An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios

11Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. This article proposes an efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios, which can better meet performance and security requirements. The proposed scheme realizes data sharing under the condition of protecting privacy by encrypting sensitive information. Using the private key separation method, the private key is divided into two parts using identity information generation and random selection which are, respectively, held by the user and the fog center. Then, using the two-time signature method, the Internet of things and fog computing center use two parts of the private key to generate the original signature and final signature in two separate times. Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. Security analysis and performance evaluation show that the proposed scheme is safe and efficient.

Cite

CITATION STYLE

APA

Tian, J. F., & Wang, H. N. (2020). An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios. International Journal of Distributed Sensor Networks, 16(5). https://doi.org/10.1177/1550147720916623

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free