Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data

Published: 03 March 2023 Publication History

Abstract

The Internet of Vehicles (IoV), with the help of cloud computing, can provide rich and powerful application services for vehicles and drivers by sharing and analysing various IoV data. However, how to ensure the integrity of IoV data with multiple sources and diversity outsourced in the cloud is still an open challenge. To address this concern, this paper first presents an identity-based public auditing scheme for cloud storage of IoV data, which can fully achieve the essential function and security requirements, such as classified auditing, multi-source auditing and privacy protection. Particularly, we design a new authenticated data structure, called data mapping table, to track the distribution of each type of IoV data to ensure fine and rapid audits. Moreover, our scheme can reduce the overheads for both the key management and the generation of block tags. We formally prove the security of the presented scheme and evaluate its performance by comprehensive comparisons with the state-of-the-art schemes designed for traditional scenarios. The theoretical analyses and experimental results demonstrate that our scheme can securely and efficiently realize public auditing for IoV data, and outperforms the previous ones in both the computation and communication overheads in most cases.

References

[1]
Omprakash Kaiwartya, Abdul Hanan Abdullah, Yue Cao, Ayman Altameem, Mukesh Prasad, Chin-Teng Lin, and Xiulei Liu. 2016. Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 4, (2016), 5356–5373.
[2]
Li Da Xu, Wu He, and Shancang Li. 2014. Internet of things in industries: A survey. IEEE Trans. Ind. Inf. 10, 4 (November 2014), 2233–2243.
[3]
Wenchao Xu, Haibo Zhou, Nan Cheng, Feng Lyu, Weisen Shi, Jiayin Chen, and Xuemin Shen. 2018. Internet of vehicles in big data era. IEEE/CAA Journal of Automatica Sinica 5, 1 ( January 2018), 19–35.
[4]
Wu He, Gongjun Yan, and Li Da Xu. 2014. Developing vehicular data cloud services in the IoT environment. IEEE Trans. Ind. Inf. 10, 2 (May 2014), 1587–1595.
[5]
Muhamad Felemban, Emad Felemban, Jason Kobes, and Arif Ghafoor. 2019. Threat management in data-centric IoT-Based collaborative systems. ACM Transactions on Internet Technology 19, 3 (November 2019), 1–19.
[6]
Surbhi Sharma and Baijnath Kaushik. 2019. A survey on internet of vehicles: Applications, security issues & solutions. Veh. Commun. 20, (December 2019), 100182.
[7]
Tarek Abdelzaher, Yifan Hao, Kasthuri Jayarajah, Archan Misra, Per Skarin, Shuochao Yao, Dulanga Weerakoon, and Karl-Erik Årzén. 2020. Five challenges in cloud-enabled intelligence and control. ACM Trans. Internet Technol. 20, 1 (March 2020), 1–19.
[8]
Xiaolong Xu, Yuan Xue, Lianyong Qi, Yuan Yuan, Xuyun Zhang, Tariq Umer, and Shaohua Wan. 2019. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener. Comp. Sy. 96, ( July 2019), 89–100.
[9]
Cameron Coles. 2019. 9 cloud computing security risks every company faces. Retrieved June 12, 2020 from https://www.skyhighnetworks.com/cloud-security-blog/9-cloud-computing-security-risks-every-company-faces/.
[10]
Dan Swinhoe. 2020. The 15 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html.
[11]
Hui Tian, Yuxiang Chen, Hong Jiang, Yongfeng Huang, Fulin Nan, and Yonghong Chen. 2019. Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17, 1 ( January 2019), 10–22.
[12]
F. Sebe, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater. 2008. Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data 20, 8 (August 2008), 1034–1038.
[13]
Ari Juels and Burton S. Kaliski. 2007. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). Association for Computing Machinery, New York, NY, USA, 584–597.
[14]
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07). Association for Computing Machinery, New York, NY, USA, 598–609.
[15]
Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22, 5 (May 2011), 847–859.
[16]
C. Chris Erway, Alptekin Küpçü, Charalampos Papamanthou, and Roberto Tamassia. 2015. Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17, 4, Article 15 (April 2015), 1–29.
[17]
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, and Chang-Jun Hu. 2013. Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6, 2 (April 2013), 227–238.
[18]
Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, and Jin Liu. 2017. Dynamic-Hash-Table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10, 5 (September 2017), 701–714.
[19]
Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, and Willy Susilo. 2017. An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensic Secur. 12, 10 (October 2017), 2402–2415.
[20]
Ayad F. Barsoum and M. Anwar Hasan. 2015. Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans. Inf. Forensic Secur. 10, 3 (March 2015), 485–497.
[21]
Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, and Jinjun Chen. 2015. MuR-DPA: Top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64, 9 (September 2015), 2609–2622.
[22]
Boyang Wang, Baochun Li, and Hui Li. 2015. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8, 1 ( January 2015), 92–106.
[23]
Hui Tian, Fulin Nan, Hong Jiang, Chin-Chen Chang, Jianting Ning, and Yongfeng Huang. 2019. Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, ( January 2019), 107–125.
[24]
Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou. 2013. Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 2 (February 2013), 362–375.
[25]
Boyang Wang, Baochun Li, Hui Li, and Fenghua Li. 2013. Certificateless public auditing for data integrity in the cloud. In Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS), IEEE, National Harbor, MD, USA, 136–144.
[26]
Adi Shamir. 1985. Identity-based cryptosystems and signature schemes. In Proceedings of the Advances in Cryptology, George Robert Blakley and David Chaum (eds.). Springer Berlin, Berlin, 47–53.
[27]
Debiao He, Sherali Zeadally, and Libing Wu. 2018. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12, 1 (March 2018), 64–73.
[28]
Jianhong Zhang and Qiaocui Dong. 2016. Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343–344, (May 2016), 1–14.
[29]
Xiaojun Zhang, Jie Zhao, Liming Mu, Yao Tang, and Chunxiang Xu. 2019. Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems. Pervasive Mob. Comput. 56, (May 2019), 18–28.
[30]
Yujue Wang, Qianhong Wu, Bo Qin, Wenchang Shi, Robert H. Deng, and Jiankun Hu. 2017. Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans.Inform.Forensic Secur. 12, 4 (April 2017), 940–952.
[31]
Pramod Mane and Abhay Ratnaparkhi. 2014. Cloud partner selection algorithm for dynamic cloud collaboration. IEEE, 1–5.
[32]
2020 Siemens Industry Software Inc. The introduction of the Cloud Partner. Retrieved June 12, 2020 from https://www.plm.automation.siemens.com/global/en/our-story/partners/cloud-partner.html.
[33]
Guangyang Yang, Jia Yu, Wenting Shen, Qianqian Su, Zhangjie Fu, and Rong Hao. 2016. Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, (March 2016), 130–139.
[34]
Boyang Wang, Baochun Li, and Hui Li. 2014. Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2, 1 ( January 2014), 43–56.

