{"title":"云雾辅助工业物联网中具有成员隐私的动态匿名认证协议","authors":"Guojun Wang , Guixin Jiang , Yushuai Zhao","doi":"10.1016/j.iot.2025.101742","DOIUrl":null,"url":null,"abstract":"<div><div>The cloud-fog computing infrastructure flexibly deploys resources in the Industrial Internet of Things (IIoT), adjusting the computing and storage capabilities of cloud and fog nodes based on specific needs to optimize costs and performance. However, the frequent transmission and sharing of data between terminal entities and the cloud-fog infrastructure can easily lead to privacy leaks of terminals or fog nodes. Positioned at the edge of the data source, fog nodes manage and process the needs of various local industrial sensors in real time. When sensors dynamically join or leave the group, frequent authentication with fog nodes can compromise identity privacy. To protect node identity privacy and reduce computational costs, the group signature technology is introduced in this paper. It is usually employed to build anonymous authentication protocols because of its natural properties. Backes et al. proposed a novel practical property called membership privacy for dynamic group signatures, which provides stronger anonymity. In this paper, we employ the BBS+ signature, signature proof of knowledge (SPK), ElGamal scheme, etc., to design a novel verifier local revocation (VLR) dynamic group signature with membership privacy. The proposed group signature has a smaller signature size and less computational overhead. Afterward, the framework of the cloud-fog-assisted IIoT scheme based on the proposed group signature is constructed, capturing full anonymity to preserve the privacy of patients. Formal security proofs are presented to show that the proposed group signature satisfies both general and specific security requirements. Finally, the overhead of the group signature scheme is tested on type d159 curves in the Java pairing-based cryptography (JPBC) library. The results demonstrate that our scheme is more suitable for resource-restrained devices.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101742"},"PeriodicalIF":7.6000,"publicationDate":"2025-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A dynamic anonymous authentication protocol with membership privacy in cloud-fog-assisted IIoT\",\"authors\":\"Guojun Wang , Guixin Jiang , Yushuai Zhao\",\"doi\":\"10.1016/j.iot.2025.101742\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The cloud-fog computing infrastructure flexibly deploys resources in the Industrial Internet of Things (IIoT), adjusting the computing and storage capabilities of cloud and fog nodes based on specific needs to optimize costs and performance. However, the frequent transmission and sharing of data between terminal entities and the cloud-fog infrastructure can easily lead to privacy leaks of terminals or fog nodes. Positioned at the edge of the data source, fog nodes manage and process the needs of various local industrial sensors in real time. When sensors dynamically join or leave the group, frequent authentication with fog nodes can compromise identity privacy. To protect node identity privacy and reduce computational costs, the group signature technology is introduced in this paper. It is usually employed to build anonymous authentication protocols because of its natural properties. Backes et al. proposed a novel practical property called membership privacy for dynamic group signatures, which provides stronger anonymity. In this paper, we employ the BBS+ signature, signature proof of knowledge (SPK), ElGamal scheme, etc., to design a novel verifier local revocation (VLR) dynamic group signature with membership privacy. The proposed group signature has a smaller signature size and less computational overhead. Afterward, the framework of the cloud-fog-assisted IIoT scheme based on the proposed group signature is constructed, capturing full anonymity to preserve the privacy of patients. Formal security proofs are presented to show that the proposed group signature satisfies both general and specific security requirements. Finally, the overhead of the group signature scheme is tested on type d159 curves in the Java pairing-based cryptography (JPBC) library. The results demonstrate that our scheme is more suitable for resource-restrained devices.</div></div>\",\"PeriodicalId\":29968,\"journal\":{\"name\":\"Internet of Things\",\"volume\":\"34 \",\"pages\":\"Article 101742\"},\"PeriodicalIF\":7.6000,\"publicationDate\":\"2025-09-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Internet of Things\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2542660525002562\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660525002562","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A dynamic anonymous authentication protocol with membership privacy in cloud-fog-assisted IIoT
The cloud-fog computing infrastructure flexibly deploys resources in the Industrial Internet of Things (IIoT), adjusting the computing and storage capabilities of cloud and fog nodes based on specific needs to optimize costs and performance. However, the frequent transmission and sharing of data between terminal entities and the cloud-fog infrastructure can easily lead to privacy leaks of terminals or fog nodes. Positioned at the edge of the data source, fog nodes manage and process the needs of various local industrial sensors in real time. When sensors dynamically join or leave the group, frequent authentication with fog nodes can compromise identity privacy. To protect node identity privacy and reduce computational costs, the group signature technology is introduced in this paper. It is usually employed to build anonymous authentication protocols because of its natural properties. Backes et al. proposed a novel practical property called membership privacy for dynamic group signatures, which provides stronger anonymity. In this paper, we employ the BBS+ signature, signature proof of knowledge (SPK), ElGamal scheme, etc., to design a novel verifier local revocation (VLR) dynamic group signature with membership privacy. The proposed group signature has a smaller signature size and less computational overhead. Afterward, the framework of the cloud-fog-assisted IIoT scheme based on the proposed group signature is constructed, capturing full anonymity to preserve the privacy of patients. Formal security proofs are presented to show that the proposed group signature satisfies both general and specific security requirements. Finally, the overhead of the group signature scheme is tested on type d159 curves in the Java pairing-based cryptography (JPBC) library. The results demonstrate that our scheme is more suitable for resource-restrained devices.
期刊介绍:
Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT.
The journal will place a high priority on timely publication, and provide a home for high quality.
Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.