Integrity Audit Based on Dynamic Chameleon Authentication Tree in Edge Environments

DUAN Jing, DUAN Jie, WAN Xuefeng, LIU Haitao

PDF(1322 KB)
PDF(1322 KB)
Journal of Shanxi University(Natural Science Edition) ›› 2025, Vol. 48 ›› Issue (3) : 505-515. DOI: 10.13451/j.sxu.ns.2024007
Information Sciences

Integrity Audit Based on Dynamic Chameleon Authentication Tree in Edge Environments

Author information +
History +

Abstract

Edge computing structures are more complex than traditional cloud computing, so data integrity issues become even more important. In order to solve the problems of poor privacy protection ability, high computing and storage overhead, high system complexity, and lack of support for dynamic operation in the current integrity audit schemes, this paper proposes an integrity audit scheme based on dynamic chameleon authentication tree. In the data encryption stage, the scheme introduces a certificateless public key cryptography system to generate a data encryption and decoding key at the user end to ensure the integrity and confidentiality of the data in the process of system transmission; in the data upload stage, the dynamic chameleon authentication tree storage structure is adopted to ensure the full dynamic operation of the data access process and reduce the communication computing overhead; and the computing power of the edge node is used to carry out integrity audit, which avoids the problem of single point failure caused by the third-party audit agency. Under the stochastic oracle model, the confidentiality of the scheme is proved based on the computational DH difficulty problem and the discrete logarithmic difficulty problem. The experiments show that compared with other integrity audit schemes, the proposed scheme has better computing efficiency and can save about 50% of computing and storage overhead.

Key words

data integrity / chameleon hash function / certificateless public key cryptography / merkle tree / dynamic auditing

Cite this article

Download Citations
DUAN Jing , DUAN Jie , WAN Xuefeng , et al. Integrity Audit Based on Dynamic Chameleon Authentication Tree in Edge Environments. Journal of Shanxi University(Natural Science Edition). 2025, 48(3): 505-515 https://doi.org/10.13451/j.sxu.ns.2024007

