Abstract:
Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computi...Show MoreMetadata
Abstract:
Edge computing can process data at the network edge rather than in the remote cloud. To protect the security of the collected data, blockchain can be used in edge computing. Any request sent from an edge server requesting data storage is a transaction added into the blockchain, which should include the data owners’ signature. For protecting the privacy of data owners, a threshold ring signature can be utilized for the blockchain. In this article, we propose a flexible threshold ring signature scheme in chronological order that has two advantages for solving the update problem and chronological problem in practice. Our scheme is a nontrivial extension of Yuen et al.’s signature scheme and has three security properties: unforgeability, anonymity, and chronological sorting. We prove our scheme without random oracles and test our scheme over the Intel Edison development platform simulating practical edge servers.
Published in: IEEE Transactions on Cloud Computing ( Volume: 10, Issue: 2, 01 April-June 2022)