Skip to main content
Log in

Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Enterprise multimedia can provide various services for enterprises and staffs, such as minutes of the meeting, staff training and internal news release. The format of enterprise multimedia data includes images, videos, documents, etc. The diversity and complexity of the multimedia data content increase the difficulty of storage and processing of the data. Using the nearest edge nodes to store and process the enterprise multimedia data can reduce the investment of the local storage hardware, and improve the utilization rate of peripheral dispersing devices. However, edge nodes are not fully trusted. The lack of service managers in edge computing determines that the stored enterprise multimedia data suffers from many security threats. To guarantee the security of the multimedia data in enterprises, an efficient data integrity auditing scheme is proposed for edge computing in this paper that can be used in enterprise multimedia security. Note that the technology of the homomorphic authenticator is used to construct the proposed scheme, which determines that our scheme can provide data integrity auditing with high efficiency. To reduce the financial loss caused by data corrupted for enterprise, the enterprise multimedia data are backed up in the remote cloud. Moreover, the data storage structure of One-way Linked Information Table (OLIT) is used to store the history multimedia data for enterprise, which provides high efficiency of the data recovery. In security analysis, the correctness proof is provided, and the data update auditing and the replay attack resistance are also analyzed. Performance analysis shows that our scheme has low computational cost that can be employed in the practical enterprise multimedia security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. The GNU Multiple Precision Arithmetic Library: http://gmplib.org/

  2. The Pairing-Based Cryptography Library: http://crypto.stanford.edu/pbc/

References

  1. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. ACM conference on computer and communications security pp 598-609

  2. Baheti A, Singh L, Khan AU (2014) Proposed method for multimedia data security using cyclic elliptic curve, chaotic system and authentication using neural network. International conference on communication systems and network technologies pp 664-668

  3. Bentley JL (2006) Multidimensional binary search trees in database applications. IEEE Trans Softw Eng SE-5(4):333–340

    Article  Google Scholar 

  4. Bimonte S, Tchounikine A, Miquel M (2005) Towards a spatial multidimensional model. ACM international workshop on data warehouse and OLAP pp 39-46

  5. Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: International cryptology conference on advances in cryptology, pp 213–229

    Google Scholar 

  6. Byun S, Ahn B (2003) More on the multimedia data security for e-commerce. International conference on information technology: research & education pp 412-415

  7. Chang V (2018) Data analytics and visualization for inspecting cancers and genes. Multimed Tools Appl 77(14):17693–17707

    Article  Google Scholar 

  8. Chang V, Ramachandran M, Yen NN, Walters RJ, Wills G (2016) The second international workshop on enterprise security. In: Proceedings-IEEE 7th international conference on cloud computing technology and science, pp 16–17

    Google Scholar 

  9. Chen H, Guo J, Huang L, Yen J (2013) Design and realization of a new signal security system for multimedia data transmission. J Appl Signal Process 13:1291–1305

    Google Scholar 

  10. Duncan B, Whittington M, Chang V (2017) Enterprise security and privacy: why adding IoT and big data makes it so much more difficult. In: International conference on engineering and technology (ICET), pp 1–7

    Google Scholar 

  11. Han J, Stefanovic N, Koperski K (1998) Selective materialization: an efficient method for spatial data cube construction. Pacific-Asia conference on knowledge discovery and data mining pp 144–158

  12. Hsia C-H (2018) Improved finger vein pattern method using wavelet-based for real-time personal identification system. J Imaging Sci Technol 62(3):30402-1–30402-8

    Article  Google Scholar 

  13. Hsia C-H (2018) New verification method for finger-vein recognition system. IEEE Sensors J 18(2):790–797

    Article  Google Scholar 

  14. Hsia C-H, Guo J-M, Wu C-S (2017) Finger-vein recognition based on parametric-oriented corrections. Multimed Tools Appl 76(23):25179–25196

    Article  Google Scholar 

  15. Juels A, Kaliski BS (2007) Pors: proofs of retrievability for large files. ACM conference on computer and communications security pp 584–597

  16. Jung K, Moon S, Kim J (2017) Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage. Multimed Tools Appl 76:19983–19999

    Article  Google Scholar 

  17. Li X, Tang S, Xu L, Wang H, Chen J (2017) Two-factor data access control with efficient revocation for multi-authority cloud storage systems. IEEE Access 5:393–405

    Article  Google Scholar 

  18. Liu D, Shen J, Wang A, Wang C (2018) Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks. Int J Sens Netw 27(2):95–102

