期刊
SENSORS
卷 23, 期 9, 页码 -出版社
MDPI
DOI: 10.3390/s23094307
关键词
cloud storage; data integrity; public auditing; SM2
With the development of cloud storage and cloud computing technology, scholars have proposed cloud data integrity verification schemes to protect users' data security. The storage environment of the Internet of Things requires higher functionality of data integrity verification schemes, especially in the context of big data and medical big data. We have designed an SM2-based offline/online efficient data integrity verification scheme that uses the SM4 block cryptography algorithm to protect data privacy and a dynamic hash table for data updating. The scheme has been proven to be safe and efficient in security proof and efficiency analysis, suitable for various application scenarios.
With the rapid development of cloud storage and cloud computing technology, users tend to store data in the cloud for more convenient services. In order to ensure the integrity of cloud data, scholars have proposed cloud data integrity verification schemes to protect users' data security. The storage environment of the Internet of Things, in terms of big data and medical big data, demonstrates a stronger demand for data integrity verification schemes, but at the same time, the comprehensive function of data integrity verification schemes is required to be higher. Existing data integrity verification schemes are mostly applied in the cloud storage environment but cannot successfully be applied to the environment of the Internet of Things in the context of big data storage and medical big data storage. To solve this problem when combined with the characteristics and requirements of Internet of Things data storage and medical data storage, we designed an SM2-based offline/online efficient data integrity verification scheme. The resulting scheme uses the SM4 block cryptography algorithm to protect the privacy of the data content and uses a dynamic hash table to realize the dynamic updating of data. Based on the SM2 signature algorithm, the scheme can also realize offline tag generation and batch audits, reducing the computational burden of users. In security proof and efficiency analysis, the scheme has proven to be safe and efficient and can be used in a variety of application scenarios.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据