An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Authors
Abstract:
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in IoTs by the use of -threshold secret sharing scheme in the cloud storage. In this method, original data is divided into blocks that each block is considered as a share. The edge server does not send these shares (blocks) directly (through the secure channel) to cloud service providers ( s). Rather, the edge server hides the shares (blocks) with XORing two secret values and publishes the result. Indeed, with this method, none of s has an amount of block information.This scheme is also verifiable, i.e., in the verification phase, each can verify its quasi-share. Moreover, before data retrieval, the edge server checks the correctness of provided quasi-share from s of an authorized group. Also, the proposed scheme is scalable, since new data can be inserted or part of the original data can be deleted, without changing shares. It is worth noting that the proposed scheme is more efficient compared with the other scheme since heavy and complex computation is not required.
similar resources
Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data
----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT c...
full textAn Efficient Lattice-Based Secret Sharing Construction
This paper presents a new construction of a lattice-based verifiable secret sharing scheme. Our proposal is based on lattices and the usage of linear hash functions to enable each participant to verify its received secret share. The security of this scheme relies on the hardness of some well known approximation problems in lattices such as n-approximate SVP. Different to protocols proposed by P...
full textEfficient LDPC Code Based Secret Sharing Schemes and Private Data Storage in Cloud without Encryption
LDPC codes, LT codes, and digital fountain techniques have received significant attention from both academics and industry in the past few years. By employing the underlying ideas of efficient Belief Propagation (BP) decoding process in LDPC and LT codes, this paper introduces three classes of secret sharing schemes called BP-XOR secret sharing schemes, pseudo-BP-XOR secret sharing schemes, and...
full textA Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems
To date, the cloud storage system has been well developed. It is a system that provides users with large storage, high computation ability, and convenience. However, users cannot fully trust a cloud storage system because it is an “honest but curious”server. For this reason, protecting data confidentiality and data integrity are two important issues in a cloud storage system. In this paper, we ...
full textimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
full textMesh-based Cloud Data Storage & Management Framework for Internet of Things
The Internet of Things (IoT) is the network of physical objects, devices, vehicles, buildings and other items that enables these objects to collect and exchange data. One of the application domains of IoT is smart building where a number of things are efficiently interconnected in order to combine and integrate the physical world to the information space and to provide the services in an effici...
full textMy Resources
Journal title
volume 32 issue 8
pages 1117- 1125
publication date 2019-08-01
By following a journal you will be notified via email when a new issue of this journal is published.
Hosted on Doprax cloud platform doprax.com
copyright © 2015-2023