删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

本站小编 Free考研/2020-04-17

文献详情
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
文献类型:期刊
通讯作者:Qin, B (reprint author), Renmin Univ China, Sch Informat, Beijing 100872, Peoples R China.
期刊名称:KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS影响因子和分区
年:2020
卷:14
期:1
页码:281-298
ISSN:1976-7277
关键词:Data outsourcing; Computation verifiability; IoT Security; Fog Computing
所属部门:信息学院
摘要:Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the comp ...More
Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable. ...Hide

DOI:10.3837/tiis.2020.01.016
百度学术:Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
语言:外文
基金:National Key R&D Program of China [2017YFB1400700]; Natural Science Foundation of ChinaNational Natural Science Foundation of China [61772538, 91646203, 61672083]; foundation of Science and Technology on Information Assurance Laboratory [61421120305162112006]; National Cryptography Development Fund [MMJJ20170106]
作者其他论文



Efficient subtree-based encryption for fuzzy-entity data sharing.Liu, Weiran, Liu, Jianwei, Wu, Qianhong, et al. .SOFT COMPUTING. 2018, 22(23,SI), 7961-7976.
Securing messaging services through efficient signcryption with designated equality test.Wang, Yujue, Pang, HweeHwa, Deng, Robert H., et al. .INFORMATION SCIENCES. 2019, 490, 146-165.
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.Wang, Yujue, Ding, Yong, Wu, Qianhong, et al. .IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. 2019, 14(7), 1779-1790.
A secure versatile light payment system based on blockchain.Zhong, Lin, Wu, Qianhong, Xie, Jan, et al. .FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE. 2019, 93, 327-337.
Privacy Protection Method Based on Access Control.Qiao, Xin, Wang, Lixiaoyang, Qin, Bo, et al. .2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC). 2018, 254-259.

相关话题/文献 学术