skip to main content
research-article

Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data

Authors Info & Claims
Published:03 March 2023Publication History
Skip Abstract Section

Abstract

The Internet of Vehicles (IoV), with the help of cloud computing, can provide rich and powerful application services for vehicles and drivers by sharing and analysing various IoV data. However, how to ensure the integrity of IoV data with multiple sources and diversity outsourced in the cloud is still an open challenge. To address this concern, this paper first presents an identity-based public auditing scheme for cloud storage of IoV data, which can fully achieve the essential function and security requirements, such as classified auditing, multi-source auditing and privacy protection. Particularly, we design a new authenticated data structure, called data mapping table, to track the distribution of each type of IoV data to ensure fine and rapid audits. Moreover, our scheme can reduce the overheads for both the key management and the generation of block tags. We formally prove the security of the presented scheme and evaluate its performance by comprehensive comparisons with the state-of-the-art schemes designed for traditional scenarios. The theoretical analyses and experimental results demonstrate that our scheme can securely and efficiently realize public auditing for IoV data, and outperforms the previous ones in both the computation and communication overheads in most cases.

REFERENCES

  1. [1] Kaiwartya Omprakash, Abdullah Abdul Hanan, Cao Yue, Altameem Ayman, Prasad Mukesh, Lin Chin-Teng, and Liu Xiulei. 2016. Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 4, (2016), 53565373. Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Xu Li Da, He Wu, and Li Shancang. 2014. Internet of things in industries: A survey. IEEE Trans. Ind. Inf. 10, 4 (November 2014), 22332243. Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Xu Wenchao, Zhou Haibo, Cheng Nan, Lyu Feng, Shi Weisen, Chen Jiayin, and Shen Xuemin. 2018. Internet of vehicles in big data era. IEEE/CAA Journal of Automatica Sinica 5, 1 ( January 2018), 1935. Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] He Wu, Yan Gongjun, and Da Xu Li. 2014. Developing vehicular data cloud services in the IoT environment. IEEE Trans. Ind. Inf. 10, 2 (May 2014), 15871595. Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Felemban Muhamad, Felemban Emad, Kobes Jason, and Ghafoor Arif. 2019. Threat management in data-centric IoT-Based collaborative systems. ACM Transactions on Internet Technology 19, 3 (November 2019), 119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Sharma Surbhi and Kaushik Baijnath. 2019. A survey on internet of vehicles: Applications, security issues & solutions. Veh. Commun. 20, (December 2019), 100182. Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Abdelzaher Tarek, Hao Yifan, Jayarajah Kasthuri, Misra Archan, Skarin Per, Yao Shuochao, Weerakoon Dulanga, and Årzén Karl-Erik. 2020. Five challenges in cloud-enabled intelligence and control. ACM Trans. Internet Technol. 20, 1 (March 2020), 119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Xu Xiaolong, Xue Yuan, Qi Lianyong, Yuan Yuan, Zhang Xuyun, Umer Tariq, and Wan Shaohua. 2019. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener. Comp. Sy. 96, ( July 2019), 89100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Coles Cameron. 2019. 9 cloud computing security risks every company faces. Retrieved June 12, 2020 from https://www.skyhighnetworks.com/cloud-security-blog/9-cloud-computing-security-risks-every-company-faces/.Google ScholarGoogle Scholar
  10. [10] Swinhoe Dan. 2020. The 15 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html.Google ScholarGoogle Scholar
  11. [11] Tian Hui, Chen Yuxiang, Jiang Hong, Huang Yongfeng, Nan Fulin, and Chen Yonghong. 2019. Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17, 1 ( January 2019), 1022. Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Sebe F., Domingo-Ferrer J., Martinez-Balleste A., Deswarte Y., and Quisquater J.-J.. 2008. Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data 20, 8 (August 2008), 10341038. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Juels Ari and Kaliski Burton S.. 2007. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). Association for Computing Machinery, New York, NY, USA, 584597. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Ateniese Giuseppe, Burns Randal, Curtmola Reza, Herring Joseph, Kissner Lea, Peterson Zachary, and Song Dawn. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07). Association for Computing Machinery, New York, NY, USA, 598609. