通信学报 ›› 2022, Vol. 43 ›› Issue (7): 62-72.doi: 10.11959/j.issn.1000-436x.2022130

• 学术论文 • 上一篇    下一篇

边缘环境下基于无证书公钥密码的数据完整性审计方案

王子园1,2, 杜瑞忠2,3   

  1. 1 河北大学管理学院,河北 保定 071002
    2 河北省高可信信息系统重点实验室,河北 保定 071002
    3 河北大学网络空间安全与计算机学院,河北 保定 071002
  • 修回日期:2022-06-02 出版日期:2022-07-25 发布日期:2022-06-01
  • 作者简介:王子园(1996- ),男,河北保定人,河北大学博士生,主要研究方向为信息安全、数据完整性审计
    杜瑞忠(1975- ),男,河北献县人,博士,河北大学教授、博士生导师,主要研究方向为可信计算、信息安全等
  • 基金资助:
    国家自然科学基金资助项目(61572170);河北省自然科学基金重点资助项目(F2019201290)

Certificateless public key cryptography based provable data possession scheme in edge environment

Ziyuan WANG1,2, Ruizhong DU2,3   

  1. 1 School of Management, Hebei University, Baoding 071002, China
    2 Key Lab on High Trusted Information System in Hebei Province, Baoding 071002, China
    3 School of Cyber Security and Computer, Hebei University, Baoding 071002, China
  • Revised:2022-06-02 Online:2022-07-25 Published:2022-06-01
  • Supported by:
    The National Natural Science Foundation of China(61572170);Key Project of Natural Science Foundation of Hebei Province(F2019201290)

摘要:

边缘环境下,当数据传输到云端时需途经边缘节点这一新的实体,这使数据安全问题变得更加复杂,数据的机密性和完整性很难得到保证,传统的数据完整性审计方案不适用于设备繁多的边缘环境。基于此,提出了一种边缘环境下基于无证书公钥密码的数据完整性审计方案,结合在线/离线签名思想,在边缘节点半可信的情况下,用户设备只需在上传数据时进行轻量级的计算,其余计算量交由离线阶段执行。该方案利用边缘节点进行审计工作,同时支持不同存储状态下的审计和隐私保护等特性。安全性分析表明,所提方案在随机预言模型下能有效应对三类敌手攻击,证明该方案是安全的。与其他方案进行实验对比,结果显示所提方案时间开销最低。

关键词: 边缘计算, 数据完整性审计, 在线/离线签名, 无证书公钥密码

Abstract:

In the edge environment, data transmission to the cloud needs to pass through a new entity, the edge node, which makes the data security problem more complicated, the confidentiality and integrity of data are difficult to be guaranteed, and the traditional provable data possession scheme is not suitable for the edge environment with a large number of devices.Based on this, a certificateless public key cryptography based provable data possession scheme was proposed for the edge environment, combining the online/offline signature idea, where the user device only needed to perform light computation when uploading data in the case of semi-trusted edge nodes, leaving the rest of the computation to be performed in the offline phase.The scheme used edge nodes for auditing work while supporting auditing in different storage states, as well as privacy protection and other features.The security analysis shows that the proposed scheme is proven to be secure by being able to effectively combat three types of adversary attacks under a stochastic prediction model.Experimental comparisons with other schemes show that the proposed scheme has lowest time overhead.

Key words: edge computing, provable data possession, online/offline signature, certificateless public key cryptography

中图分类号: 

No Suggested Reading articles found!