Cited By

View all
  • (2024)A Consortium Blockchain-Based Edge Task Offloading Method for Connected Autonomous VehiclesACM Transactions on Autonomous and Adaptive Systems10.1145/3696004Online publication date: 16-Sep-2024
  • (2024)Information Security Risk Assessment Methods in Cloud Computing: Comprehensive ReviewJournal of Computer Information Systems10.1080/08874417.2024.2329985(1-28)Online publication date: 29-Mar-2024
  • (2024)Public cloud object storage auditing: Design, implementation, and analysisJournal of Parallel and Distributed Computing10.1016/j.jpdc.2024.104870189(104870)Online publication date: Jul-2024
  • Show More Cited By

Index Terms

  1. Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 22, Issue 4
      November 2022
      642 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3561988
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 March 2023
      Online AM: 09 March 2022
      Accepted: 02 November 2020
      Revised: 27 September 2020
      Received: 13 June 2020
      Published in TOIT Volume 22, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Public auditing
      2. data integrity
      3. internet of vehicles
      4. cloud storage
      5. data mapping table

      Qualifiers

      • Research-article

      Funding Sources

      • National Natural Science Foundation of China
      • Natural Science Foundation of Fujian Province of China
      • Open Project Program of Wuhan National Laboratory for Optoelectronics
      • Subsidized Project for Post-graduates’ Innovative Fund in Scientific Research of Huaqiao University
      • Scientific Research Funds of Huaqiao University

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)179
      • Downloads (Last 6 weeks)31
      Reflects downloads up to 27 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Consortium Blockchain-Based Edge Task Offloading Method for Connected Autonomous VehiclesACM Transactions on Autonomous and Adaptive Systems10.1145/3696004Online publication date: 16-Sep-2024
      • (2024)Information Security Risk Assessment Methods in Cloud Computing: Comprehensive ReviewJournal of Computer Information Systems10.1080/08874417.2024.2329985(1-28)Online publication date: 29-Mar-2024
      • (2024)Public cloud object storage auditing: Design, implementation, and analysisJournal of Parallel and Distributed Computing10.1016/j.jpdc.2024.104870189(104870)Online publication date: Jul-2024
      • (2023)Secure Multi-Keyword Retrieval with Integrity Guarantee for Outsourced ADS-B Data in Clouds2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS)10.1109/ICPADS60453.2023.00246(1777-1784)Online publication date: 17-Dec-2023
      • (2022)Handling occlusion in prohibited item detection from X-ray imagesNeural Computing and Applications10.1007/s00521-022-07578-734:22(20285-20298)Online publication date: 1-Nov-2022

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media