PDF(1322 KB)
Integrity Audit Based on Dynamic Chameleon Authentication Tree in Edge Environments
DUAN Jing, DUAN Jie, WAN Xuefeng, LIU Haitao
PDF(1322 KB)
PDF(1322 KB)
Integrity Audit Based on Dynamic Chameleon Authentication Tree in Edge Environments
Edge computing structures are more complex than traditional cloud computing, so data integrity issues become even more important. In order to solve the problems of poor privacy protection ability, high computing and storage overhead, high system complexity, and lack of support for dynamic operation in the current integrity audit schemes, this paper proposes an integrity audit scheme based on dynamic chameleon authentication tree. In the data encryption stage, the scheme introduces a certificateless public key cryptography system to generate a data encryption and decoding key at the user end to ensure the integrity and confidentiality of the data in the process of system transmission; in the data upload stage, the dynamic chameleon authentication tree storage structure is adopted to ensure the full dynamic operation of the data access process and reduce the communication computing overhead; and the computing power of the edge node is used to carry out integrity audit, which avoids the problem of single point failure caused by the third-party audit agency. Under the stochastic oracle model, the confidentiality of the scheme is proved based on the computational DH difficulty problem and the discrete logarithmic difficulty problem. The experiments show that compared with other integrity audit schemes, the proposed scheme has better computing efficiency and can save about 50% of computing and storage overhead.
data integrity / chameleon hash function / certificateless public key cryptography / merkle tree / dynamic auditing
| 1 |
彭小圣, 邓迪元, 程时杰, 等. 面向智能电网应用的电力大数据关键技术[J]. 中国电机工程学报, 2015, 35(3): 503-511. DOI: 10.13334/j.0258-8013.pcsee.2015.03.001 .
|
| 2 |
|
| 3 |
李千叶, 郎帅. 基于物联网技术的智能电网数据安全问题分析[J]. 模具制造, 2023, 23(11): 193-195. DOI: 10.12147/j.cnki.1671-3508.2023.11.061 .
|
| 4 |
程钎, 陈羽, 孙伶雁. 考虑服务配置的细粒度电力任务云边协同优化调度策略[J]. 电力系统保护与控制, 2023, 51(7): 53-62. DOI: 10.19783/j.cnki.pspc.221116 .
|
| 5 |
张佳乐, 赵彦超, 陈兵, 等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018, 39(3): 1-21. DOI: 10.11959/j.issn.1000-436x.2018037 .
|
| 6 |
王惠莅. 面向云计算环境的数据安全技术研究[D]. 西安: 西安电子科技大学, 2022.
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
李秀艳, 刘明曦, 史闻博, 等. 基于云存储的动态组共享数据完整性验证方案[J]. 计算机工程与设计, 2022, 43(6): 1510-1519. DOI: 10.16208/j.issn1000-7024.2022.06.002 .
|
| 12 |
刘峰, 赵俊峰. 基于区块链的云存储数据完整性验证方案[J]. 应用科学学报, 2021, 39(1): 164-173. DOI: 10.3969/j.issn.0255-8297.2021.01.014 .
|
| 13 |
雷莹. 云存储系统数据完整性安全审计的研究[D]. 北京: 北京交通大学, 2019.
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
李桐, 任帅, 王刚, 等. 基于变色龙认证树的云边端协同流式数据完整性验证模型[J]. 信息网络安全, 2022(1): 37-45. DOI: 10.3969/j.issn.1671-1122.2022.01.005 .
|
| 18 |
张丽娟. 基于区块链技术的智能电网安全聚合方案[J]. 数字技术与应用, 2023, 41(10): 229-231. DOI: 10.19695/j.cnki.cn12-1369.2023.10.72 .
|
| 19 |
|
| 20 |
李丽娟. 变色龙哈希函数设计及应用研究[D]. 郑州: 河南工业大学, 2014.
|
| 21 |
黄雪刚, 高天寒, 李宇溪. 面向流式数据认证的变色龙认证树算法研究[J]. 四川大学学报(工程科学版), 2016, 48(2): 139-144. DOI: 10.15961/j.jsuese.2016.02.020 .
|
| 22 |
陈科. 基于动态变色龙认证树的流式数据完整性验证研究与应用[D]. 沈阳: 东北大学, 2014.
|
| 23 |
周彦伟, 杨波, 张文政. 不使用双线性映射的无证书签密方案的安全性分析及改进[J]. 计算机学报, 2016, 39(6): 1257-1266. DOI: 10.11897/SP.J.1016.2016.01257 .
|
| 24 |
|
/
| 〈 |
|
〉 |