    Article  Google Scholar 

  19. Liu D, Shen J, Wang A, Wang C (2019) Secure real-time image protection scheme with near-duplicate detection in cloud computing. J Real-Time Image Process:1–10. https://doi.org/10.1007/s11554-019-00887-6

  20. Liu D, Shen J, Chen Y, Wang C, Zhou T, Wang A (2019) Privacy-preserving data outsourcing with integrity auditing for lightweight devices in cloud computing. In: International conference on information security and cryptology, pp 223–239

    Chapter  Google Scholar 

  21. Mach P, Becvar Z (2017) Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv Tutorials 19(3):1628–1656

    Article  Google Scholar 

  22. Miao Y, You C, Zhang J, Huang K, Letaief KB (2017) A survey on mobile edge computing: the communication perspective. IEEE Commun Surv Tutorials 19(4):2322–2358

    Article  Google Scholar 

  23. Narang MS, Grove PS, Kuushik S (2000) Multimedia security gateway protocol to achieve anonymity in delivering multimedia data using watermarking. IEEE international conference on multimedia & expo. pp 529-532

  24. Pang H, Tan K (2004) Authenticating query results in edge computing. In: International conference on data engineering, pp 560–571

    Chapter  Google Scholar 

  25. Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30–39

    Article  Google Scholar 

  26. Shacham H, Waters B (2008) Compact proofs of retrievability. In: International conference on theory and application of cryptology and information security, pp 90–107

    MATH  Google Scholar 

  27. Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415

    Article  Google Scholar 

  28. Shen J, Liu D, Lai C, Ren Y, Wang J, Sun X (2017) A secure identity-based dynamic group data sharing scheme for cloud computing. J Internet Technol 18(4):833–842

    Google Scholar 

  29. Shen J, Liu D, Bhuiyan MZA, Shen J, Sun X, Castiglione A (2017) Secure verifiable database supporting efficient dynamic operations in cloud computing. IEEE Trans Emerg Top Comput. https://doi.org/10.1109/TETC.2017.2776402

  30. Shen J, Wang C, Lai J, Xiang Y, Li P (2019) CATE: cloud-aided trustworthiness evaluation scheme for incompletely predictable vehicular ad hoc networks. IEEE Trans Veh Technol. https://doi.org/10.1109/TVT.2019.2938968

  31. Shen J, Liu D, Chen X, Li J, Kumar N, Vijayakumar P (2019) Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs. IEEE Trans Veh Technol. https://doi.org/10.1109/TVT.2019.2946935

  32. Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5):78–81

    Article  Google Scholar 

  33. Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646

    Article  Google Scholar 

  34. Tang S, Xu L, Liu N, Huang X, Ding J, Yang Z (2014) Provably secure group key management approach based upon hyper-sphere. IEEE Trans Parallel Distrib Syst 25(12):3253–3263

    Article  Google Scholar 

  35. Tang S, Li X, Huang X, Xiang Y, Xu L (2016) Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans Comput 65(7):2325–2331

    Article  MathSciNet  Google Scholar 

  36. Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859

    Article  Google Scholar 

  37. Wang C, Chow SM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375

    Article  MathSciNet  Google Scholar 

  38. Wang C, Shen J, Lai C, Huang R, Wei F (2018) Neighborhood trustworthiness based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks. Concurr Comput Pract Exp. https://doi.org/10.1002/cpe.4643

  39. Xiao C, Wang L, Jie Z, Chen T (2016) A multi-level intelligent selective encryption control model for multimedia big data security in sensing system with resource constraints. International conference on cyber security and cloud computing pp 148-153

  40. Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726

    Article  Google Scholar 

  41. Zhang M, Yao Y, Li B, Tang C (2018) Accountable mobile e-commerce scheme in intelligent cloud system transactions. J Ambient Intell Humaniz Comput 9:1889–1899. https://doi.org/10.1007/s12652-017-0672-4

    Article  Google Scholar 

  42. Zhou T, Shen J, Li X, Wang C, Tan H (2018) Logarithmic encryption scheme for cyber physical systems employing fibonacci q-matrix. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.04.008

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grants No. U1836115, No. 61672295, No. 61922045, No. 61672290, the Natural Science Foundation of Jiangsu Province under Grant No. BK20181408, the Foundation of State Key Laboratory of Cryptology under Grant No. MMKFKT201830, the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004, the CICAEET fund, and the PAPD fund, the Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant SJKY19_0955.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Shen.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, D., Shen, J., Vijayakumar, P. et al. Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security. Multimed Tools Appl 79, 10851–10870 (2020). https://doi.org/10.1007/s11042-019-08558-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08558-1

Keywords

Navigation