏在外的外人。个性化数据只能由授权的消费者恢复,而该组中的所有授权消费者可以解密常见数据。在我们的结构中,通信带宽紧凑,解密算法需要显着较少的计算成本。我们在主要订单组上使用非对称双线性映射设计我们的方案,以防止对对称双线性地图的故障攻击。我们的施工建立在基于身份的设置中,没有任何非标准Q -Type安全假设,并且不使用随机的oracles。我们的计划在标准决策双线性德国德拉曼指数问题上的硬度下,对禁止区分的选择 - 明文攻击享有自适应安全性。此外,我们的设计支持指数的消费者数量,因为有效身份集的大小与安全参数指数增长,而只有现有云数据外包系统的安全参数中只有多项式。特别是,实现和性能分析阐述了我们设计的设计的优势,以实现资源受限的IOT框架。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号