skip to main content
research-article

Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator

Published: 17 February 2021 Publication History

Abstract

With the explosive growth in the number of IoT devices, ensuring the integrity of the massive data generated by these devices has become an important issue. Due to the limitation of hardware, most past data integrity verification schemes randomly select partial data blocks and then perform integrity validation on those blocks instead of examining the entire dataset. This will result in that unsampled data blocks cannot be detected even if they are tampered with. To solve this problem, we propose a new and effective integrity auditing mechanism of sensor data based on a bilinear map accumulator. Using the proposed approach will examine all the data blocks in the dataset, not just some of the data blocks, thus, eliminating the possibility of any cloud manipulation. Compared with other schemes, our proposed solution has been proved to be highly secure for all necessary security requirements, including tag forgery, data deletion, replacement, replay, and data leakage attacks. The solution reduces the computational and storage costs of cloud storage providers and verifiers, and also supports dynamic operations for data owners to insert, delete, and update data by using a tag index table (TIT). Compared with existing schemes based on RSA accumulator, our scheme has the advantages of fast verification and witness generation and no need to map data blocks to prime numbers. The new solution supports all the characteristics of a data integrity verification scheme.

References

[1]
C. Yin, J. Xi, R. Sun, and J. Wang. 2018. Location privacy protection based on differential privacy strategy for big data in industrial Internet of Things. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3628--3636.
[2]
Y. Li, M. Kumar, W. Shi, and J. Wan. 2017. Falcon: An ambient temperature aware thermal control policy for IoT gateways. Sustainable Computing-Informatics 8 Systems 16, 4 (2017), 48--55.
[3]
X. Li, J. Peng, J. Niu, F. Wu, J. Liao, and K. R. Choo. 2018. A robust and energy efficient authentication protocol for industrial Internet of Things. IEEE Internet of Things Journal. 5, 2 (2018), 1606--1615.
[4]
G. Jia, G. Han, H. Rao, and L. Shu. 2018. Edge computing-based intelligent manhole cover management system for smart cities. IEEE Internet of Things Journal 5, 3 (2018), 1648--1656.
[5]
Y. Chen, J. Wang, R. Xia, Q. Zhang, Z. Cao, and K. Yang. 2019. The visual object tracking algorithm research based on adaptive combination kernel. Journal of Ambient Intelligence and Humanized Computing 19, 10 (2019), 4855--4867.
[6]
J. Wang, Y. Gao, W. Liu, A. K. Sangaiah, and H.-J. Kim. 2019. An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks. International Journal of Distributed Sensor Networks. 2019, 3 (2019), 833--847.
[7]
B. Yin and X. We. 2019. Communication-efficient data aggregation tree construction for complex queries in IoT applications. IEEE Internet of Things Journal 6, 2 (2019), 3352--3363.
[8]
Y. Yin, F. Yu, Y. Xu, L. Yu, and J. Mu. 2017. Network location-aware service recommendation with random walk in cyber-physical systems. Sensors 17, 9 (2017), 2059--2071.
[9]
Y. J. Ren, Y. Leng, Y. P. Cheng, and J. Wang. 2019. Secure data storage based on blockchain and coding in edge computing. Mathematical Biosciences and Engineering 16, 3 (2019), 1874--1892.
[10]
J. Wang, Y. Gao, W. Liu, W. Wu, and S. Lim. 2019. An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Computer, Materials 8 Continua 58, 3 (2019), 711--725.
[11]
Y. Ren, Y. Liu, S. Ji, A. K. Sangaiah, and J. Wang. 2018. Incentive mechanism of data storage based on blockchain for wireless sensor networks. Mobile Information Systems. 2018, 10 (2018), 158--167.
[12]
Y. Yin, L. Chen, Y. Xu, J. Wan, H. Zhang, and Z. Mai. 2019. QoS prediction for service recommendation with deep feature learning in edge computing environment. Mobile Networks and Applications 25, 4 (2019), 391--401.
[13]
C. Chen, M. Lin, and C. Liu. 2018. Edge computing gateway of the industrial Internet of Things using multiple collaborative microcontrollers. IEEE Network 38, 1 (2018), 24--32.
[14]
J. Wang, Y. Gao, X. Yin, F. Li, and H. Kim. 2018. An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wireless Communications and Mobile Computing 2018, 12 (2018) 1--9.
[15]
S. M. H. Rostami, A. K. Sangaiah, J. Wang, and X. Liu. 2019. Obstacle avoidance of mobile robots using modified artificial potential field algorithm. EURASIP Journal on Wireless Communications and Networking. 2019, 1(2019), 2075--2085.
[16]
Y. Yin, Y. Xu, W. Xu, M. Gao, L. Yu, and Y. Pei. 2017. Collaborative service selection via ensemble learning in mixed mobile network environments. Entropy 19, 7 (2017), 358--375.
[17]
A. K. Das, S. Zeadally, and D. He. 2018. Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems 89, 12 (2018), 110--125.
[18]
X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K.-K. R. Choo. 2018. A three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments. Journal of Network and Computer Applications 103, 2 (2018), 194--204.
[19]
J. Pan and J. McElhannon. 2018. Future edge cloud and edge computing for Internet of Things applications. IEEE Internet of Things Journal 5, 1 (2018), 439--449.
[20]
Y. Ren, Y. Liu, and C. Qian. 2018. Digital continuity guarantee based on data consistency in cloud storage. In Proceedings of Cloud Computing and Security, Cham l (2018), 3--11.
