An Efficient and Universal Real-Time Data Integrity Verification Scheme Based on Symmetric Key in Stream Computing System

Author:

Wang Hongyuan1,Zhu Wanting1,Zu Baokai1,Li Yafang1

Affiliation:

1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China

Abstract

The integrity of real-time data streams has not been solved for a long time and has gradually become a difficult problem in the field of data security. Most of the current data integrity verification schemes are constructed using cryptographic algorithms with complex computation, which cannot be directly applied to real-time stream computing systems. Aiming at the above issue, this paper adopts the Carter–Wegman MAC method, pseudo-random function and symmetric cryptography mechanism to construct the Real-Time Data Integrity Verification scheme based on symmetric key in stream computing systems (RT-DIV), which converts a one-time MAC to a multiple-time MAC and retains the advantage of security performance. Then, a security analysis is given under the standard model. Finally, experiments and data analysis are conducted in a simulated environment, and the experimental results show that the RT-DIV scheme can effectively guarantee the integrity of real-time data streams. Furthermore, the RT-DIV scheme lays the foundation for the secure application of the stream computing system.

Funder

Beijing Municipal Education Commission

Publisher

MDPI AG

Subject

Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)

Reference40 articles.

1. Research and Development of Provable Data Integrity in Cloud Storage;Tan;J. Comput.,2015

2. Big Data Stream Computing: Technologies and Instances;Sun;J. Softw.,2014

3. (2023, June 16). Storm Acker. Available online: https://www.cnblogs.com/DreamDrive/p/6671194.html.

4. Ateniese, G., Burns, R., and Curtmola, R. (November, January 31). Provable Data Possession at Untrusted Stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA.

5. Ateniese, G., Di, P.R., Mancini, L.V., and Tsudik, G. (2008, January 22–25). Scalable and Efficient Provable Data Possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3