Jifang Wang , Shangping Wang , Jin Sun , Xin Zhao , Bintao He
{"title":"区块链通过对Ad Hoc网络中的共享数据进行交叉认证来协助公共审计","authors":"Jifang Wang , Shangping Wang , Jin Sun , Xin Zhao , Bintao He","doi":"10.1016/j.adhoc.2025.103960","DOIUrl":null,"url":null,"abstract":"<div><div>The dynamic nature of Ad Hoc networks improves the overall efficiency of the network by providing flexibility and adaptability, while also posing challenges to the data security of shared users. Considering the privacy and integrity requirements of shared data, researchers have developed various public audits to prevent malicious storage servers from compromising data privacy and integrity during sharing. However, considering the competition, benefit, cost, and confidentiality, a potential fraudulent data owner in Ad Hoc networks may share inconsistent or incomplete data that differs from its claims. Additionally, a fraudulent owner may manipulate the validation results, making the server liable for data corruption. Thus far, the problem of a fraudulent data owner in public audit for shared data is unsolved. To address this challenge, we present a blockchain-assisted public audit with cross-authentication for shared data in Ad Hoc networks, using an iterative hash chain structure to ensure a continuous, seamless flow of united authentication among parties over time. Our scheme resists fraudulent owners, allows data users to audit shared data in a semi-non-interactive mode to reduce communication costs, and achieves decentralization by adopting blockchain rather than a third-party auditor (TPA) to prevent data disclosure. Moreover, it supports multiple public audits to maintain a sustainable integrity of the data, and allows users to audit shared data even in highly privacy-protective contexts where the owner’s identity is anonymized. Security proof and extensive experiments are conducted to demonstrate the advantages of our scheme.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"178 ","pages":"Article 103960"},"PeriodicalIF":4.8000,"publicationDate":"2025-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Blockchain assisted public audit with cross-authentication for shared data in Ad Hoc networks\",\"authors\":\"Jifang Wang , Shangping Wang , Jin Sun , Xin Zhao , Bintao He\",\"doi\":\"10.1016/j.adhoc.2025.103960\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The dynamic nature of Ad Hoc networks improves the overall efficiency of the network by providing flexibility and adaptability, while also posing challenges to the data security of shared users. Considering the privacy and integrity requirements of shared data, researchers have developed various public audits to prevent malicious storage servers from compromising data privacy and integrity during sharing. However, considering the competition, benefit, cost, and confidentiality, a potential fraudulent data owner in Ad Hoc networks may share inconsistent or incomplete data that differs from its claims. Additionally, a fraudulent owner may manipulate the validation results, making the server liable for data corruption. Thus far, the problem of a fraudulent data owner in public audit for shared data is unsolved. To address this challenge, we present a blockchain-assisted public audit with cross-authentication for shared data in Ad Hoc networks, using an iterative hash chain structure to ensure a continuous, seamless flow of united authentication among parties over time. Our scheme resists fraudulent owners, allows data users to audit shared data in a semi-non-interactive mode to reduce communication costs, and achieves decentralization by adopting blockchain rather than a third-party auditor (TPA) to prevent data disclosure. Moreover, it supports multiple public audits to maintain a sustainable integrity of the data, and allows users to audit shared data even in highly privacy-protective contexts where the owner’s identity is anonymized. Security proof and extensive experiments are conducted to demonstrate the advantages of our scheme.</div></div>\",\"PeriodicalId\":55555,\"journal\":{\"name\":\"Ad Hoc Networks\",\"volume\":\"178 \",\"pages\":\"Article 103960\"},\"PeriodicalIF\":4.8000,\"publicationDate\":\"2025-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ad Hoc Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1570870525002082\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870525002082","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
Ad Hoc网络的动态特性提供了灵活性和适应性,提高了网络的整体效率,同时也对共享用户的数据安全提出了挑战。考虑到共享数据的隐私和完整性要求,研究人员开发了各种公共审计,以防止恶意存储服务器在共享过程中损害数据隐私和完整性。然而,考虑到竞争、利益、成本和机密性,Ad Hoc网络中潜在的欺诈性数据所有者可能会共享与其声明不同的不一致或不完整的数据。此外,欺诈性所有者可能会操纵验证结果,使服务器对数据损坏负责。到目前为止,在共享数据的公共审计中存在欺诈数据所有者的问题尚未得到解决。为了应对这一挑战,我们提出了一种区块链辅助的公共审计,并对Ad Hoc网络中的共享数据进行交叉认证,使用迭代哈希链结构来确保各方之间随着时间的推移持续、无缝地进行统一认证。我们的方案抵制欺诈所有者,允许数据用户以半非交互模式审计共享数据以降低通信成本,并通过采用区块链而不是第三方审计员(TPA)来实现去中心化,以防止数据泄露。此外,它支持多个公共审计,以保持数据的可持续完整性,并允许用户审计共享数据,即使在高度隐私保护的环境中,所有者的身份是匿名的。通过安全性证明和大量的实验证明了该方案的优越性。
Blockchain assisted public audit with cross-authentication for shared data in Ad Hoc networks
The dynamic nature of Ad Hoc networks improves the overall efficiency of the network by providing flexibility and adaptability, while also posing challenges to the data security of shared users. Considering the privacy and integrity requirements of shared data, researchers have developed various public audits to prevent malicious storage servers from compromising data privacy and integrity during sharing. However, considering the competition, benefit, cost, and confidentiality, a potential fraudulent data owner in Ad Hoc networks may share inconsistent or incomplete data that differs from its claims. Additionally, a fraudulent owner may manipulate the validation results, making the server liable for data corruption. Thus far, the problem of a fraudulent data owner in public audit for shared data is unsolved. To address this challenge, we present a blockchain-assisted public audit with cross-authentication for shared data in Ad Hoc networks, using an iterative hash chain structure to ensure a continuous, seamless flow of united authentication among parties over time. Our scheme resists fraudulent owners, allows data users to audit shared data in a semi-non-interactive mode to reduce communication costs, and achieves decentralization by adopting blockchain rather than a third-party auditor (TPA) to prevent data disclosure. Moreover, it supports multiple public audits to maintain a sustainable integrity of the data, and allows users to audit shared data even in highly privacy-protective contexts where the owner’s identity is anonymized. Security proof and extensive experiments are conducted to demonstrate the advantages of our scheme.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.