TY - JOUR
T1 - Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement
AU - Wu, Jun
AU - Dong, Mianxiong
AU - Ota, Kaoru
AU - Liang, Lin
AU - Zhou, Zhenyu
N1 - Publisher Copyright:
© 2014, Springer Science+Business Media New York.
PY - 2015/11/21
Y1 - 2015/11/21
N2 - In Social Internet of Things (SIoT) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data secrecy. For achieving the above goals, we propose employment of the regenerating codes and symmetric-key encryption with a Blom based key management. Particularly note that the encoded blocks stored in the i-th node and originating from the j-th node are encrypted by symmetric key Kij. A common and desirable feature regarding the considered regenerating codes and Blom’s key management scheme is that the both are based on employment of Vandermonde matrix, and accordingly yield a unified implementation framework. The security analysis and repairing probability simulation results verify the security and repairing capability of the proposed scheme. Moreover, preliminary consideration of the implementation complexity of the proposed scheme implies that the energy costs in the both cases, regarding the scenarios with and without the faults, are lower in comparison with related SIoT schemes and accordingly suitable for applications related to resources-constrained SIoT. Resource consumption evaluations show the feasibility of the proposed scheme for SIoT. To our best knowledge, this paper is the first to realize the secure sensor distributed storage for SioT with repairing capability.
AB - In Social Internet of Things (SIoT) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data secrecy. For achieving the above goals, we propose employment of the regenerating codes and symmetric-key encryption with a Blom based key management. Particularly note that the encoded blocks stored in the i-th node and originating from the j-th node are encrypted by symmetric key Kij. A common and desirable feature regarding the considered regenerating codes and Blom’s key management scheme is that the both are based on employment of Vandermonde matrix, and accordingly yield a unified implementation framework. The security analysis and repairing probability simulation results verify the security and repairing capability of the proposed scheme. Moreover, preliminary consideration of the implementation complexity of the proposed scheme implies that the energy costs in the both cases, regarding the scenarios with and without the faults, are lower in comparison with related SIoT schemes and accordingly suitable for applications related to resources-constrained SIoT. Resource consumption evaluations show the feasibility of the proposed scheme for SIoT. To our best knowledge, this paper is the first to realize the secure sensor distributed storage for SioT with repairing capability.
KW - Distributed storage
KW - Security
KW - Sensor networks
KW - Social Internet of Things
UR - http://www.scopus.com/inward/record.url?scp=84939569136&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84939569136&partnerID=8YFLogxK
U2 - 10.1007/s12083-014-0286-y
DO - 10.1007/s12083-014-0286-y
M3 - Article
AN - SCOPUS:84939569136
SN - 1936-6442
VL - 8
SP - 1133
EP - 1142
JO - Peer-to-Peer Networking and Applications
JF - Peer-to-Peer Networking and Applications
IS - 6
ER -