Status | 已发表Published |
Title | Edge-based auditing method for data security in resource-constrained Internet of Things |
Creator | |
Date Issued | 2021-03-01 |
Source Publication | Journal of Systems Architecture
![]() |
ISSN | 1383-7621 |
Volume | 114 |
Abstract | The explosive generation of Internet of Things (IoT) data calls for cloud service providers (CSP) to further provide more secure and reliable transmission, storage, and management services. This requirement, however, goes against the honest and curious nature of CSP, to the extent that existing methods introduce the third-party audit (TPA) to check data security in the cloud. TPA solves the problem of unreliable CSP but puts a heavy burden on lightweight users because of the sheer amount of the pre-audit data processing work. In this paper, we establish an audit model based on a designed binary tree assisted by edge computing, which provides computing capability for the resource-constrained terminals. The data pre-processing task is offloaded to the edge, which reduces computing load and improves the efficiency of task processing. We propose an improved correlation mechanism between data blocks and nodes on the binary tree so that all nodes on the binary tree can be fully utilized while existing methods use only leaf nodes and thus are required to establish multiple binary trees. Moreover, to improve audit efficiency, the binary tree in the audit process is designed to be self-balanced. In experiments, we compare our methods with the traditional method and experimental results show that the proposed mechanism is more effective to store and manage big data, which is conducive to providing users with more secure IoT services. |
Keyword | Audit model Binary tree Data security Edge computing Resource-constrained terminal |
DOI | 10.1016/j.sysarc.2020.101971 |
URL | View source |
Indexed By | SCIE |
Language | 英语English |
WOS Research Area | Computer Science |
WOS Subject | Computer Science, Hardware & Architecture ; Computer Science, Software Engineering |
WOS ID | WOS:000697350100017 |
Scopus ID | 2-s2.0-85097898973 |
Citation statistics | |
Document Type | Journal article |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/7091 |
Collection | Faculty of Science and Technology |
Corresponding Author | Wang, Zhijian |
Affiliation | 1.College of Computer Science and Technology, Huaqiao University, Xiamen, China 2.Artificial Intelligence and Future Networks, Beijing Normal University & UIC, Guangdong, Zhuhai, China 3.School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China 4.School of Computer and Communication Engineering, Changsha University of Science & Technology, Changsha, China 5.Faculty of Information Technology, Macau University of Science and Technology, Macao, China 6.Information Science School, Guangdong University of Finance & Economics, Guangzhou, China |
Recommended Citation GB/T 7714 | Wang, Tian,Mei, Yaxin,Liu, Xuxunet al. Edge-based auditing method for data security in resource-constrained Internet of Things[J]. Journal of Systems Architecture, 2021, 114. |
APA | Wang, Tian, Mei, Yaxin, Liu, Xuxun, Wang, Jin, Dai, Hong Ning, & Wang, Zhijian. (2021). Edge-based auditing method for data security in resource-constrained Internet of Things. Journal of Systems Architecture, 114. |
MLA | Wang, Tian,et al."Edge-based auditing method for data security in resource-constrained Internet of Things". Journal of Systems Architecture 114(2021). |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment