skip to main content
research-article

Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator

Authors Info & Claims
Published:17 February 2021Publication History
Skip Abstract Section

Abstract

With the explosive growth in the number of IoT devices, ensuring the integrity of the massive data generated by these devices has become an important issue. Due to the limitation of hardware, most past data integrity verification schemes randomly select partial data blocks and then perform integrity validation on those blocks instead of examining the entire dataset. This will result in that unsampled data blocks cannot be detected even if they are tampered with. To solve this problem, we propose a new and effective integrity auditing mechanism of sensor data based on a bilinear map accumulator. Using the proposed approach will examine all the data blocks in the dataset, not just some of the data blocks, thus, eliminating the possibility of any cloud manipulation. Compared with other schemes, our proposed solution has been proved to be highly secure for all necessary security requirements, including tag forgery, data deletion, replacement, replay, and data leakage attacks. The solution reduces the computational and storage costs of cloud storage providers and verifiers, and also supports dynamic operations for data owners to insert, delete, and update data by using a tag index table (TIT). Compared with existing schemes based on RSA accumulator, our scheme has the advantages of fast verification and witness generation and no need to map data blocks to prime numbers. The new solution supports all the characteristics of a data integrity verification scheme.

References

  1. C. Yin, J. Xi, R. Sun, and J. Wang. 2018. Location privacy protection based on differential privacy strategy for big data in industrial Internet of Things. IEEE Transactions on Industrial Informatics 14, 8 (2018), 3628--3636.Google ScholarGoogle ScholarCross RefCross Ref
  2. Y. Li, M. Kumar, W. Shi, and J. Wan. 2017. Falcon: An ambient temperature aware thermal control policy for IoT gateways. Sustainable Computing-Informatics 8 Systems 16, 4 (2017), 48--55.Google ScholarGoogle Scholar
  3. X. Li, J. Peng, J. Niu, F. Wu, J. Liao, and K. R. Choo. 2018. A robust and energy efficient authentication protocol for industrial Internet of Things. IEEE Internet of Things Journal. 5, 2 (2018), 1606--1615. DOI:https://doi.org/10.1109/JIOT.2017.2787800Google ScholarGoogle ScholarCross RefCross Ref
  4. G. Jia, G. Han, H. Rao, and L. Shu. 2018. Edge computing-based intelligent manhole cover management system for smart cities. IEEE Internet of Things Journal 5, 3 (2018), 1648--1656.Google ScholarGoogle ScholarCross RefCross Ref
  5. Y. Chen, J. Wang, R. Xia, Q. Zhang, Z. Cao, and K. Yang. 2019. The visual object tracking algorithm research based on adaptive combination kernel. Journal of Ambient Intelligence and Humanized Computing 19, 10 (2019), 4855--4867. DOI:https://doi.org/10.1007/s12652-018-01171-4Google ScholarGoogle ScholarCross RefCross Ref
  6. J. Wang, Y. Gao, W. Liu, A. K. Sangaiah, and H.-J. Kim. 2019. An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks. International Journal of Distributed Sensor Networks. 2019, 3 (2019), 833--847. DOI:https://doi.org/10.1177/1550147719839581Google ScholarGoogle Scholar
  7. B. Yin and X. We. 2019. Communication-efficient data aggregation tree construction for complex queries in IoT applications. IEEE Internet of Things Journal 6, 2 (2019), 3352--3363. DOI:https://doi.org/10.1109/JIOT.2018.2882820Google ScholarGoogle ScholarCross RefCross Ref
  8. Y. Yin, F. Yu, Y. Xu, L. Yu, and J. Mu. 2017. Network location-aware service recommendation with random walk in cyber-physical systems. Sensors 17, 9 (2017), 2059--2071.Google ScholarGoogle ScholarCross RefCross Ref
  9. Y. J. Ren, Y. Leng, Y. P. Cheng, and J. Wang. 2019. Secure data storage based on blockchain and coding in edge computing. Mathematical Biosciences and Engineering 16, 3 (2019), 1874--1892. DOI:https://doi.org/10.3934/mbe.2019091Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Wang, Y. Gao, W. Liu, W. Wu, and S. Lim. 2019. An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Computer, Materials 8 Continua 58, 3 (2019), 711--725.Google ScholarGoogle Scholar
  11. Y. Ren, Y. Liu, S. Ji, A. K. Sangaiah, and J. Wang. 2018. Incentive mechanism of data storage based on blockchain for wireless sensor networks. Mobile Information Systems. 2018, 10 (2018), 158--167. DOI:https://doi.org/10.1155/2018/6874158Google ScholarGoogle ScholarCross RefCross Ref
  12. Y. Yin, L. Chen, Y. Xu, J. Wan, H. Zhang, and Z. Mai. 2019. QoS prediction for service recommendation with deep feature learning in edge computing environment. Mobile Networks and Applications 25, 4 (2019), 391--401. DOI:https://doi.org/10.1007/s11036-019-01241-7Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Chen, M. Lin, and C. Liu. 2018. Edge computing gateway of the industrial Internet of Things using multiple collaborative microcontrollers. IEEE Network 38, 1 (2018), 24--32.Google ScholarGoogle ScholarCross RefCross Ref
