Loading…
Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment
Cognitive computing over big data brings more development opportunities for enterprises and organizations in industrial informatics, and can make better decisions for them when they face data security challenges. To satisfy the requirement of real-time data storage in industrial Internet of Things (...
Saved in:
Published in: | IEEE transactions on industrial informatics 2021-06, Vol.17 (6), p.4238-4247 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Cognitive computing over big data brings more development opportunities for enterprises and organizations in industrial informatics, and can make better decisions for them when they face data security challenges. To satisfy the requirement of real-time data storage in industrial Internet of Things (IoT), the remote unconstrained storage cloud is usually used to store the generated big data. However, the characteristic of semitrust of the cloud service provider determines that the data owners will worry about whether the data stored in cloud computing has been corrupted. In this article, a secure storage auditing is proposed, which supports efficient key updates and can be well used in cognitive industrial IoT environment. Moreover, the proposed basic auditing can be extended to support batch auditing that is suitable for multiple end devices to audit their data blocks simultaneously in practice. In addition, a hybrid data dynamics method is proposed, which employs a hash table to store the data blocks and uses a linked list to locate the operated data block. Compared with previous methods, the data block location time in the proposed data dynamics can be reduced by 40%. The security analysis results demonstrate that the proposed scheme can be proved to be correct, and is secure under computational differ-hellman (CDH) and discrete logarithm (DL) assumptions. |
---|---|
ISSN: | 1551-3203 1941-0050 |
DOI: | 10.1109/TII.2020.2991204 |