4.7 Article

Flexible Data Integrity Checking With Original Data Recovery in IoT-Enabled Maritime Transportation Systems

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2021.3125070

关键词

Cloud computing; Data integrity; Security; Memory; Internet of Things; Trajectory; Real-time systems; Internet of Things; maritime transportation systems; integrity checking; data recovery

向作者/读者索取更多资源

Internet of things (IoT) can be used in maritime transportation systems (MTS) to improve efficiency, prevent vessel collision, and reduce losses. However, traditional big data analysis methods cannot effectively process maritime traffic data, so data integrity checking is necessary. This paper proposes a flexible data integrity checking scheme with original data recovery in IoT-enabled MTS, which is proven to be secure and more efficient than previous schemes.
Internet of things (IoT) has emerged as a promising technology that can be widely used in various industries to realize real-time information collection, so as to improve production efficiency and reduce running costs. By combining the technology of IoT, maritime transportation systems (MTS) can prevent vessels collision, improve the efficiency of maritime transportation and reduce the loss of revenue for ports and shipbuilders. The large amount of real-time data generated in IoT-enabled MTS can be efficiently utilized to predict the future trajectories and hotspots of vessels on the sea combined with historical data. However, the maritime traffic data in MTS cannot be effectively processed in traditional big data analysis methods, and the integrity of it needs to be checked before being used to achieve the prediction of trajectories and high-density areas of vessels. In this paper, we propose a flexible data integrity checking scheme with original data recovery in IoT-enabled MTS. In the proposed scheme, the data blocks of vessels are encoded based on the technology of erasure coding. To ensure the availability of the historical data, the existence and the integrity of the data elements stored in the cloud can be checked. Moreover, the original data blocks can be recovered efficiently if the encoded data elements have been corrupted or deleted. Security analysis demonstrates that the proposed scheme can be proved to be correct and is secure against malicious attacks. Performance analysis shows that our scheme is more efficient than the previous schemes.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据