Abstract
Enterprise multimedia can provide various services for enterprises and staffs, such as minutes of the meeting, staff training and internal news release. The format of enterprise multimedia data includes images, videos, documents, etc. The diversity and complexity of the multimedia data content increase the difficulty of storage and processing of the data. Using the nearest edge nodes to store and process the enterprise multimedia data can reduce the investment of the local storage hardware, and improve the utilization rate of peripheral dispersing devices. However, edge nodes are not fully trusted. The lack of service managers in edge computing determines that the stored enterprise multimedia data suffers from many security threats. To guarantee the security of the multimedia data in enterprises, an efficient data integrity auditing scheme is proposed for edge computing in this paper that can be used in enterprise multimedia security. Note that the technology of the homomorphic authenticator is used to construct the proposed scheme, which determines that our scheme can provide data integrity auditing with high efficiency. To reduce the financial loss caused by data corrupted for enterprise, the enterprise multimedia data are backed up in the remote cloud. Moreover, the data storage structure of One-way Linked Information Table (OLIT) is used to store the history multimedia data for enterprise, which provides high efficiency of the data recovery. In security analysis, the correctness proof is provided, and the data update auditing and the replay attack resistance are also analyzed. Performance analysis shows that our scheme has low computational cost that can be employed in the practical enterprise multimedia security.
Similar content being viewed by others
Notes
The GNU Multiple Precision Arithmetic Library: http://gmplib.org/
The Pairing-Based Cryptography Library: http://crypto.stanford.edu/pbc/
References
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. ACM conference on computer and communications security pp 598-609
Baheti A, Singh L, Khan AU (2014) Proposed method for multimedia data security using cyclic elliptic curve, chaotic system and authentication using neural network. International conference on communication systems and network technologies pp 664-668
Bentley JL (2006) Multidimensional binary search trees in database applications. IEEE Trans Softw Eng SE-5(4):333–340
Bimonte S, Tchounikine A, Miquel M (2005) Towards a spatial multidimensional model. ACM international workshop on data warehouse and OLAP pp 39-46
Boneh D, Franklin MK (2001) Identity-based encryption from the weil pairing. In: International cryptology conference on advances in cryptology, pp 213–229
Byun S, Ahn B (2003) More on the multimedia data security for e-commerce. International conference on information technology: research & education pp 412-415
Chang V (2018) Data analytics and visualization for inspecting cancers and genes. Multimed Tools Appl 77(14):17693–17707
Chang V, Ramachandran M, Yen NN, Walters RJ, Wills G (2016) The second international workshop on enterprise security. In: Proceedings-IEEE 7th international conference on cloud computing technology and science, pp 16–17
Chen H, Guo J, Huang L, Yen J (2013) Design and realization of a new signal security system for multimedia data transmission. J Appl Signal Process 13:1291–1305
Duncan B, Whittington M, Chang V (2017) Enterprise security and privacy: why adding IoT and big data makes it so much more difficult. In: International conference on engineering and technology (ICET), pp 1–7
Han J, Stefanovic N, Koperski K (1998) Selective materialization: an efficient method for spatial data cube construction. Pacific-Asia conference on knowledge discovery and data mining pp 144–158
Hsia C-H (2018) Improved finger vein pattern method using wavelet-based for real-time personal identification system. J Imaging Sci Technol 62(3):30402-1–30402-8
Hsia C-H (2018) New verification method for finger-vein recognition system. IEEE Sensors J 18(2):790–797
Hsia C-H, Guo J-M, Wu C-S (2017) Finger-vein recognition based on parametric-oriented corrections. Multimed Tools Appl 76(23):25179–25196
Juels A, Kaliski BS (2007) Pors: proofs of retrievability for large files. ACM conference on computer and communications security pp 584–597
Jung K, Moon S, Kim J (2017) Data access control method for multimedia content data sharing and security based on XMDR-DAI in mobile cloud storage. Multimed Tools Appl 76:19983–19999
