Skip to main content
Log in

An identity-based public auditing protocol in cloud-assisted IoT

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud-assisted Internet of things (IoT) is an important technological trend since employing the cloud to manage massive IoT data enhances performance of IoT applications. To provide integrity of data shared between IoT equipment, it is essential to utilize a public auditing protocol to ensure the integrity of shared data. In this paper, we propose an identity-based public auditing protocol for cloud-assisted IoT applications to address the aforementioned issue. This protocol cannot only provide users’ privacy but also it supports data integrity, data privacy, batch auditing and dynamic data operation. In addition, it is shown that the proposal is secure in the random oracle model under difficulty of elliptic-curve discrete logarithm problem. Moreover, the performance analysis shows that it outperforms other auditing protocols employing ring signatures at computation and communication overhead. Therefore, IoT users can share data in the cloud in a flexible and efficient manner, while their privacy is preserved.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

References

  1. Palattella, M.R., Dohler, M., Grieco, A., Rizzo, G., Torsner, J., Engel, T., Ladid, L.: Internet of things in the 5g era: Enablers, architecture, and business models. IEEE J Selected Areas in Commun 34(3), 510–527 (2016)

    Article  Google Scholar 

  2. Wang, W., Xu, P., Yang, L.T.: Secure data collection, storage and access in cloud-assisted iot. IEEE Cloud Computing 5(4), 77–88 (2018)

    Article  Google Scholar 

  3. Xu, P., He, S., Wang, W., Susilo, W., Jin, H.: Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks. IEEE Transac Industrial Informat 14(8), 3712–3723 (2018)

    Article  Google Scholar 

  4. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinsky, A., Lee, G., Patterson, D., Rakbin, A., Stonica, I., Zaheria, M.: A view of cloud computing. Communications of the ACM (Association for Computing Machinery) 53(4), 50–58 (2010)

    Article  Google Scholar 

  5. Zhao, Q., Chen, S., Liu, Z., Baker, T., Zhang, Y.: Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems. Information Processing & Management 57(6), 102355 (2020)

    Article  Google Scholar 

  6. Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput 16(1), 69–73 (2012)

    Article  Google Scholar 

  7. Wang, C., Wang, Q., Ren, K., Wenjing, L.: Privacy-preserving public auditing for data storage security in cloud computing, In 2010 Proceedings, IEEE INFOCOM, San Diego, pp. 1–9. CA, USA (2010)

    Google Scholar 

  8. Wang, B., Li, M., Chow, S. S. M., Li, H.: Computing encrypted cloud data efficiently under multiple keys, In 2013 IEEE Conference on Communications and Network Security (CNS), Washington, D.C., USA, 504–513, (2013)

  9. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores, In Proceedings of the 14th ACM (Association for Computing Machinery) conference on Computer and communications security, 598–609, (2007)

  10. Wang, B., Li, B., Li, H.: Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE Transac Cloud Comput 2(1), 43–56 (2014)

    Article  Google Scholar 

  11. Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps, In International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, 416–432, (2003)

  12. Zhao, K., Sun, D., Ren, G., Zhang, Y.: Public auditing scheme with identity privacy preserving based on certificateless ring signature for wireless body area networks. IEEE Access 8, 41975–41984 (2020)

    Article  Google Scholar 

  13. Thokchom, S., Saikia, D.K.: Privacy preserving integrity checking of shared dynamic cloud data with user revocation. J Informat Security Applicat 50, 102427 (2020)

    Article  Google Scholar 

  14. Juels, A., Kaliski, Jr., Burton, S.: PORs: Proofs of retrievability for large files, in Proceedings of the 14th ACM (Association for Computing Machinery) conference on Computer and communications security,Santa Barbara, CA, USA, 584–597, (2007)

  15. Wang, Q., Wang, C., Ren, K., Lou, W., Li, J.: Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Sys 22(5), 847–859 (2011)

    Article  Google Scholar 

  16. Shacham, H., Waters, B.: Compact proofs of retrievability. J Cryptol 26(3), 442–483 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  17. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing, In International erence on the Theory and Application of Cryptology and Information Security, 514–532, (2001)

  18. Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Transact Comput 62(2), 362–375 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  19. Ateniese, G., Pietro, R. D., Mancini, L. V., Tsudik, G.: Scalable and efficient provable data possession, In Proceedings of the 4th International conference on Security and privacy in communication netowrks, Lausanne, Switzerland, 1–10, (2008)

