SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs

Kui Zhu , Yongjun Ren , Jian Shen , Pandi Vijayakumar , Pradip Kumar Sharma

›› 2024, Vol. 10 ›› Issue (1) : 142 -149.

PDF
›› 2024, Vol. 10 ›› Issue (1) :142 -149. DOI: 10.1016/j.dcan.2022.07.011
Special issue on federated deep learning empowered internet of vehicles
research-article
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs
Author information +
History +
PDF

Abstract

With the intelligentization of the Internet of Vehicles (IoVs), Artificial Intelligence (AI) technology is becoming more and more essential, especially deep learning. Federated Deep Learning (FDL) is a novel distributed machine learning technology and is able to address the challenges like data security, privacy risks, and huge communication overheads from big raw data sets. However, FDL can only guarantee data security and privacy among multiple clients during data training. If the data sets stored locally in clients are corrupted, including being tampered with and lost, the training results of the FDL in intelligent IoVs must be negatively affected. In this paper, we are the first to design a secure data auditing protocol to guarantee the integrity and availability of data sets in FDL-empowered IoVs. Specifically, the cuckoo filter and Reed-Solomon codes are utilized to guarantee error tolerance, including efficient corrupted data locating and recovery. In addition, a novel data structure, Skip Hash Table (SHT) is designed to optimize data dynamics. Finally, we illustrate the security of the scheme with the Computational Diffie-Hellman (CDH) assumption on bilinear groups. Sufficient theoretical analyses and performance evaluations demonstrate the security and efficiency of our scheme for data sets in FDL-empowered IoVs.

Keywords

Internet of vehicles / Federated deep learning / Data security / Data auditing / Data locating and recovery

Cite this article

Download citation ▾
Kui Zhu, Yongjun Ren, Jian Shen, Pandi Vijayakumar, Pradip Kumar Sharma. SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs. , 2024, 10(1): 142-149 DOI:10.1016/j.dcan.2022.07.011

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

F. Yang, J. Li, T. Lei, S. Wang, Architecture and key technologies for internet of vehicles: a survey, J. Commun. Inform. Netw. Mag. 2 (2) (2017) 1-17.

[2]

F. Yang, S. Wang, J. Li, Z. Liu, Q. Sun, An overview of internet of vehicles, China Commun. Mag. 11 (10) (2014) 1-15.

[3]

Y. Liu, D. Cheng, Y. Wang, J. Cheng, S. Gao,A novel method for predicting vehicle state in internet of vehicles., Mobile Inform. Syst. Mag. 2018 ( 2018) 9728328: 1-9728328:13.

[4]

L.A. Maglaras, A.H. Al-Bayatti, Y. He, I. Wagner, H. Janicke, Social internet of vehicles for smart cities, J. Sens. Actuator Netw. Mag. 5 (1) (2016) 1-22.

[5]

Y.-S. Su, T.-J. Ding, M.-Y. Chen, Deep learning methods in internet of medical things for valvular heart disease screening system, IEEE Internet Things J. Mag. 8 (23)(2021) 16921-16932.

[6]

Y. Wang, Q. Wu, B. Qin, W. Shi, R.H. Deng, J. Hu, Identity-based data outsourcing with comprehensive auditing in clouds, IEEE Trans. Inform. Forensics Secur. Mag. 12 (4) (2016) 940-952.

[7]

D. Chen, H. Yuan, S. Hu, Q. Wang, C. Wang, Bossa: a decentralized system for proofs of data retrievability and replication, IEEE Trans. Parallel Distr. Syst. Mag. 32 (4)(2020) 786-798.

[8]

L. Huang, J. Zhou, G. Zhang, J. Sun, T. Wei, S. Yu, S. Hu, Ipanm: incentive public auditing scheme for non-manager groups in clouds, IEEE Trans. Dependable Secure Comput. Mag. 19 (2) (2022) 936-952.

[9]

R. Chen, Y. Li, Y. Yu, H. Li, X. Chen, W. Susilo, Blockchain-based dynamic provable data possession for smart cities, IEEE Internet Things J. Mag. 7 (5) (2020) 4143-4154.

[10]

R. Mishra, D. Ramesh, D.R. Edla, Dynamic large branching hash tree based secure and efficient dynamic auditing protocol for cloud environment, Cluster Comput. Mag. 24 (2) (2021) 1361-1379.

[11]

X. Li, L. Chen, J. Gao, An efficient data auditing protocol with a novel sampling verification algorithm, IEEE Access 9 (2021) 95194-95207.

