4.5 Article

Secure Data Query Framework for Cloud and Fog Computing

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TNSM.2019.2941869

Keywords

Edge computing; Cloud computing; Servers; Cryptography; Data aggregation; Computational modeling; Fog computing; cloud computing; data query; security

Funding

  1. National Natural Science Foundation of China [61402055, 61902040]
  2. Natural Science Foundation of Hunan Province [2018JJ2445]

Ask authors/readers for more resources

Fog computing is mainly used to process a large amount of data produced by terminal devices. As fog nodes are the closest acquirers to the terminal devices, the processed data may be tampered with or illegally captured by some malicious nodes while the data is transferred or aggregated. When some applications need to require real-time process with high security, cloud service may sample some data from fog service to check final results. In this paper, we propose a secure data query framework for cloud and fog computing. We use cloud service to check queried data from fog network when fog network provides queried data to users. In the framework, cloud server pre-designates some data aggregation topology trees to fog network, and then fog network may acquire related data from fog nodes according to one of the pre-designated data aggregation trees. Additionally, some fog nodes are assigned as sampled nodes that can feed back related data to cloud server. Based on the security requirements of fog computing, we analyze the security of our proposed framework. Our framework not only guarantees the reliability of required data but also effectively protects data against man-in-the-middle attack, single node attack and collusion attack of malicious users. Also, the experiments show our framework is effective and efficient.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Artificial Intelligence

Image super-resolution reconstruction based on feature map attention mechanism

Yuantao Chen, Linwu Liu, Volachith Phonevilay, Ke Gu, Runlong Xia, Jingbo Xie, Qian Zhang, Kai Yang

Summary: This paper proposed an image super-resolution reconstruction method using attention mechanism with feature map to improve the visual effect of images and enhance the evaluation indicators. The proposed model consists of feature extraction block, information extraction block, and reconstruction module, which effectively restores more details in high-resolution images.

APPLIED INTELLIGENCE (2021)

Article Computer Science, Theory & Methods

Detection resource allocation scheme for two-layer cooperative IDSs in smart grids

Zhuoqun Xia, Jingjing Tan, Ke Gu, WeiJia Jia

Summary: This paper proposes a resource allocation scheme for two-layer collaborative IDSs in smart grids, quantifying the impact of detection resource restriction through a stochastic game model and proposing an optimized resource allocation method.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2021)

Article Green & Sustainable Science & Technology

Agricultural Waste Recycling Optimization of Family Farms Based on Environmental Management Accounting in Rural China

Lulu Yang, Xu Xiao, Ke Gu

Summary: This paper proposes an agricultural-waste-recycling model for Chinese family farms based on the extended MFCA. Through research on family farms in Hunan Province, the agricultural-waste-recycling model was optimized and subjected to a two-dimensional analysis. The study shows that visualizing the monetization of resource losses can optimize manure recycling through better decision-making, thereby increasing the sustainability of family farms.

SUSTAINABILITY (2021)

Article Geochemistry & Geophysics

Few-Shot Object Detection on Remote Sensing Images

Xiang Li, Jingyu Deng, Yi Fang

Summary: In this article, a metalearning-based method for few-shot object detection on remote sensing images is introduced. Experimental results on benchmark datasets demonstrate that the proposed method achieves satisfying detection performance with only a few annotated samples and outperforms existing baseline models.

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING (2022)

Article Computer Science, Information Systems

An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System

Xiong Li, Shanpeng Liu, Rongxing Lu, Muhammad Khurram Khan, Ke Gu, Xiaosong Zhang

Summary: This study proposes an efficient privacy-preserving public auditing protocol to address the integrity of medical data in cloud-based medical storage systems. The research shows that the protocol significantly reduces computational costs for both data owners and third-party auditors, while improving communication efficiency.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2022)

Article Engineering, Multidisciplinary

Cluster-Based Malicious Node Detection for False Downstream Data in Fog Computing-Based VANETs

Ke Gu, XinYing Dong, Xiong Li, WeiJia Jia

Summary: This paper proposes a detection scheme for malicious nodes in fog computing-based VANETs, which can supervise the data forwarding process and detect malicious nodes in a timely manner. The experimental results demonstrate the effectiveness of the proposed scheme in ensuring security.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs

