云雾辅助工业物联网中具有成员隐私的动态匿名认证协议

IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Guojun Wang , Guixin Jiang , Yushuai Zhao
{"title":"云雾辅助工业物联网中具有成员隐私的动态匿名认证协议","authors":"Guojun Wang ,&nbsp;Guixin Jiang ,&nbsp;Yushuai Zhao","doi":"10.1016/j.iot.2025.101742","DOIUrl":null,"url":null,"abstract":"<div><div>The cloud-fog computing infrastructure flexibly deploys resources in the Industrial Internet of Things (IIoT), adjusting the computing and storage capabilities of cloud and fog nodes based on specific needs to optimize costs and performance. However, the frequent transmission and sharing of data between terminal entities and the cloud-fog infrastructure can easily lead to privacy leaks of terminals or fog nodes. Positioned at the edge of the data source, fog nodes manage and process the needs of various local industrial sensors in real time. When sensors dynamically join or leave the group, frequent authentication with fog nodes can compromise identity privacy. To protect node identity privacy and reduce computational costs, the group signature technology is introduced in this paper. It is usually employed to build anonymous authentication protocols because of its natural properties. Backes et al. proposed a novel practical property called membership privacy for dynamic group signatures, which provides stronger anonymity. In this paper, we employ the BBS+ signature, signature proof of knowledge (SPK), ElGamal scheme, etc., to design a novel verifier local revocation (VLR) dynamic group signature with membership privacy. The proposed group signature has a smaller signature size and less computational overhead. Afterward, the framework of the cloud-fog-assisted IIoT scheme based on the proposed group signature is constructed, capturing full anonymity to preserve the privacy of patients. Formal security proofs are presented to show that the proposed group signature satisfies both general and specific security requirements. Finally, the overhead of the group signature scheme is tested on type d159 curves in the Java pairing-based cryptography (JPBC) library. The results demonstrate that our scheme is more suitable for resource-restrained devices.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101742"},"PeriodicalIF":7.6000,"publicationDate":"2025-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A dynamic anonymous authentication protocol with membership privacy in cloud-fog-assisted IIoT\",\"authors\":\"Guojun Wang ,&nbsp;Guixin Jiang ,&nbsp;Yushuai Zhao\",\"doi\":\"10.1016/j.iot.2025.101742\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The cloud-fog computing infrastructure flexibly deploys resources in the Industrial Internet of Things (IIoT), adjusting the computing and storage capabilities of cloud and fog nodes based on specific needs to optimize costs and performance. However, the frequent transmission and sharing of data between terminal entities and the cloud-fog infrastructure can easily lead to privacy leaks of terminals or fog nodes. Positioned at the edge of the data source, fog nodes manage and process the needs of various local industrial sensors in real time. When sensors dynamically join or leave the group, frequent authentication with fog nodes can compromise identity privacy. To protect node identity privacy and reduce computational costs, the group signature technology is introduced in this paper. It is usually employed to build anonymous authentication protocols because of its natural properties. Backes et al. proposed a novel practical property called membership privacy for dynamic group signatures, which provides stronger anonymity. In this paper, we employ the BBS+ signature, signature proof of knowledge (SPK), ElGamal scheme, etc., to design a novel verifier local revocation (VLR) dynamic group signature with membership privacy. The proposed group signature has a smaller signature size and less computational overhead. Afterward, the framework of the cloud-fog-assisted IIoT scheme based on the proposed group signature is constructed, capturing full anonymity to preserve the privacy of patients. Formal security proofs are presented to show that the proposed group signature satisfies both general and specific security requirements. Finally, the overhead of the group signature scheme is tested on type d159 curves in the Java pairing-based cryptography (JPBC) library. The results demonstrate that our scheme is more suitable for resource-restrained devices.</div></div>\",\"PeriodicalId\":29968,\"journal\":{\"name\":\"Internet of Things\",\"volume\":\"34 \",\"pages\":\"Article 101742\"},\"PeriodicalIF\":7.6000,\"publicationDate\":\"2025-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet of Things\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2542660525002562\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660525002562","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

云雾计算基础设施在工业物联网中灵活部署资源,根据具体需求调整云雾节点的计算和存储能力,实现成本和性能的优化。然而,终端实体与云雾基础设施之间频繁的数据传输和共享,容易导致终端或雾节点的隐私泄露。雾节点位于数据源的边缘,实时管理和处理各种本地工业传感器的需求。当传感器动态加入或离开组时,使用雾节点的频繁身份验证可能会危及身份隐私。为了保护节点身份隐私和降低计算成本,本文引入了群签名技术。由于其自然属性,通常用于构建匿名身份验证协议。Backes等人针对动态群签名提出了一种新的实用属性——成员隐私,它提供了更强的匿名性。本文采用BBS+签名、签名知识证明(SPK)、ElGamal方案等,设计了一种具有成员隐私的验证者本地撤销(VLR)动态组签名。提出的群签名具有较小的签名大小和较小的计算开销。随后,基于所提出的群签名构建了云雾辅助IIoT方案框架,实现了完全匿名,保护了患者的隐私。给出了形式化的安全证明,证明所提出的群签名既满足一般安全要求,又满足特定安全要求。最后,在Java基于配对的密码学(JPBC)库中的d159型曲线上测试了组签名方案的开销。结果表明,该方案更适合于资源受限的设备。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A dynamic anonymous authentication protocol with membership privacy in cloud-fog-assisted IIoT
The cloud-fog computing infrastructure flexibly deploys resources in the Industrial Internet of Things (IIoT), adjusting the computing and storage capabilities of cloud and fog nodes based on specific needs to optimize costs and performance. However, the frequent transmission and sharing of data between terminal entities and the cloud-fog infrastructure can easily lead to privacy leaks of terminals or fog nodes. Positioned at the edge of the data source, fog nodes manage and process the needs of various local industrial sensors in real time. When sensors dynamically join or leave the group, frequent authentication with fog nodes can compromise identity privacy. To protect node identity privacy and reduce computational costs, the group signature technology is introduced in this paper. It is usually employed to build anonymous authentication protocols because of its natural properties. Backes et al. proposed a novel practical property called membership privacy for dynamic group signatures, which provides stronger anonymity. In this paper, we employ the BBS+ signature, signature proof of knowledge (SPK), ElGamal scheme, etc., to design a novel verifier local revocation (VLR) dynamic group signature with membership privacy. The proposed group signature has a smaller signature size and less computational overhead. Afterward, the framework of the cloud-fog-assisted IIoT scheme based on the proposed group signature is constructed, capturing full anonymity to preserve the privacy of patients. Formal security proofs are presented to show that the proposed group signature satisfies both general and specific security requirements. Finally, the overhead of the group signature scheme is tested on type d159 curves in the Java pairing-based cryptography (JPBC) library. The results demonstrate that our scheme is more suitable for resource-restrained devices.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Internet of Things
Internet of Things Multiple-
CiteScore
3.60
自引率
5.10%
发文量
115
审稿时长
37 days
期刊介绍: Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT. The journal will place a high priority on timely publication, and provide a home for high quality. Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信