A verifiable data integrity scheme for distributed data sharing in fog computing architecture |
| |
Affiliation: | 1. Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences, China;2. Department of Media Software, Sungkyul University, South Korea;3. Department of Computer Science and Engineering, South Eastern University of Sri Lanka, Sri Lanka;1. Department of ECE, BGS Institute of Technology, Adichunchanagiri University, B. G Nagara, Karnataka, India;2. Vidyavardhaka College of Engineering, Mysuru, Karnataka, India |
| |
Abstract: | Fog computing is a promising computing paradigm that brings computing resources close to end users at the edge of the network. Hence, it handles large-scale, geographically distributed, and latency-sensitive services. However, there are several security challenges that must be addressed due to the unreliable nature of this architecture. One can cite the verification of data integrity among the most critical issues in the context of fog computing. In fact, since data is often stored dynamically in a fully distributed manner, traditional solutions based on a centralized third-party auditor for integrity verification become unsuitable for such highly dynamic and distributed contexts. Indeed, the constant transfer of data to and from the central auditor results in high network latency and potential bottlenecks.Therefore, in this paper, we propose a new efficient public verification protocol that ensures the integrity of the data in fog computing architecture. Our solution protects data integrity and authenticity using the short integer solution problem (SIS) and identity-based signatures. Moreover, in order to legitimately modify the data, our protocol allows to distributively identify the data owners and to delegate their signatures to other entities in the architecture. Furthermore, it enables effective data integrity verification even when data is separately shared across several servers. This verification can be performed by any legitimate end user connected to the architecture, and without relying on any trusted third party. Finally, we prove that our protocol is highly efficient and outperforms existing solutions, as demonstrated by our extensive simulations and thorough security analysis that confirmed its security. |
| |
Keywords: | Data integrity Fog computing Security Lattice-based cryptography Distributed networks Identity based signatures |
本文献已被 ScienceDirect 等数据库收录! |
|