A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks
FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern. To avoid incorrect decision-making due to corrupt data, a...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
LEADER | 02951nam a2200445Ia 4500 | ||
---|---|---|---|
001 | 10.1109-ACCESS.2023.3271605 | ||
008 | 230529s2023 CNT 000 0 und d | ||
020 | |a 21693536 (ISSN) | ||
245 | 1 | 0 | |a A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks |
260 | 0 | |b Institute of Electrical and Electronics Engineers Inc. |c 2023 | |
300 | |a 1 | ||
856 | |z View Fulltext in Publisher |u https://doi.org/10.1109/ACCESS.2023.3271605 | ||
856 | |z View in Scopus |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85159692438&doi=10.1109%2fACCESS.2023.3271605&partnerID=40&md5=dbf82dbb66152d2469bd5b3c70188588 | ||
520 | 3 | |a FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern. To avoid incorrect decision-making due to corrupt data, a data auditing process is mandatory. Further, a group of user entities in a CI network generate data onto a common file and outsource the file to the FOG server. Auditing such shared group data creates additional complexities. Existing shared group data auditing schemes using public key infrastructure (PKI) or identity-based cryptography (IBC) face challenges such as certificate management or key escrow problems respectively. While, certificateless cryptography (CLC) offers better security and efficiency, but many CLC-based shared group data auditing schemes lack protection against key generation center compromise. The key generation process in many of the existing shared group data auditing schemes is centralized and does not support flexible user entity admission. This paper proposes a distributed and decentralized cryptography approach to enhance the security of key generation for group members. The scheme offers flexible user admission, allowing for full or semi-membership. The proposed scheme provides efficient and secure shared group data auditing against public key replacement, metadata forgery, and integrity attacks, as shown by performance evaluation and security analysis. Author | |
650 | 0 | 4 | |a Certificateless |
650 | 0 | 4 | |a Cloud computing |
650 | 0 | 4 | |a Cloud-computing |
650 | 0 | 4 | |a data auditing |
650 | 0 | 4 | |a Data auditing |
650 | 0 | 4 | |a Decentralised |
650 | 0 | 4 | |a Decision making |
650 | 0 | 4 | |a Edge computing |
650 | 0 | 4 | |a Efficiency |
650 | 0 | 4 | |a Fog |
650 | 0 | 4 | |a Fog computing |
650 | 0 | 4 | |a Forgery |
650 | 0 | 4 | |a Metadata |
650 | 0 | 4 | |a Network security |
650 | 0 | 4 | |a provable data possession |
650 | 0 | 4 | |a Provable data possessions |
650 | 0 | 4 | |a Public key |
650 | 0 | 4 | |a Public key cryptography |
650 | 0 | 4 | |a Public keys |
650 | 0 | 4 | |a Security |
650 | 0 | 4 | |a Servers |
650 | 0 | 4 | |a shared data |
650 | 0 | 4 | |a Shared data |
700 | 1 | 0 | |a Burra, M.S. |e author |
700 | 1 | 0 | |a Maity, S. |e author |
773 | |t IEEE Access |