{"title":"高效、安全、基于秘密共享的数据外包,适合物联网环境","authors":"Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa","doi":"10.1016/j.iot.2025.101645","DOIUrl":null,"url":null,"abstract":"<div><div>Advancements in the Internet of Things (IoT) environment and cloud computing have created new business opportunities, such as cloud-based IoT data outsourcing, in which data that are collected by IoT devices are outsourced to cloud servers for further processing. However, concerns exist regarding the privacy and security of the collected data. Moreover, IoT devices often operate at low power and possess restricted memory, processing capabilities, and storage capacities. Consequently, a secure data-outsourcing method with minimal computational requirements is essential. Secret sharing schemes are recognized for providing robust security while requiring minimal computational resources. Hence, secret sharing schemes have recently been utilized as alternative methods to address privacy protection concerns. In a perfect <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> threshold secret sharing scheme, a secret is converted into <span><math><mi>n</mi></math></span> different shares, thereby requiring a total share size of <span><math><mi>n</mi></math></span> times the secret. A <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>L</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> ramp secret sharing scheme provides better storage efficiency, albeit at the cost of realizing only weak security. In this study, we propose a new protocol for a secure and storage-efficient <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>L</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> ramp secret sharing scheme that incorporates the idea of encrypting each secret with a random number. By introducing new randomization steps based on the one-time pad encryption approach to randomize the inputs, we prove that even if part of the information can be leaked because of the nature of <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>L</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> ramp secret sharing, the actual secret remains secure, provided that the product of the random numbers is not leaked from the unauthorized shares. Furthermore, we performed an experimental evaluation of the distribution phase of the proposed method with C++ using a Raspberry Pi 4 Model B as an IoT device and showed that the proposed method can be executed in significantly less time than most conventional secret haring schemes, particularly when the parameter <span><math><mi>k</mi></math></span> increases.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101645"},"PeriodicalIF":7.6000,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Efficient and secure secret sharing-based data outsourcing suitable for Internet of Things environments\",\"authors\":\"Ahmad Akmal Aminuddin Mohd Kamal, Masaya Fujisawa\",\"doi\":\"10.1016/j.iot.2025.101645\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Advancements in the Internet of Things (IoT) environment and cloud computing have created new business opportunities, such as cloud-based IoT data outsourcing, in which data that are collected by IoT devices are outsourced to cloud servers for further processing. However, concerns exist regarding the privacy and security of the collected data. Moreover, IoT devices often operate at low power and possess restricted memory, processing capabilities, and storage capacities. Consequently, a secure data-outsourcing method with minimal computational requirements is essential. Secret sharing schemes are recognized for providing robust security while requiring minimal computational resources. Hence, secret sharing schemes have recently been utilized as alternative methods to address privacy protection concerns. In a perfect <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> threshold secret sharing scheme, a secret is converted into <span><math><mi>n</mi></math></span> different shares, thereby requiring a total share size of <span><math><mi>n</mi></math></span> times the secret. A <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>L</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> ramp secret sharing scheme provides better storage efficiency, albeit at the cost of realizing only weak security. In this study, we propose a new protocol for a secure and storage-efficient <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>L</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> ramp secret sharing scheme that incorporates the idea of encrypting each secret with a random number. By introducing new randomization steps based on the one-time pad encryption approach to randomize the inputs, we prove that even if part of the information can be leaked because of the nature of <span><math><mrow><mo>(</mo><mi>k</mi><mo>,</mo><mi>L</mi><mo>,</mo><mi>n</mi><mo>)</mo></mrow></math></span> ramp secret sharing, the actual secret remains secure, provided that the product of the random numbers is not leaked from the unauthorized shares. Furthermore, we performed an experimental evaluation of the distribution phase of the proposed method with C++ using a Raspberry Pi 4 Model B as an IoT device and showed that the proposed method can be executed in significantly less time than most conventional secret haring schemes, particularly when the parameter <span><math><mi>k</mi></math></span> increases.</div></div>\",\"PeriodicalId\":29968,\"journal\":{\"name\":\"Internet of Things\",\"volume\":\"32 \",\"pages\":\"Article 101645\"},\"PeriodicalIF\":7.6000,\"publicationDate\":\"2025-05-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet of Things\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2542660525001593\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660525001593","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Efficient and secure secret sharing-based data outsourcing suitable for Internet of Things environments
Advancements in the Internet of Things (IoT) environment and cloud computing have created new business opportunities, such as cloud-based IoT data outsourcing, in which data that are collected by IoT devices are outsourced to cloud servers for further processing. However, concerns exist regarding the privacy and security of the collected data. Moreover, IoT devices often operate at low power and possess restricted memory, processing capabilities, and storage capacities. Consequently, a secure data-outsourcing method with minimal computational requirements is essential. Secret sharing schemes are recognized for providing robust security while requiring minimal computational resources. Hence, secret sharing schemes have recently been utilized as alternative methods to address privacy protection concerns. In a perfect threshold secret sharing scheme, a secret is converted into different shares, thereby requiring a total share size of times the secret. A ramp secret sharing scheme provides better storage efficiency, albeit at the cost of realizing only weak security. In this study, we propose a new protocol for a secure and storage-efficient ramp secret sharing scheme that incorporates the idea of encrypting each secret with a random number. By introducing new randomization steps based on the one-time pad encryption approach to randomize the inputs, we prove that even if part of the information can be leaked because of the nature of ramp secret sharing, the actual secret remains secure, provided that the product of the random numbers is not leaked from the unauthorized shares. Furthermore, we performed an experimental evaluation of the distribution phase of the proposed method with C++ using a Raspberry Pi 4 Model B as an IoT device and showed that the proposed method can be executed in significantly less time than most conventional secret haring schemes, particularly when the parameter increases.
期刊介绍:
Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT.
The journal will place a high priority on timely publication, and provide a home for high quality.
Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.