Zhuoqun Xia, Lingxuan Zeng, Ke Gu, Xiong Li, Weijia Jia

Summary: This article proposes an efficient conditional identity privacy-preserving authentication scheme based on the cooperation of multiple fog servers in fog computing-based Internet of Vehicles (IoVs). This scheme solves the issues of information leakage and security in IoVs. Experimental results demonstrate the high efficiency of our scheme in fog computing-based IoVs.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2022)

Article Computer Science, Artificial Intelligence

Fed_ADBN: An efficient intrusion detection framework based on client selection in AMI network

Zhuoqun Xia, Yaling Chen, Bo Yin, Haolan Liang, Hongmei Zhou, Ke Gu, Fei Yu

Summary: This paper proposes an efficient intrusion detection framework Fed_ADBN based on federated attention deep belief network and client selection. It not only protects data security but also accurately detects network attacks in AMI network using a combination of federated learning and attention mechanism.

EXPERT SYSTEMS (2023)

Article Computer Science, Information Systems

Self-Verifiable Attribute-Based Keyword Search Scheme for Distributed Data Storage in Fog Computing With Fast Decryption

Ke Gu, Wenbin Zhang, Xiong Li, Weijia Jia

Summary: This paper proposes a self-verifiable attribute-based keyword search scheme for distributed data storage in a full fog computing environment. The scheme provides attribute-based distributed data storage among fog servers through a threshold secret-sharing scheme and offers self-verifiable keyword search and data decryption for terminal users.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Engineering, Civil

Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles

Ke Gu, Keming Wang, Xiong Li, Weijia Jia

Summary: The paper proposes a decentralized traceable privacy-preserving scheme for vehicular identity in fog computing-based Internet of Vehicles (IoV), which uses multiple fog servers to trace the identity and trajectory of a vehicle under certain conditions. By utilizing a secret sharing scheme, the true identity of a vehicle is hidden and traced, ensuring security requirements are met and data collection procedure is secure under the real-or-random model. Experimental results show the efficiency of the proposed scheme in IoV.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance

Fan Wu, Xiong Li, Xiangyang Luo, Ke Gu

Summary: This paper investigates the authentication issue of smart vehicles in edge computing-enabled Internet of Vehicles with drone assistance. A scheme is proposed and proven to be secure and practical through formal proof and network simulation.

JOURNAL OF SYSTEMS ARCHITECTURE (2022)

Article Computer Science, Information Systems

Dual-Mode Data Forwarding Scheme Based on Interest Tags for Fog Computing-Based SIoVs

Zhuoqun Xia, Xiaoxiao Mao, Ke Gu, Weijia Jia

Summary: This paper proposes a dual-mode data forwarding scheme based on interest tags for fog computing-based SIoVs, aiming to address the issues of data forwarding optimization and adaptability in dynamic networks. The experimental results show that the proposed scheme is more efficient and stable than other related schemes.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2022)

Article Computer Science, Cybernetics

Two-Dimensional Behavior Marker-Based Data Forwarding Incentive Scheme for Fog Computing-Based SIoVs

Zhuoqun Xia, Xiaoxiao Mao, Ke Gu, Weijia Jia

Summary: This article introduces a data-forwarding incentive scheme based on 2-D behavior markers to encourage vehicle nodes to participate in data forwarding, improving data delivery ratio. By evaluating the behaviors of vehicle nodes comprehensively, cooperation between selfish nodes in data forwarding is promoted.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)

Article Engineering, Civil

Adaptive Area-Based Traffic Congestion Control and Management Scheme Based on Fog Computing

Ke Gu, Jieyu Hu, Weijia Jia

Summary: This paper proposes an adaptive area-based traffic congestion control and management scheme based on fog computing and the internet of vehicles. It effectively guides traffic flow to alleviate congestion through cooperation in controlling traffic lights.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Telecommunications

Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System

Zhuoqun Xia, Yichao Zhang, Ke Gu, Xiong Li, Weijia Jia

Summary: This paper proposes a multi-dimensional and multi-angle electricity data aggregation scheme for a fog computing-based smart metering system. The scheme utilizes super-incremental sequence matrix and homomorphic Paillier cryptosystem to structure, encrypt, and aggregate electricity consumption data, ensuring privacy protection and meeting the requirements of fine-grained analysis.

IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING (2022)

No Data Available