  14. J. Wang, Y. Gao, X. Yin, F. Li, and H. Kim. 2018. An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wireless Communications and Mobile Computing 2018, 12 (2018) 1--9. DOI:https://doi.org/10.1155/2018/9472075Google ScholarGoogle Scholar
  15. S. M. H. Rostami, A. K. Sangaiah, J. Wang, and X. Liu. 2019. Obstacle avoidance of mobile robots using modified artificial potential field algorithm. EURASIP Journal on Wireless Communications and Networking. 2019, 1(2019), 2075--2085. DOI:https://doi.org/10.1186/s13638-019-1396-2Google ScholarGoogle ScholarCross RefCross Ref
  16. Y. Yin, Y. Xu, W. Xu, M. Gao, L. Yu, and Y. Pei. 2017. Collaborative service selection via ensemble learning in mixed mobile network environments. Entropy 19, 7 (2017), 358--375.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. K. Das, S. Zeadally, and D. He. 2018. Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems 89, 12 (2018), 110--125. DOI:https://doi.org/10.1016/j.future.2018.06.027Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. X. Li, J. Niu, S. Kumari, F. Wu, A. K. Sangaiah, and K.-K. R. Choo. 2018. A three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things environments. Journal of Network and Computer Applications 103, 2 (2018), 194--204. DOI:https://doi.org/10.1016/j.jnca.2017.07.001Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Pan and J. McElhannon. 2018. Future edge cloud and edge computing for Internet of Things applications. IEEE Internet of Things Journal 5, 1 (2018), 439--449.Google ScholarGoogle ScholarCross RefCross Ref
  20. Y. Ren, Y. Liu, and C. Qian. 2018. Digital continuity guarantee based on data consistency in cloud storage. In Proceedings of Cloud Computing and Security, Cham l (2018), 3--11.Google ScholarGoogle ScholarCross RefCross Ref
  21. Y. J. Ren, Y. Leng, F. J. Zhu, J. Wang, and H-J. Kim. 2019. Data storage mechanism based on blockchain with privacy protection in wireless body area network. Sensors. 19, 10 (2019), 2395--2408. DOI:https://doi.org/10.3390/s19102395Google ScholarGoogle ScholarCross RefCross Ref
  22. Y. Yin, W. Xu, Y. Xu, H. Li, and L. Yu. 2017. Collaborative QoS prediction for mobile service with data filtering and slopeone model. Mobile Information Systems. 2017, 6 (2017), 1--14.Google ScholarGoogle ScholarCross RefCross Ref
  23. Y. J. Ren, F. J. Zhu, J. Qi, J. Wang, and A. K. Sangaiah. 2019. Identity management and access control based on blockchain under edge computing for the industrial Internet of Things. Applied Sciences 9, 10 (2019), 2058--2074. DOI:https://doi.org/10.3390/app9102058Google ScholarGoogle ScholarCross RefCross Ref
  24. E. Hesham, S. Sharmi, P. Mukesh, P. Deepak, G. Akshansh, M. Manoranjan, and C. Lin. 2017. Edge of things: The big picture on the integration of edge, IoT, and the cloud in a distributed computing environment. IEEE Access 5, 6 (2017), 1706--1717.Google ScholarGoogle Scholar
  25. S. N. Shirazi, A. Gouglidis, A. Farshad, and D. Hutchison. 2017. The extended cloud: Review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE Journal on Selected Areas in Communications 35, 11 (2017), 2586--2595.Google ScholarGoogle ScholarCross RefCross Ref
  26. Y. Liu, Y. Ren, C. Ge, J. Xia, and Q. Wang. 2019. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system. Journal of Information Security and Applications 47, 8 (2019), 125--131. DOI:https://doi.org/10.1016/j.jisa.2019.05.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. Zhang, X. Jin, J. Sun, J. Wang, and A. K. Sangaiah. 2018. Spatial and semantic convolutional features for robust visual object tracking. Multimedia Tools and Applications 79, 6 (2020), 15095--15115. DOI:https://doi.org/10.1007/s11042-018-6562-8Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. C. Kim-Kwang, G. Stefanos, H. P. Jong. 2018. Cryptographic solutions for industrial internet-of-things: Research challenges and opportunities. IEEE Transactions on Industrial Informatics. 14, 8 (2018), 3567--3569.Google ScholarGoogle ScholarCross RefCross Ref
  29. G. Caronni and M. Waldvogel. 2003. Establishing trust in distributed storage providers. In Proceedings of 3rd International Conference on Peer-to-Peer Computing. 128--133.Google ScholarGoogle Scholar
  30. Y. Deswarte, J.-J. Quisquater, and A. Saïdane. 2004. Remote integrity checking: Integrity and internal control in information systems VI. 1--11.Google ScholarGoogle Scholar
  31. D. L. G. Filho and P. S. L. M. Barreto. 2006. Demonstrating data possession and uncheatable data transfer. IACR Cryptology ePrint Archive. 2006 (2006), 150.Google ScholarGoogle Scholar