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Wang Qian, Wang Cong, Ren Kui, Lou Wenjing, and Li Jin. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22, 5 (May 2011), 847859. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Chris Erway C., Küpçü Alptekin, Papamanthou Charalampos, and Tamassia Roberto. 2015. Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17, 4, Article 15 (April 2015), 1–29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Zhu Yan, Ahn Gail-Joon, Hu Hongxin, Yau Stephen S., An Ho G., and Chang-Jun Hu. 2013. Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6, 2 (April 2013), 227238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Tian Hui, Chen Yuxiang, Chang Chin-Chen, Jiang Hong, Huang Yongfeng, Chen Yonghong, and Liu Jin. 2017. Dynamic-Hash-Table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10, 5 (September 2017), 701714. Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, and Willy Susilo. 2017. An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensic Secur. 12, 10 (October 2017), 24022415. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Barsoum Ayad F. and Anwar Hasan M.. 2015. Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans. Inf. Forensic Secur. 10, 3 (March 2015), 485497. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Liu Chang, Ranjan Rajiv, Yang Chi, Zhang Xuyun, Wang Lizhe, and Chen Jinjun. 2015. MuR-DPA: Top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64, 9 (September 2015), 26092622. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Wang Boyang, Li Baochun, and Li Hui. 2015. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8, 1 ( January 2015), 92106. Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Tian Hui, Nan Fulin, Jiang Hong, Chang Chin-Chen, Ning Jianting, and Huang Yongfeng. 2019. Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, ( January 2019), 107125. Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Wang Cong, Chow Sherman S. M., Wang Qian, Ren Kui, and Lou Wenjing. 2013. Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 2 (February 2013), 362375. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Wang Boyang, Li Baochun, Li Hui, and Li Fenghua. 2013. Certificateless public auditing for data integrity in the cloud. In Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS), IEEE, National Harbor, MD, USA, 136144. Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Shamir Adi. 1985. Identity-based cryptosystems and signature schemes. In Proceedings of the Advances in Cryptology, George Robert Blakley and David Chaum (eds.). Springer Berlin, Berlin, 4753. Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] He Debiao, Zeadally Sherali, and Wu Libing. 2018. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12, 1 (March 2018), 6473. Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Zhang Jianhong and Dong Qiaocui. 2016. Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343–344, (May 2016), 114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Zhang Xiaojun, Zhao Jie, Mu Liming, Tang Yao, and Xu Chunxiang. 2019. Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems. Pervasive Mob. Comput. 56, (May 2019), 1828. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Wang Yujue, Wu Qianhong, Qin Bo, Shi Wenchang, Deng Robert H., and Hu Jiankun. 2017. Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans.Inform.Forensic Secur. 12, 4 (April 2017), 940952. Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Mane Pramod and Ratnaparkhi Abhay. 2014. Cloud partner selection algorithm for dynamic cloud collaboration. IEEE, 15. Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] 2020 Siemens Industry Software Inc. The introduction of the Cloud Partner. Retrieved June 12, 2020 from https://www.plm.automation.siemens.com/global/en/our-story/partners/cloud-partner.html.Google ScholarGoogle Scholar
  33. [33] Yang Guangyang, Yu Jia, Shen Wenting, Su Qianqian, Fu Zhangjie, and Hao Rong. 2016. Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, (March 2016), 130139. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Wang Boyang, Li Baochun, and Li Hui. 2014. Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2, 1 ( January 2014), 4356. Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 22, Issue 4
        November 2022
        642 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3561988
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 March 2023
        • Online AM: 9 March 2022
        • Accepted: 2 November 2020
        • Revised: 27 September 2020
        • Received: 13 June 2020
        Published in toit Volume 22, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!