  20. Erway, C. C., Küpçü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession, ACM (Association for Computing Machinery) Transactions on Information and System Security (TISSEC), 17(4), p. 15, (2015)

  21. Wang, H.: Identity-based distributed provable data possession in multicloud storage. IEEE Transac Services Comput 8(2), 328–340 (2015)

    Article  Google Scholar 

  22. Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. IEEE Transac Informat Forensics and Security 11(6), 1165–1176 (2016)

    Article  Google Scholar 

  23. Zhang, Y., Yu, J., Hao, R., Wang, C., Ren, K.: Enabling efficient user revocation in identity-based cloud storage auditing for shared big data, IEEE Transactions on Dependable and Secure Computing, 1–13, (2018)

  24. Yu, Y., Au, M.H., Ateniese, G., Huang, X.: IEEE Transactions on Information Forensics and Security 12(4), 767–778 (2016)

  25. Rabaninejad, R., Asaar, M. Rajabzadeh, Attari, M. Ahmadian, Aref, M. R.: An identity-based online/offline secure cloud storage auditing scheme, Cluster Computing, 23(2): 1455–68, (2019)

  26. Li, J., Yan, H., Zhang, Y.: Identity-based privacy preserving remote data integrity checking for cloud storage. IEEE Systems J 15(1), 577–585 (2020)

    Article  Google Scholar 

  27. Yan, H., Gui, W.: Efficient identity-based public integrity auditing of shared data in cloud storage with user privacy preserving. IEEE Access 9, 45822–4583 (2021)

    Article  Google Scholar 

  28. Gan, Q., Wang, X., Li, J., Yan, J., Li, S.: Enabling online/offline remote data auditing for secure cloud storage. Cluster Comput 24(4), 3027–41 (2021)

    Article  Google Scholar 

  29. Ji, Y., Shao, B., Chang, J., Bian, G.: Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property, Cluster Computing, 1-13, (2022)

  30. Shamus software Ltd, Miracl library, Available at https://www.shamus.ie/index.php?page=home

  31. Ding, R., Zhong, H., Ma, J., Liu, X.: Lightweight privacy-preserving identity-based verifiable IoT-based health storage system. IEEE Internet of Things J 6(5), 8393–8405 (2019)

    Article  Google Scholar 

  32. Tian, H., Nan, F., Chang, C.C., Huang, Y., Lu, J.: Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J Net Comput Appl 127, 59–69 (2019)

    Article  Google Scholar 

  33. Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient identity based ring signature. In International conference on applied cryptography and network security, Springer, Berlin, Heidelberg (2005)

    Book  MATH  Google Scholar 

  34. Otoum, S., Al Ridhawi, I., Mouftah, H.: A federated learning and blockchain-enabled sustainable energy-trade at the edge: A framework for industry 4.0, IEEE Internet of Things Journal (2022)

  35. Hayyolalam, V., Otoum, S., Özkasap, Ö.: Dynamic QoS/QoE-aware reliable service composition framework for edge intelligence. Cluster Computing 25(3), 1695–1713 (2022)

    Article  Google Scholar 

  36. Balasubramanian, V., Zaman, F., Aloqaily, M., Alrabaee, S., Gorlatova, M., Reisslein, M.: Reinforcing the edge: Autonomous energy management for mobile device clouds, In IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 44-49. IEEE, (2019)

  37. Tseng, L., Yao, X., Otoum, S., Aloqaily, M., Jararweh, Y.: Blockchain-based database in an IoT environment: challenges, opportunities, and analysis. Cluster Comput 23(3), 2151–2165 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

This paper and research work behind it would not have been possible without the support of our institution. We thankful to our esteemed institution Science and Research Branch, Islamic Azad University. Many thanks to the editor and reviewers for their concern and valuable comments for improving our manuscript.

Funding

No funds, grants, or other support was received.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Proposing the protocol, its security analysis and writing of the paper were done by Asal Ramezani and Maryam Rajabzadeh Asaar. The first draft of the manuscript was written by Asal Ramezani and all authors commented on previous of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Maryam Rajabzadeh Asaar.

Ethics declarations

Conflict of interest

The authors state that they have no conflict of interest.

Informed consent

Informed consent was taken from all individual participants included in the study.

Research involving human and animal rights

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ramezani, A., Asaar, M.R. An identity-based public auditing protocol in cloud-assisted IoT. Cluster Comput 25, 4339–4354 (2022). https://doi.org/10.1007/s10586-022-03680-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-022-03680-6

Keywords

Navigation