[21]
Y. J. Ren, Y. Leng, F. J. Zhu, J. Wang, and H-J. Kim. 2019. Data storage mechanism based on blockchain with privacy protection in wireless body area network. Sensors. 19, 10 (2019), 2395--2408.
[22]
Y. Yin, W. Xu, Y. Xu, H. Li, and L. Yu. 2017. Collaborative QoS prediction for mobile service with data filtering and slopeone model. Mobile Information Systems. 2017, 6 (2017), 1--14.
[23]
Y. J. Ren, F. J. Zhu, J. Qi, J. Wang, and A. K. Sangaiah. 2019. Identity management and access control based on blockchain under edge computing for the industrial Internet of Things. Applied Sciences 9, 10 (2019), 2058--2074.
[24]
E. Hesham, S. Sharmi, P. Mukesh, P. Deepak, G. Akshansh, M. Manoranjan, and C. Lin. 2017. Edge of things: The big picture on the integration of edge, IoT, and the cloud in a distributed computing environment. IEEE Access 5, 6 (2017), 1706--1717.
[25]
S. N. Shirazi, A. Gouglidis, A. Farshad, and D. Hutchison. 2017. The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications 35, 11 (2017), 2586--2595.
[26]
Y. Liu, Y. Ren, C. Ge, J. Xia, and Q. Wang. 2019. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system. Journal of Information Security and Applications 47, 8 (2019), 125--131.
[27]
J. Zhang, X. Jin, J. Sun, J. Wang, and A. K. Sangaiah. 2018. Spatial and semantic convolutional features for robust visual object tracking. Multimedia Tools and Applications 79, 6 (2020), 15095--15115.
[28]
R. C. Kim-Kwang, G. Stefanos, H. P. Jong. 2018. Cryptographic solutions for industrial internet-of-things: Research challenges and opportunities. IEEE Transactions on Industrial Informatics. 14, 8 (2018), 3567--3569.
[29]
G. Caronni and M. Waldvogel. 2003. Establishing trust in distributed storage providers. In Proceedings of 3rd International Conference on Peer-to-Peer Computing. 128--133.
[30]
Y. Deswarte, J.-J. Quisquater, and A. Saïdane. 2004. Remote integrity checking: Integrity and internal control in information systems VI. 1--11.
[31]
D. L. G. Filho and P. S. L. M. Barreto. 2006. Demonstrating data possession and uncheatable data transfer. IACR Cryptology ePrint Archive. 2006 (2006), 150.
[32]
V. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater. 2008. Efficient remote data possession checking in critical information infrastructures. IEEE Transactions on Knowledge and Data Engineering 20, 6 (2008), 1034--1038.
[33]
A. F. Barsoum and M. A. Hasan. 2010. Provable possession and replication of data over cloud servers. Centre For Applied Cryptographic Research (CACR), University of Waterloo. 32.
[34]
Z. Hao, S. Zhong, and N. Yu. 2011. A privacy preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Transactions on Knowledge and Data Engineering 23, 9 (2011), 1432--1437.
[35]
W. Khedr1, H. Khater1, and E. Mohamed. 2019. Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access 7, 5 (2019), 65635--65651.
[36]
J. Benaloh and M. de Mare. 1994. One-way accumulators: A decentralized alternative to digital signatures. In Proceedings of Advances in Cryptology — EUROCRYPT ’93, Berlin. 274--285.
[37]
H. Lipmaa. 2012. Secure accumulators from Euclidean rings without trusted setup. In Proceedings of Applied Cryptography and Network Security, Berlin. 224--240.
[38]
L. Nguyen. 2005. Accumulators from bilinear pairings and applications. In Proceedings of Topics in Cryptology -- CT-RSA 2005, Berlin. 275--292.
[39]
I. Damgård and N. Triandopoulos. 2008. Supporting non-membership proofs with bilinear-map accumulators. IACR Cryptology ePrint Archive. 2008 (2008), 538.
[40]
I. Miers, C. Garman, M. Green, and A. D. Rubin. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of 2013 IEEE Symposium on Security and Privacy. 397--411.
[41]
A. F. Barsoum and M. A. Hasan. 2015. Provable multicopy dynamic data possession in cloud computing systems. IEEE Transactions on Information Forensics and Security 10, 3 (2015), 485--497.
[42]
J. Wang, X. Gu, W. Liu, A. K. Sangaiah, and H. Kim. 2019. An empower Hamilton loop based data collection algorithm with mobile agent for WSNs. Human-centric Computing and Information Sciences 9, 18 (2019), 2659--2672.
[43]
B. Yin, S. Zhou, S. Zhang, K. Gu, and F. Yu. 2017. On efficient processing of continuous reverse skyline queries in wireless sensor networks. KSII Transactions on Internet and Information Systems 11, 4 (2017), 1931--1953.
[44]
M. Gusev and S. Dustdar. 2018. Going back to the roots—The evolution of edge computing, an IoT perspective. IEEE Internet Computing. 22, 2 (2018), 5--15.
[45]
F. Zafar, A. Khan, S. U. R. Malik, M. Ahmed, A. Anjum, and M. I. A. Khan. 2017. Survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Computers 8 Security. 65, 3 (2017), 29--49.
[46]
R. Housley, W. Polk, W. Ford, and D. Solo. 2008. Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. 1721--2070.
[47]
J. Wang, C. Ju, Y. Gao, A. K. Sangaiah, and G. Kim. 2018. A PSO based energy efficient coverage control algorithm for wireless sensor networks. Computers Materials 8 Continua. 56, 3 (2018), 433--446.
[48]
C. Ge, Z. Liu, J. Xia, and L. Fang. 2019. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing 19, 2 (2019), 1--1.
[49]
J. Daemen and V. Rijmen. 2013. The design of rijndael: AES-the advanced encryption standard. Springer Science 8 Business Media.
[50]
M. J. Dworkin. 2015. Sha-3 standard: Permutation-based hash and extendable-output functions. Federal Inf. Process. Stds. (NIST FIPS)-202.

