Abstract
The Internet of Vehicles (IoV), with the help of cloud computing, can provide rich and powerful application services for vehicles and drivers by sharing and analysing various IoV data. However, how to ensure the integrity of IoV data with multiple sources and diversity outsourced in the cloud is still an open challenge. To address this concern, this paper first presents an identity-based public auditing scheme for cloud storage of IoV data, which can fully achieve the essential function and security requirements, such as classified auditing, multi-source auditing and privacy protection. Particularly, we design a new authenticated data structure, called data mapping table, to track the distribution of each type of IoV data to ensure fine and rapid audits. Moreover, our scheme can reduce the overheads for both the key management and the generation of block tags. We formally prove the security of the presented scheme and evaluate its performance by comprehensive comparisons with the state-of-the-art schemes designed for traditional scenarios. The theoretical analyses and experimental results demonstrate that our scheme can securely and efficiently realize public auditing for IoV data, and outperforms the previous ones in both the computation and communication overheads in most cases.
- [1] . 2016. Internet of vehicles: Motivation, layered architecture, network model, challenges, and future aspects. IEEE Access 4, (2016), 5356–5373. Google Scholar
Cross Ref
- [2] . 2014. Internet of things in industries: A survey. IEEE Trans. Ind. Inf. 10, 4 (November 2014), 2233–2243. Google Scholar
Cross Ref
- [3] . 2018. Internet of vehicles in big data era. IEEE/CAA Journal of Automatica Sinica 5, 1 ( January 2018), 19–35. Google Scholar
Cross Ref
- [4] . 2014. Developing vehicular data cloud services in the IoT environment. IEEE Trans. Ind. Inf. 10, 2 (May 2014), 1587–1595. Google Scholar
Cross Ref
- [5] . 2019. Threat management in data-centric IoT-Based collaborative systems. ACM Transactions on Internet Technology 19, 3 (November 2019), 1–19. Google Scholar
Digital Library
- [6] . 2019. A survey on internet of vehicles: Applications, security issues & solutions. Veh. Commun. 20, (December 2019), 100182. Google Scholar
Cross Ref
- [7] . 2020. Five challenges in cloud-enabled intelligence and control. ACM Trans. Internet Technol. 20, 1 (March 2020), 1–19. Google Scholar
Digital Library
- [8] . 2019. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener. Comp. Sy. 96, ( July 2019), 89–100. Google Scholar
Digital Library
- [9] . 2019. 9 cloud computing security risks every company faces. Retrieved June 12, 2020 from https://www.skyhighnetworks.com/cloud-security-blog/9-cloud-computing-security-risks-every-company-faces/.Google Scholar
- [10] . 2020. The 15 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html.Google Scholar
- [11] . 2019. Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17, 1 ( January 2019), 10–22. Google Scholar
Cross Ref
- [12] . 2008. Efficient remote data possession checking in critical information infrastructures. IEEE Trans. Knowl. Data 20, 8 (August 2008), 1034–1038. Google Scholar
Digital Library
- [13] . 2007. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). Association for Computing Machinery, New York, NY, USA, 584–597. Google Scholar
Digital Library
- [14] . 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07). Association for Computing Machinery, New York, NY, USA, 598–609. Google Scholar
Digital Library
- [15] . 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans. Parallel Distrib. Syst. 22, 5 (May 2011), 847–859. Google Scholar
Digital Library
- [16] . 2015. Dynamic provable data possession. ACM Trans. Inf. Syst. Secur. 17, 4,
Article 15 (April 2015), 1–29. Google ScholarDigital Library
- [17] . 2013. Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6, 2 (April 2013), 227–238. Google Scholar
Digital Library
- [18] . 2017. Dynamic-Hash-Table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10, 5 (September 2017), 701–714. Google Scholar
Cross Ref
- [19] . 2017. An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans. Inf. Forensic Secur. 12, 10 (October 2017), 2402–2415. Google Scholar
Digital Library
- [20] . 2015. Provable multicopy dynamic data possession in cloud computing systems. IEEE Trans. Inf. Forensic Secur. 10, 3 (March 2015), 485–497. Google Scholar
Digital Library
- [21] . 2015. MuR-DPA: Top-down levelled multi-replica Merkle hash tree based secure public auditing for dynamic big data storage on cloud. IEEE Trans. Comput. 64, 9 (September 2015), 2609–2622. Google Scholar
Digital Library
- [22] . 2015. Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Trans. Serv. Comput. 8, 1 ( January 2015), 92–106. Google Scholar
Cross Ref
- [23] . 2019. Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, ( January 2019), 107–125. Google Scholar
Cross Ref
- [24] . 2013. Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62, 2 (February 2013), 362–375. Google Scholar
Digital Library
- [25] . 2013. Certificateless public auditing for data integrity in the cloud. In Proceedings of the 2013 IEEE Conference on Communications and Network Security (CNS), IEEE, National Harbor, MD, USA, 136–144. Google Scholar
Cross Ref
- [26] . 1985. Identity-based cryptosystems and signature schemes. In Proceedings of the Advances in Cryptology, George Robert Blakley and David Chaum (eds.). Springer Berlin, Berlin, 47–53. Google Scholar
Cross Ref
- [27] . 2018. Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12, 1 (March 2018), 64–73. Google Scholar
Cross Ref
- [28] . 2016. Efficient ID-based public auditing for the outsourced data in cloud storage. Inf. Sci. 343–344, (May 2016), 1–14. Google Scholar
Digital Library
- [29] . 2019. Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems. Pervasive Mob. Comput. 56, (May 2019), 18–28. Google Scholar
Digital Library
- [30] . 2017. Identity-based data outsourcing with comprehensive auditing in clouds. IEEE Trans.Inform.Forensic Secur. 12, 4 (April 2017), 940–952. Google Scholar
Cross Ref
- [31] . 2014. Cloud partner selection algorithm for dynamic cloud collaboration. IEEE, 1–5. Google Scholar
Cross Ref
- [32] 2020 Siemens Industry Software Inc. The introduction of the Cloud Partner. Retrieved June 12, 2020 from https://www.plm.automation.siemens.com/global/en/our-story/partners/cloud-partner.html.Google Scholar
- [33] . 2016. Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, (March 2016), 130–139. Google Scholar
Digital Library
- [34] . 2014. Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2, 1 ( January 2014), 43–56. Google Scholar
Cross Ref
Index Terms
Identity-Based Public Auditing for Cloud Storage of Internet-of-Vehicles Data
Recommendations
Efficient Identity-Based Public Auditing Scheme for Cloud Storage from Lattice Assumption
CSE '14: Proceedings of the 2014 IEEE 17th International Conference on Computational Science and EngineeringIn this paper, we propose a post-quantum secure cloud storage system supporting privacy-preserving public auditing scheme from lattice assumption. In our public auditing scheme, we introduce a third party auditor (TPA), which can efficiently audit the ...
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability
Identity privacy and traceability are very important for shared cloud data auditing.Design the framework for this problem.Construct the first scheme satisfying the designed framework.Prove the proposed scheme to be secure and justify its performance. ...
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage
The public cloud storage auditing with deduplication has been studied to assure the data integrity and improve the storage efficiency for cloud storage in recent years. The cloud, however, has to store the link between the file and its data owners to ...






Comments