References

1
彭小圣, 邓迪元, 程时杰, 等. 面向智能电网应用的电力大数据关键技术[J]. 中国电机工程学报, 2015, 35(3): 503-511. DOI: 10.13334/j.0258-8013.pcsee.2015.03.001 .
PENG X S, DENG D Y, CHENG S J, et al. Key Technologies of Electric Power Big Data and Its Application Prospects in Smart Grid[J]. Proc CSEE, 2015, 35(3): 503-511. DOI: 10.13334/j.0258-8013.pcsee.2015.03.001 .
2
陈冬,周潭平,宋子超 等.智能电网中隐私保护的数据聚合研究综述[J].密码学报,2023, 10(6): 1–13. DOI:10.13868/j.cnki.jcr.000653 .
CHEN D, ZHOU T P, SONG Z C, et al. A Review of Data Aggregation on Privacy Protection in Smart Grid[J].J Cryptol Res, 2023, 10(6): 1–13. DOI:10.13868/j.cnki.jcr.000653 .
3
李千叶, 郎帅. 基于物联网技术的智能电网数据安全问题分析[J]. 模具制造, 2023, 23(11): 193-195. DOI: 10.12147/j.cnki.1671-3508.2023.11.061 .
LI Q Y, LANG S. Analysis of Data Security Issues in Smart Grid Based on IoT Technology[J]. Die Mould Manuf, 2023, 23(11): 193-195. DOI: 10.12147/j.cnki.1671-3508.2023.11.061 .
4
程钎, 陈羽, 孙伶雁. 考虑服务配置的细粒度电力任务云边协同优化调度策略[J]. 电力系统保护与控制, 2023, 51(7): 53-62. DOI: 10.19783/j.cnki.pspc.221116 .
CHENG Q, CHEN Y, SUN L Y. Cloud-edge Collaborative Optimization Scheduling Strategy for Fine-grained Power Tasks Considering Service Configuration[J]. Power Syst Prot Contr, 2023, 51(7): 53-62. DOI: 10.19783/j.cnki.pspc.221116 .
5
张佳乐, 赵彦超, 陈兵, 等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018, 39(3): 1-21. DOI: 10.11959/j.issn.1000-436x.2018037 .
ZHANG J L /Y), ZHAO Y C, CHEN B, et al. Survey on Data Security and Privacy-preserving for the Research of Edge Computing[J]. J Commun, 2018, 39(3): 1-21. DOI: 10.11959/j.issn.1000-436x.2018037 .
6
王惠莅. 面向云计算环境的数据安全技术研究[D]. 西安: 西安电子科技大学, 2022.
WANG H L. Research on Data Security Technology for Cloud Computing Environment[D].Xi'an: Xidian University, 2022.
7
张振超, 刘亚丽, 殷新春, 等. 无证书签名方案的分析及改进[J]. 密码学报, 2020, 7(3): 389-403. DOI: 10.13868/j.cnki.jcr.000375 .
ZHANG Z C, LIU Y L, YIN X C, et al. Analysis and Improvement of Certificateless Signature Schemes[J]. J Cryptologic Res, 2020, 7(3): 389-403. DOI: 10.13868/j.cnki.jcr.000375 .
8
ATENIESE G, BURNS R, CURTMOLA R, et al. Provable Data Possession at Untrusted Stores[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. Alexandria, Virginia, USA: ACM, 2007: 598-609. DOI: 10.1145/1315245.1315318 .
9
JUELS A, KALISKI B S. Pors: Proofs of Retrievability for Large Files[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. Alexandria, Virginia, USA: ACM, 2007. 584-597. DOI: 10.1145/1315245.1315317 .
10
SHACHAM H, WATERS B. Compact Proofs of Retrievability[C]//Proceedings of the Advances in Cryptology-ASIACRYPT 2008. Berlin, Heidelberg: Springer-Verlag, 2008. 90-107. DOI: 10.1007/978-3-540-89255-7_7 .
11
李秀艳, 刘明曦, 史闻博, 等. 基于云存储的动态组共享数据完整性验证方案[J]. 计算机工程与设计, 2022, 43(6): 1510-1519. DOI: 10.16208/j.issn1000-7024.2022.06.002 .
LI X Y, LIU M X, SHI W B, et al. Dynamic Group Shared Data Integrity Verification Scheme Based on Cloud Storage[J]. Comput Eng Des, 2022, 43(6): 1510-1519. DOI: 10.16208/j.issn1000-7024.2022.06.002 .
12
刘峰, 赵俊峰. 基于区块链的云存储数据完整性验证方案[J]. 应用科学学报, 2021, 39(1): 164-173. DOI: 10.3969/j.issn.0255-8297.2021.01.014 .
LIU F, ZHAO J F. Cloud Storage Data Integrity Verification Scheme Based on Blockchain[J]. J Appl Sci, 2021, 39(1): 164-173. DOI: 10.3969/j.issn.0255-8297.2021.01.014 .
13
雷莹. 云存储系统数据完整性安全审计的研究[D]. 北京: 北京交通大学, 2019.
LEI Y. Research on Data Integrity Security Audit of Cloud Storage System[D]. Beijing: Beijing Jiaotong University, 2019.
14
LI J T, ZHANG L, LIU J K, et al. Privacy-preserving Public Auditing Protocol for Low-performance End Devices in Cloud[J]. IEEE Trans Inf Forensics Secur, 2016, 11(11): 2572-2583. DOI: 10.1109/TIFS.2016.2587242 .
15
LIN C, SHEN Z D, CHEN Q, et al. A Data Integrity Verification Scheme in Mobile Cloud Computing[J]. J Netw Comput Appl, 2017, 77(C): 146-151. DOI: 10.1016/j.jnca.2016.08.017 .
16
ZHOU J, JIN Y, HE H, et al. Dynamic Audit Model of Cloud Data Based on Nested Merkle Hash Tree Blockchain[J].J Netw Comput Appl, 2019, 39(12): 3575-3583.
17
李桐, 任帅, 王刚, 等. 基于变色龙认证树的云边端协同流式数据完整性验证模型[J]. 信息网络安全, 2022(1): 37-45. DOI: 10.3969/j.issn.1671-1122.2022.01.005 .
LI T, REN S, WANG G, et al. Cloud-edge-device Collaborative Integrity Verification Scheme Based on Chameleon Authentication Tree for Streaming Data[J]. Netinfo Secur, 2022, 22(1): 37-45. DOI: 10.3969/j.issn.1671-1122.2022.01.005 .
18
张丽娟. 基于区块链技术的智能电网安全聚合方案[J]. 数字技术与应用, 2023, 41(10): 229-231. DOI: 10.19695/j.cnki.cn12-1369.2023.10.72 .
ZHANG L J. Smart Grid Security Aggregation Scheme Based on Blockchain Technology[J]. Digit Technol Appl, 2023, 41(10): 229-231. DOI: 10.19695/j.cnki.cn12-1369.2023.10.72 .
19
韦涛, 周治平. 基于区块链的用能数据完整性保护框架[J]. 电力自动化设备, 2021, 41(12): 102-107. DOI: 10.16081/j.epae.202108010 .
WEI T, ZHOU Z P. Integrity Protection Framework for Energy Consumption Data Based on Blockchain[J]. Electr Power Autom Equip, 2021, 41(12): 102-107. DOI: 10.16081/j.epae.202108010 .
20
李丽娟. 变色龙哈希函数设计及应用研究[D]. 郑州: 河南工业大学, 2014.
LI L J. Chameleon Hash Function Design and Application Research[D]. Zhengzhou: Henan University of Technology, 2014.
21
黄雪刚, 高天寒, 李宇溪. 面向流式数据认证的变色龙认证树算法研究[J]. 四川大学学报(工程科学版), 2016, 48(2): 139-144. DOI: 10.15961/j.jsuese.2016.02.020 .
HUANG X G, GAO T H, LI Y X. Research on Chameleon Certification Tree Algorithm for Streaming Data Authentication[J]. J Sichuan Univ Eng Sci Ed, 2016, 48(2): 139-144. DOI: 10.15961/j.jsuese.2016.02.020 .
22
陈科. 基于动态变色龙认证树的流式数据完整性验证研究与应用[D]. 沈阳: 东北大学, 2014.
CHEN K. Research and Application of Streaming Data Integrity Verification Based on Dynamic Chameleon Authentication Tree[D].Shenyang: Northeastern University, 2014.
23
周彦伟, 杨波, 张文政. 不使用双线性映射的无证书签密方案的安全性分析及改进[J]. 计算机学报, 2016, 39(6): 1257-1266. DOI: 10.11897/SP.J.1016.2016.01257 .
ZHOU Y W, YANG B, ZHANG W Z. Security Analysis and Improvement of Certificateless Signcryption Scheme without Bilinear Pairing[J]. Chin J Comput, 2016, 39(6): 1257-1266. DOI: 10.11897/SP.J.1016.2016.01257 .
24
PRINCE G, DU R Z. Data Integrity Audit Scheme Based on Certificateless Public Key Cryptography in Edge Environment[J]. J Commun, 2022, 43(7): 62-72.

Comments

PDF(1322 KB)

Accesses

Citation

Detail

Sections
Recommended

/