[12]

E. Daniel, N. Vasanthi, Ldap: a lightweight deduplication and auditing protocol for secure data storage in cloud environment, Cluster Comput. Mag. 22 (1) (2019) 1247-1258.

[13]

K. He, J. Chen, Q. Yuan, S. Ji, D. He, R. Du, Dynamic group-oriented provable data possession in the cloud, IEEE Trans. Dependable Secure Comput. Mag. 18 (3) (2019) 1394-1408.

[14]

J. Liang, Z. Qin, S. Xiao, L. Ou, X. Lin, Efficient and secure decision tree classification for cloud-assisted online diagnosis services, IEEE Trans. Dependable Secure Comput. Mag. 18 (4) (2019) 1632-1644.

[15]

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, in: Proceedings of the 14th ACM Conference on Computer and Communications Security, ACM, 2007, pp. 598-609.

[16]

G. Ateniese, R. Di Pietro, L.V. Mancini, G. Tsudik, Scalable and efficient provable data possession, in: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, ACM, 2008, pp. 1-10.

[17]

C.C. Erway, A. Küpçü, C. Papamanthou, R. Tamassia, Dynamic provable data possession, ACM Trans. Inform. Syst. Secur. Mag. 17 (4) (2015) 1-29.

[18]

Q. Wang, C. Wang, K. Ren, W. Lou, J. Li, Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Trans. Parallel Distr. Syst. Mag. 22 (5) (2010) 847-859.

[19]

K. Yang, X. Jia, An efficient and secure dynamic auditing protocol for data storage in cloud computing, IEEE Trans. Parallel Distr. Syst. Mag. 24 (9) (2012) 1717-1726.

[20]

G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, R. Hao, Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability, J. Syst. Softw. Mag. 113 (2016) 130-139.

[21]

H. Tian, Y. Chen, C.-C. Chang, H. Jiang, Y. Huang, Y. Chen, J. Liu, Dynamic-hash-table based public auditing for secure cloud storage, IEEE Trans. Serv. Comput. Mag. 10 (5) (2015) 701-714.

[22]

L. Zhou, A. Fu, Y. Mu, H. Wang, S. Yu, Y. Sun, Multicopy provable data possession scheme supporting data dynamics for cloud-based electronic medical record system, Inform. Sci. Mag. 545 (2021) 254-276.

[23]

A.F. Barsoum, M.A. Hasan, Provable multicopy dynamic data possession in cloud computing systems, IEEE Trans. Inform. Forensic Secur. Mag 10 (3) (2014) 485-497.

[24]

M. Yi, L. Wang, J. Wei, Distributed data possession provable in cloud, Distributed Parallel Databases. Mag. 35 (1) (2017) 1-21.

[25]

B. Fan, D.G. Andersen, M. Kaminsky, M.D. Mitzenmacher, Cuckoo filter: practically better than bloom,in:Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, ACM, 2014, pp. 75-88.

[26]

J. Shen, H. Yang, P. Vijayakumar, N. Kumar, A privacy-preserving and untraceable group data sharing scheme in cloud computing, IEEE Trans. Dependable Secure Comput. Mag. 19 (4) (2022) 2198-2210.

[27]

J. Shen, C. Wang, A. Wang, S. Ji, Y. Zhang, A searchable and verifiable data protection scheme for scholarly big data, IEEE Trans. Emerg. Top. Comput. Mag. 9 (1) (2021) 216-225.

[28]

N. Koblitz, A. Menezes, Pairing-based cryptography at high security levels, in: Proceedings of IMA International Conference on Cryptography and Coding, Springer, 2005, pp. 13-36.

[29]

C. Wang, S.S. Chow, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for secure cloud storage, IEEE Trans. Comput. Mag. 62 (2) (2011) 362-375.

[30]

T. Jiang, X. Chen, J. Ma, Public integrity auditing for shared dynamic cloud data with group user revocation, IEEE Trans. Comput. Mag. 65 (8) (2015) 2363-2373.

[31]

T. Wu, G. Yang, Y. Mu, F. Guo, R.H. Deng, Privacy-preserving proof of storage for the pay-as-you-go business model, IEEE Trans. Dependable Secure Comput. Mag. 18 (2) (2019) 563-575.

[32]

Y. Zhu, G.-J. Ahn, H. Hu, S.S. Yau, H.G. An, C.-J. Hu, Dynamic audit services for outsourced storages in clouds, IEEE Trans. Serv. Comput. Mag. 6 (2) (2011) 227-238.

PDF

99

Accesses

0

Citation

Detail

Sections
Recommended

/