Li X, Tang S, Xu L, Wang H, Chen J (2017) Two-factor data access control with efficient revocation for multi-authority cloud storage systems. IEEE Access 5:393–405
Liu D, Shen J, Wang A, Wang C (2018) Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks. Int J Sens Netw 27(2):95–102
Liu D, Shen J, Wang A, Wang C (2019) Secure real-time image protection scheme with near-duplicate detection in cloud computing. J Real-Time Image Process:1–10. https://doi.org/10.1007/s11554-019-00887-6
Liu D, Shen J, Chen Y, Wang C, Zhou T, Wang A (2019) Privacy-preserving data outsourcing with integrity auditing for lightweight devices in cloud computing. In: International conference on information security and cryptology, pp 223–239
Mach P, Becvar Z (2017) Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv Tutorials 19(3):1628–1656
Miao Y, You C, Zhang J, Huang K, Letaief KB (2017) A survey on mobile edge computing: the communication perspective. IEEE Commun Surv Tutorials 19(4):2322–2358
Narang MS, Grove PS, Kuushik S (2000) Multimedia security gateway protocol to achieve anonymity in delivering multimedia data using watermarking. IEEE international conference on multimedia & expo. pp 529-532
Pang H, Tan K (2004) Authenticating query results in edge computing. In: International conference on data engineering, pp 560–571
Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30–39
Shacham H, Waters B (2008) Compact proofs of retrievability. In: International conference on theory and application of cryptology and information security, pp 90–107
Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415
Shen J, Liu D, Lai C, Ren Y, Wang J, Sun X (2017) A secure identity-based dynamic group data sharing scheme for cloud computing. J Internet Technol 18(4):833–842
Shen J, Liu D, Bhuiyan MZA, Shen J, Sun X, Castiglione A (2017) Secure verifiable database supporting efficient dynamic operations in cloud computing. IEEE Trans Emerg Top Comput. https://doi.org/10.1109/TETC.2017.2776402
Shen J, Wang C, Lai J, Xiang Y, Li P (2019) CATE: cloud-aided trustworthiness evaluation scheme for incompletely predictable vehicular ad hoc networks. IEEE Trans Veh Technol. https://doi.org/10.1109/TVT.2019.2938968
Shen J, Liu D, Chen X, Li J, Kumar N, Vijayakumar P (2019) Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs. IEEE Trans Veh Technol. https://doi.org/10.1109/TVT.2019.2946935
Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5):78–81
Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646
Tang S, Xu L, Liu N, Huang X, Ding J, Yang Z (2014) Provably secure group key management approach based upon hyper-sphere. IEEE Trans Parallel Distrib Syst 25(12):3253–3263
Tang S, Li X, Huang X, Xiang Y, Xu L (2016) Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans Comput 65(7):2325–2331
Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Wang C, Chow SM, Wang Q, Ren K, Lou W (2013) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375
Wang C, Shen J, Lai C, Huang R, Wei F (2018) Neighborhood trustworthiness based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks. Concurr Comput Pract Exp. https://doi.org/10.1002/cpe.4643
Xiao C, Wang L, Jie Z, Chen T (2016) A multi-level intelligent selective encryption control model for multimedia big data security in sensing system with resource constraints. International conference on cyber security and cloud computing pp 148-153
Yang K, Jia X (2013) An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans Parallel Distrib Syst 24(9):1717–1726
Zhang M, Yao Y, Li B, Tang C (2018) Accountable mobile e-commerce scheme in intelligent cloud system transactions. J Ambient Intell Humaniz Comput 9:1889–1899. https://doi.org/10.1007/s12652-017-0672-4
Zhou T, Shen J, Li X, Wang C, Tan H (2018) Logarithmic encryption scheme for cyber physical systems employing fibonacci q-matrix. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2018.04.008
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grants No. U1836115, No. 61672295, No. 61922045, No. 61672290, the Natural Science Foundation of Jiangsu Province under Grant No. BK20181408, the Foundation of State Key Laboratory of Cryptology under Grant No. MMKFKT201830, the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004, the CICAEET fund, and the PAPD fund, the Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant SJKY19_0955.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Liu, D., Shen, J., Vijayakumar, P. et al. Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security. Multimed Tools Appl 79, 10851–10870 (2020). https://doi.org/10.1007/s11042-019-08558-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08558-1