4.6 Article

SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios

期刊

SENSORS
卷 23, 期 9, 页码 -

出版社

MDPI
DOI: 10.3390/s23094307

关键词

cloud storage; data integrity; public auditing; SM2

向作者/读者索取更多资源

With the development of cloud storage and cloud computing technology, scholars have proposed cloud data integrity verification schemes to protect users' data security. The storage environment of the Internet of Things requires higher functionality of data integrity verification schemes, especially in the context of big data and medical big data. We have designed an SM2-based offline/online efficient data integrity verification scheme that uses the SM4 block cryptography algorithm to protect data privacy and a dynamic hash table for data updating. The scheme has been proven to be safe and efficient in security proof and efficiency analysis, suitable for various application scenarios.
With the rapid development of cloud storage and cloud computing technology, users tend to store data in the cloud for more convenient services. In order to ensure the integrity of cloud data, scholars have proposed cloud data integrity verification schemes to protect users' data security. The storage environment of the Internet of Things, in terms of big data and medical big data, demonstrates a stronger demand for data integrity verification schemes, but at the same time, the comprehensive function of data integrity verification schemes is required to be higher. Existing data integrity verification schemes are mostly applied in the cloud storage environment but cannot successfully be applied to the environment of the Internet of Things in the context of big data storage and medical big data storage. To solve this problem when combined with the characteristics and requirements of Internet of Things data storage and medical data storage, we designed an SM2-based offline/online efficient data integrity verification scheme. The resulting scheme uses the SM4 block cryptography algorithm to protect the privacy of the data content and uses a dynamic hash table to realize the dynamic updating of data. Based on the SM2 signature algorithm, the scheme can also realize offline tag generation and batch audits, reducing the computational burden of users. In security proof and efficiency analysis, the scheme has proven to be safe and efficient and can be used in a variety of application scenarios.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据