Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment  

在线阅读下载全文

作  者:Zhang Lejun Peng Minghui Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 

机构地区:[1]Cyberspace Institute Advanced Technology,Guangzhou University,Guangzhou 510006,China [2]College of Information Engineering,Yangzhou University,Yangzhou 225127,China [3]School Math&Computer Science,Quanzhou Normal University,Quanzhou 362000,China [4]Computer Science Department,City University of Hong Kong,Hong Kong 999077,China [5]School of Computer and Software,Nanjing University of Information Science and Technology,Nanjing 21004,China [6]Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education,School of Computer Science and Technology,Anhui University,Hefei 230601,China [7]Department of Computer Science and Artificial Intelligence,Wenzhou University,Wenzhou 325035,China [8]Guangzhou University Library,Guangzhou University,Guangzhou 510006,China [9]Central Economic and Mathematics Institute,Russian Academy of Sciences [10]MIREA-Russian Technological University,Moscow Region,Russia

出  处:《China Communications》2024年第3期149-159,共11页中国通信(英文版)

基  金:sponsored by the National Natural Science Foundation of China under grant number No. 62172353, No. 62302114, No. U20B2046 and No. 62172115;Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education No.1331007 and No. 1311022;Natural Science Foundation of the Jiangsu Higher Education Institutions Grant No. 17KJB520044;Six Talent Peaks Project in Jiangsu Province No.XYDXX-108

摘  要:With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis.

关 键 词:blockchain data integrity edge computing privacy protection redundant data 

分 类 号:TP311.13[自动化与计算机技术—计算机软件与理论] TP309[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象