| Literature DB >> 28475110 |
Song Li1, Jie Cui2, Hong Zhong3, Lu Liu4.
Abstract
Wireless Body Sensor Networks (WBSNs) are gaining importance in the era of the Internet of Things (IoT). The modern medical system is a particular area where the WBSN techniques are being increasingly adopted for various fundamental operations. Despite such increasing deployments of WBSNs, issues such as the infancy in the size, capabilities and limited data processing capacities of the sensor devices restrain their adoption in resource-demanding applications. Though providing computing and storage supplements from cloud servers can potentially enrich the capabilities of the WBSNs devices, data security is one of the prevailing issues that affects the reliability of cloud-assisted services. Sensitive applications such as modern medical systems demand assurance of the privacy of the users' medical records stored in distant cloud servers. Since it is economically impossible to set up private cloud servers for every client, auditing data security managed in the remote servers has necessarily become an integral requirement of WBSNs' applications relying on public cloud servers. To this end, this paper proposes a novel certificateless public auditing scheme with integrated privacy protection. The multi-user model in our scheme supports groups of users to store and share data, thus exhibiting the potential for WBSNs' deployments within community environments. Furthermore, our scheme enriches user experiences by offering public verifiability, forward security mechanisms and revocation of illegal group members. Experimental evaluations demonstrate the security effectiveness of our proposed scheme under the Random Oracle Model (ROM) by outperforming existing cloud-assisted WBSN models.Entities:
Keywords: cloud computing; privacy preserving; public auditing; wireless body sensor networks
Year: 2017 PMID: 28475110 PMCID: PMC5469637 DOI: 10.3390/s17051032
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The system model of cloud-assisted WBSNs.
Figure 2The network model of our proposed public auditing scheme. KGC, Key Generation Centre.
The notations used in our scheme.
| Symbol | The Meaning of the Symbol |
|---|---|
| A security parameter | |
| A large prime number | |
| A bilinear pairing | |
| The master key | |
| The public key of KGC | |
| The identity of user | |
| The partial public key generated by user self | |
| The partial public key generated by KGC | |
| The partial secret key generated by user self | |
| The partial secret key generated by KGC | |
| The group shared encryption key | |
| The group member list | |
| The hash functions {{0,1}*, | |
| The hash functions {{0,1}*, {0,1}*, | |
| The hash functions {0,1}* → |
Figure 3The flowchart of the attacking games in our security proof.
Comparison of the security properties of the three proposals.
| Property | Wang et al.’s Scheme [ | He et al.’s Scheme [ | Our Scheme |
|---|---|---|---|
| Public verifiability | √ | √ | √ |
| Multi-user sharing | × | × | √ |
| Revocability | N/A | N/A | √ |
| Forward security | √ | √ | √ |
| Privacy protection | × | × | √ |
| Batch authentication | √ | √ | √ |
| Proven security | √ | √ | √ |
| Key replacement resistant | × | √ | √ |
Figure 4The time cost of the algorithm ProofGen, TagGen, Encryption and Decryption with regard to the numbers of data blocks in seconds.
Figure 5The time cost of the algorithms PartialPrivateKeyExtract and JoinGroup with regard to the requesting number of users in seconds.
The cryptographic operations in each algorithm.
| PartialPrivateKeyExtract | JoinGroup (Group Manager) | JoinGroup (User) | Encryption | TagGen | ProofGen | ProofVerify | Decryption |
|---|---|---|---|---|---|---|---|
| 1 PM + 1 H | 2 PM | 1 PM | 2 PM | 2 | 2E + ( | 1 PM |
Figure 6The time cost of the ProofVerify algorithm on the auditor sider with regard to the number of blocks in seconds.