Secure and efficient data storage and sharing scheme for <scp>blockchain‐based mobile‐edge</scp> computing
-
- Lejun Zhang
- College of Information Engineering Yangzhou University Yangzhou China
-
- Minghui Peng
- College of Information Engineering Yangzhou University Yangzhou China
-
- Weizheng Wang
- Computer Science Department City University of Hong Kong Hong Kong Hong Kong
-
- Zilong Jin
- School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
-
- Yansen Su
- Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology Anhui University Hefei China
-
- Huiling Chen
- Department of Computer Science and Artificial Intelligence Wenzhou University Wenzhou China
この論文をさがす
説明
<jats:title>Abstract</jats:title><jats:p>With the rapid development of Internet of Things (IoT) technology, IoT devices have been widely used to collect physiological health data and provide diversified services to the terminal users. However, traditional data storage and sharing scheme cloud computing based in IoT face many challenges. For example, IoT devices are usually resource‐constrained (storage, computing power, battery capacity, etc.), data signed by IoT devices to ensure data integrity and authenticity will consume a lot of computing resources of IoT devices. At the same time, there is the challenge of high latency and unsafe data storage and sharing. To overcome these challenges, we propose a secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing. In our scheme, we construct the unique signature private key in a region into multiple key shares. IoT devices only need to submit the data and the random key shares allocated to the edge node. Edge node uses the recovered signature private key to realize data signature and homomorphic encryption. At the same time, the edge node will process timely data and return to the user. For data that need to be uploaded to the cloud for analysis, we use backup uploads to avoid data floods. Through experiments, it was found that our scheme can not only realize low‐latency message response for the terminal users, but also realize anonymous identity verification while ensuring data integrity and authenticity. The key shares of the signature private key are stored in different blocks of the blockchain to improve fault tolerance. The content extraction signature algorithm ensures that the key shares stored in different blocks are publicly verifiable. Safety analysis and performance analysis verify the feasibility and effectiveness of our scheme.</jats:p>
収録刊行物
-
- Transactions on Emerging Telecommunications Technologies
-
Transactions on Emerging Telecommunications Technologies 32 (10), 2021-06-06
Wiley
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1360294646635576704
-
- DOI
- 10.1002/ett.4315
-
- ISSN
- 21613915
-
- データソース種別
-
- Crossref