  32. V. Sebé, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater. 2008. Efficient remote data possession checking in critical information infrastructures. IEEE Transactions on Knowledge and Data Engineering 20, 6 (2008), 1034--1038.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. A. F. Barsoum and M. A. Hasan. 2010. Provable possession and replication of data over cloud servers. Centre For Applied Cryptographic Research (CACR), University of Waterloo. 32.Google ScholarGoogle Scholar
  34. Z. Hao, S. Zhong, and N. Yu. 2011. A privacy preserving remote data integrity checking protocol with data dynamics and public verifiability. IEEE Transactions on Knowledge and Data Engineering 23, 9 (2011), 1432--1437.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. W. Khedr1, H. Khater1, and E. Mohamed. 2019. Cryptographic accumulator-based scheme for critical data integrity verification in cloud storage. IEEE Access 7, 5 (2019), 65635--65651. DOI:https://doi.org/10.1109/ACCESS.2019.2917628Google ScholarGoogle ScholarCross RefCross Ref
  36. J. Benaloh and M. de Mare. 1994. One-way accumulators: A decentralized alternative to digital signatures. In Proceedings of Advances in Cryptology — EUROCRYPT ’93, Berlin. 274--285.Google ScholarGoogle ScholarCross RefCross Ref
  37. H. Lipmaa. 2012. Secure accumulators from Euclidean rings without trusted setup. In Proceedings of Applied Cryptography and Network Security, Berlin. 224--240.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. L. Nguyen. 2005. Accumulators from bilinear pairings and applications. In Proceedings of Topics in Cryptology -- CT-RSA 2005, Berlin. 275--292.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. I. Damgård and N. Triandopoulos. 2008. Supporting non-membership proofs with bilinear-map accumulators. IACR Cryptology ePrint Archive. 2008 (2008), 538.Google ScholarGoogle Scholar
  40. I. Miers, C. Garman, M. Green, and A. D. Rubin. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of 2013 IEEE Symposium on Security and Privacy. 397--411.Google ScholarGoogle Scholar
  41. A. F. Barsoum and M. A. Hasan. 2015. Provable multicopy dynamic data possession in cloud computing systems. IEEE Transactions on Information Forensics and Security 10, 3 (2015), 485--497.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. J. Wang, X. Gu, W. Liu, A. K. Sangaiah, and H. Kim. 2019. An empower Hamilton loop based data collection algorithm with mobile agent for WSNs. Human-centric Computing and Information Sciences 9, 18 (2019), 2659--2672. DOI:https://doi.org/10.1186/s13673-019-0179-4Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. B. Yin, S. Zhou, S. Zhang, K. Gu, and F. Yu. 2017. On efficient processing of continuous reverse skyline queries in wireless sensor networks. KSII Transactions on Internet and Information Systems 11, 4 (2017), 1931--1953.Google ScholarGoogle Scholar
  44. M. Gusev and S. Dustdar. 2018. Going back to the roots—The evolution of edge computing, an IoT perspective. IEEE Internet Computing. 22, 2 (2018), 5--15.Google ScholarGoogle ScholarCross RefCross Ref
  45. F. Zafar, A. Khan, S. U. R. Malik, M. Ahmed, A. Anjum, and M. I. A. Khan. 2017. Survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. Computers 8 Security. 65, 3 (2017), 29--49.Google ScholarGoogle Scholar
  46. R. Housley, W. Polk, W. Ford, and D. Solo. 2008. Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. 1721--2070.Google ScholarGoogle Scholar
  47. J. Wang, C. Ju, Y. Gao, A. K. Sangaiah, and G. Kim. 2018. A PSO based energy efficient coverage control algorithm for wireless sensor networks. Computers Materials 8 Continua. 56, 3 (2018), 433--446.Google ScholarGoogle Scholar
  48. C. Ge, Z. Liu, J. Xia, and L. Fang. 2019. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing 19, 2 (2019), 1--1. DOI:https://doi.org/10.1109/TDSC.2019.2899300Google ScholarGoogle Scholar
  49. J. Daemen and V. Rijmen. 2013. The design of rijndael: AES-the advanced encryption standard. Springer Science 8 Business Media.Google ScholarGoogle Scholar
  50. M. J. Dworkin. 2015. Sha-3 standard: Permutation-based hash and extendable-output functions. Federal Inf. Process. Stds. (NIST FIPS)-202.Google ScholarGoogle Scholar

Index Terms

  1. Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Internet Technology
          ACM Transactions on Internet Technology  Volume 21, Issue 1
          Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
          February 2021
          534 pages
          ISSN:1533-5399
          EISSN:1557-6051
          DOI:10.1145/3441681
          • Editor:
          • Ling Liu
          Issue’s Table of Contents

          Copyright © 2021 ACM

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 February 2021
          • Online AM: 7 May 2020
          • Accepted: 1 January 2020
          • Revised: 1 December 2019
          • Received: 1 October 2019
          Published in toit Volume 21, Issue 1

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!