A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks

FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern. To avoid incorrect decision-making due to corrupt data, a...

Full description

Bibliographic Details
Main Authors: Burra, M.S (Author), Maity, S. (Author)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2023
Subjects:
Fog
Online Access:View Fulltext in Publisher
View in Scopus
LEADER 02951nam a2200445Ia 4500
001 10.1109-ACCESS.2023.3271605
008 230529s2023 CNT 000 0 und d
020 |a 21693536 (ISSN) 
245 1 0 |a A Distributed and Decentralized Certificateless Framework for Reliable Shared Data Auditing for FOG-CPS Networks 
260 0 |b Institute of Electrical and Electronics Engineers Inc.  |c 2023 
300 |a 1 
856 |z View Fulltext in Publisher  |u https://doi.org/10.1109/ACCESS.2023.3271605 
856 |z View in Scopus  |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85159692438&doi=10.1109%2fACCESS.2023.3271605&partnerID=40&md5=dbf82dbb66152d2469bd5b3c70188588 
520 3 |a FOG computing enhances communication efficiency by processing data at the network’s edge. In many critical infrastructure (CI) networks, user entities outsource data to the FOG server, but the reliability of the data is a concern. To avoid incorrect decision-making due to corrupt data, a data auditing process is mandatory. Further, a group of user entities in a CI network generate data onto a common file and outsource the file to the FOG server. Auditing such shared group data creates additional complexities. Existing shared group data auditing schemes using public key infrastructure (PKI) or identity-based cryptography (IBC) face challenges such as certificate management or key escrow problems respectively. While, certificateless cryptography (CLC) offers better security and efficiency, but many CLC-based shared group data auditing schemes lack protection against key generation center compromise. The key generation process in many of the existing shared group data auditing schemes is centralized and does not support flexible user entity admission. This paper proposes a distributed and decentralized cryptography approach to enhance the security of key generation for group members. The scheme offers flexible user admission, allowing for full or semi-membership. The proposed scheme provides efficient and secure shared group data auditing against public key replacement, metadata forgery, and integrity attacks, as shown by performance evaluation and security analysis. Author 
650 0 4 |a Certificateless 
650 0 4 |a Cloud computing 
650 0 4 |a Cloud-computing 
650 0 4 |a data auditing 
650 0 4 |a Data auditing 
650 0 4 |a Decentralised 
650 0 4 |a Decision making 
650 0 4 |a Edge computing 
650 0 4 |a Efficiency 
650 0 4 |a Fog 
650 0 4 |a Fog computing 
650 0 4 |a Forgery 
650 0 4 |a Metadata 
650 0 4 |a Network security 
650 0 4 |a provable data possession 
650 0 4 |a Provable data possessions 
650 0 4 |a Public key 
650 0 4 |a Public key cryptography 
650 0 4 |a Public keys 
650 0 4 |a Security 
650 0 4 |a Servers 
650 0 4 |a shared data 
650 0 4 |a Shared data 
700 1 0 |a Burra, M.S.  |e author 
700 1 0 |a Maity, S.  |e author 
773 |t IEEE Access