Cited By

View all
  • (2024)A Review of Power System False Data Attack Detection Technology Based on Big DataInformation10.3390/info1508043915:8(439)Online publication date: 28-Jul-2024
  • (2024)A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future TrendsACM Computing Surveys10.1145/368027757:1(1-34)Online publication date: 7-Oct-2024
  • (2024)SFOM-DT: A Secure and Fair One-to-Many Data Trading Scheme Based on BlockchainIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347581619(10029-10042)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 21, Issue 1
Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
February 2021
534 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3441681
  • Editor:
  • Ling Liu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 February 2021
Online AM: 07 May 2020
Accepted: 01 January 2020
Revised: 01 December 2019
Received: 01 October 2019
Published in TOIT Volume 21, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Sensor data storage
  2. accumulator
  3. data integrity verification

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • NSFC
  • PAPD fund from NUIST

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)50
  • Downloads (Last 6 weeks)2
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Review of Power System False Data Attack Detection Technology Based on Big DataInformation10.3390/info1508043915:8(439)Online publication date: 28-Jul-2024
  • (2024)A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future TrendsACM Computing Surveys10.1145/368027757:1(1-34)Online publication date: 7-Oct-2024
  • (2024)SFOM-DT: A Secure and Fair One-to-Many Data Trading Scheme Based on BlockchainIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347581619(10029-10042)Online publication date: 1-Jan-2024
  • (2024)Privacy-Preserving AI Framework for 6G-Enabled Consumer ElectronicsIEEE Transactions on Consumer Electronics10.1109/TCE.2024.337192870:1(3940-3950)Online publication date: 29-Feb-2024
  • (2024)Distributed Medical Data Storage Mechanism Based on Proof of Retrievability and Vector Commitment for Metaverse ServicesIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2023.327202128:11(6298-6307)Online publication date: Nov-2024
  • (2024)Research on the Privacy Protection Technology of Blockchain Spatiotemporal Big DataIEEE Access10.1109/ACCESS.2024.341559012(111187-111195)Online publication date: 2024
  • (2024)PoEDDP-A Fast RSA-Based Proof of Possession Accumulator of Dynamic Data on the CloudIEEE Access10.1109/ACCESS.2024.338734812(52878-52901)Online publication date: 2024
  • (2024)BI-RRT*: An improved path planning algorithm for secure and trustworthy mobile robots systemsHeliyon10.1016/j.heliyon.2024.e2640310:5(e26403)Online publication date: Mar-2024
  • (2023)Blockchain Data Availability Scheme with Strong Data Privacy ProtectionInformation10.3390/info1402008814:2(88)Online publication date: 2-Feb-2023
  • (2023)Detection Algorithm of Surface Defect Word on Printed Circuit BoardComputer Systems Science and Engineering10.32604/csse.2023.03670946:3(3911-3923)Online publication date: 2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media