Abstract
With the continuous development of the internet of things (IoT) technology, large amount of data has been generated by lots of IoT devices which require large-scale data processing technologies and storage technologies. Cloud computation is a paradigm for handling such massive data. With the help of cloud computing, IoT devices can utilize the data more efficiently, conveniently and faster. Therefore, how to promote the better integration of the IoT and cloud computing is an interesting research problem. In the big data era, group sum evaluation over outsourced data stream collected by IoT devices is an essential building block in many stream applications, such as statistical monitoring, data mining, machine learning and so on. Thus it is very valuable to design a mechanism to verify the correctness of the group sum evaluation over the outsourced data streams, especially when the data streams are originated from multiple data sources. Recently, Liu et al. proposed such a scheme to solve this problem. However in this paper, we show their scheme is not secure. Concretely, the adversary can easily forge tags for outsourced data, thus the correctness of the group sum evaluation can not be guaranteed anymore. Furthermore, we give two improved schemes which can resist our attack and analyze their security. Finally, we roughly evaluate the performance of our two improved schemes. Our first scheme almost shares the same efficiency as Liu et al.’s proposal but with no security flaw, the second scheme shares the same structure with Liu et al.’s proposal and can be compatible with the existing composite order bilinear pairing cryptosystem.






Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: CCS 07, pp 598–609
Boneh D, Freeman DM (2011) Homomorphic signatures for polynomial functions. In: Advances in cryptology-EUROCRYPT. Springer, pp 149–168
Catalano D, Fiore D (2013) Practical homomorphic macs forarithmetic circuits. In: Advances in cryptology-EUROCRYPT. Springer, pp 336–352
Cristina D, Elena A, Catalin L, Valentin C (2014) A solution for the management of multimedia sessions in hybrid clouds. Int J Space-Based Situat Comput 4(2):77–87
Choi SG, Katz J, Kumaresan R, Cid C (2013) Multi-client non-interactive verifiable computation. In: Theory of cryptography. Springer, pp 499–518
Chung KM, Kalai Y, Vadhan S (2010) Improved delegation of computation using fully homomorphic encryption. In: Advances in cryptology-CRYPTO. Springer, pp 483–501
Fiore D, Gennaro R (2012) Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: ACM conference on computer and communications security. ACM, pp 501–512
Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in cryptology-CRYPTO. Springer, pp 465–482
Gordon SD, Katz J, Liu F-H, Shi E, Zhou H-S (2015) Multi-client verifiable computation with stronger security guarantees. In: Theory of cryptography. Springer, pp 144–166
Guo S, Xu H (2015) A secure delegation scheme of large polynomial computation in multi-party cloud. Int J Grid Util Comput 6(2):1–7
He D, Kumar N, Zeadally S, Wang H (2018) Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Trans Ind Inf. https://doi.org/10.1109/TII.2017.2761806
He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. https://doi.org/10.1109/JSYST.2015.2428620
jPBC: java pairing based cryptography. In: Proceeding of the 16th IEEE symposium on computers and communications, ISCC 2011, pp 850–855. http://gas.dia.unisa.it/projects/jpbc/
Liu X, Zhang Y, Wang B, Yan J (2013) Mona: secure multiowner data sharing for dynamic groups in the cloud. IEEE Trans Parallel Distrib Syst 24(6):1182–1191
Liu X, Sun W, Quan H, Lou W, Zhang Y, Li H (2017) Publicly verifiable inner product evaluation over outsourced data streams under multiple keys. IEEE Trans Serv Comput 10(5):826–838. https://doi.org/10.1109/TSC.2016.2531665
Liu X, Deng R, Choo K, Yang Y, Pang HH (2018) Privacy-preserving outsourced calculation toolkit in the Cloud. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2018.2816656
Liu X, Lu R, Ma J, Chen L, Chen B (2016) Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification. IEEE J Biomed Health Inf 20(2):655–668
Liu X, Choo R, Deng R, Lu R, Weng J (2018) Efficient and privacy-preserving outsourced computation of rational numbers. IEEE Trans Dependable Secure Comput 15(1):27–39. https://doi.org/10.1109/TDSC.2016.2536601
Meriem T, Mahmoud B, Fabrice K (2014) An approach for developing an interoperability mechanism between cloud providers. Int J Space-Based Situat Comput 4(2):88–99
Nath S, Venkatesan R (2013) Publicly verifiable grouped aggregation queries on outsourced data streams. In: International conference on data engineering. IEEE, pp 517–528
Papadopoulos S, Cormode G, Deligiannakis A, Garofalakis M (2013) Lightweight authentication of linear algebraic querieson data streams. In: International conference on management of data. ACM, pp 881–892
Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Theory of cryptography. Springer, pp 422–439
Shacham H, Waters B (2008) Compact proofs of retrievability. In: Pieprzyk J (ed) ASIACRYPT 2008, vol 5350. Springer, Heidelberg, pp 90–107 LNCS
Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE conference on computer communications (INFOCOM). IEEE, pp 2110–2118
Tian H, Chen Y, Chang C, Jiang H, Huang Y, Chen Y, Liu J (2015) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2015.2512589
Wang Y, Du J, Cheng X, Liu Z, Lin K (2016) Degradation and encryption for outsourced PNG images in cloud storage. Int J Grid Util Comput 7(1):22–28
Yu Y, Zhang Y, Ni J, Au M, Chen L, Liu H (2014) Remote data possession checking with enhanced security for cloud storage. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2014.10.006
Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forens Secur. https://doi.org/10.1109/TIFS.2016.2615853
Yu Y, Li Y, Ni J, Yang G, Mu Y, Susilo W (2016) Comments on “public integrity auditing for dynamic data sharing with multi-user modification”. IEEE Trans Inf Forens Secur 11(3):658–659
Yang Y, Zheng X, Liu X, Zhong S, Chang V (2017) Cross-domain dynamic anonymous authenticated group key management with symptom-matching for E-health social system. Future Gener Comput Syst 84:160–176
Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Util Comput 6(2):91–97
Acknowledgements
This work is supported by National Cryptography Development Fund of China Under Grants No. MMJJ20170112, National Natural Science Foundation of China (Grant Nos. 61772550, 61572521, U1636114, 61402531), National Key Research and Development Program of China Under Grants No. 2017YFB0802000, Natural Science Basic Research Plan in Shaanxi Province of China (Grant No. 2018JM6028 and 2016JQ6037) and Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201610).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, X.A., Liu, Y., Sangaiah, A.K. et al. Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting. Computing 101, 773–790 (2019). https://doi.org/10.1007/s00607-018-0641-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00607-018-0641-6