4.7 Article

An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2022.3179991

Keywords

Cloud computing; Security; Transportation; Data integrity; Public key; Servers; Computational modeling; Maritime transportation systems; cloud storage; identity-based integrity auditing; dynamic operations; batch auditing

Ask authors/readers for more resources

With the development of IoT-enabled MTS, there is a need for reliable and timely analysis of the massive data generated. Cloud-based MTS allows users to upload data without worrying about price, capacity, or location, but also introduces security issues, especially concerning the integrity protection of outsourced data. To address this problem, an identity-based dynamic data integrity auditing scheme is proposed, which reduces the burden of key management, improves auditing efficiency through batch auditing, and supports dynamic operations on the outsourced data. Security analysis shows that the scheme ensures storage correctness and resists common attacks, while performance comparison results demonstrate its low computational cost and reduced communication overhead in the auditing phase.
With the development of Internet of Things (IoT)-enabled Maritime Transportation Systems (MTS), massive data generated in the system not only requires to be stored reliably and cheaply, but also needs to be analyzed timely. The Cloud-based Maritime Transportation Systems (CMTS) allow users to upload the data without worrying about the price, capacity, location and so on. However, CMTS also brings some security issues, where the integrity protection of outsourced data is one of the most important issues since it is crucial for the safety, reliability and efficiency of sea lanes. To solve this problem, we propose an identity-based dynamic data integrity auditing scheme for CMTS. Our scheme decreases the burden of key management and improves the auditing efficiency by batch auditing. Besides, our scheme also supports dynamic operations on the outsourced data for CMTS. The security analysis shows that our scheme can ensure the feature of storage correctness and resist common attacks. In addition, the performance comparison results with other related schemes show that our scheme not only has the lowest computational cost on all entities, but also greatly reduces the communication overhead of the auditing phase. Therefore, our scheme is very suitable for data integrity verification in CMTS.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available