JOURNAL ARTICLE

An Efficient Certificate-Based Data Integrity Auditing Protocol for Cloud-Assisted WBANs

Yumei LiFutai Zhang

Year: 2021 Journal:   IEEE Internet of Things Journal Vol: 9 (13)Pages: 11513-11523   Publisher: Institute of Electrical and Electronics Engineers

Abstract

With the evolution of wireless body area networks (WBANs), wearable equipment will improve the human healthcare service. However, the medical data generated in WBANs increase dramatically with time, and the massive data cause the storage burden. With the help of cloud computing, the cloud service provider (CSP) can assist data owners in storing these data collected by sensors. By keeping their data in the CSP, the data integrity and authenticity is a big concern of data owners. To date, many data integrity auditing protocols have been proposed to address this issue. Most of them rely on traditional public-key mechanism, or identity-based cryptography (IBC), or certificateless cryptography (CLC). However, they suffer from the heavy cost of certificate management, key escrow, or the requirement of a secret channel for each user, respectively. To solve these drawbacks, we propose an efficient certificate-based data integrity auditing protocol for cloud-assisted WBANs. In our protocol, the computation cost in tag generation for a data block is fixed, and is independent of the size of the data block. We prove our protocol is secure in the random oracle model (ROM) and use the Java pairing-based cryptography library (JPBC) to implement the protocol. The experimental results show that our protocol is computationally efficient and practical.

Keywords:
Computer science Key escrow Cloud computing Data integrity Computer security Computer network Cryptography Public-key cryptography Encryption Operating system

Metrics

32
Cited By
6.11
FWCI (Field Weighted Citation Impact)
30
Refs
0.96
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

An efficient data integrity auditing protocol for cloud computing

Neenu GargSeema BawaNeeraj Kumar

Journal:   Future Generation Computer Systems Year: 2020 Vol: 109 Pages: 306-316
JOURNAL ARTICLE

Efficient edge-based data integrity auditing in cloud storage

Hao YanYan WangGuoxiu LiuJuan Zhao

Journal:   Future Generation Computer Systems Year: 2025 Vol: 172 Pages: 107899-107899
JOURNAL ARTICLE

Security-Enhanced Certificate-Based Remote Data Integrity Batch Auditing for Cloud-IoT

Wenhao WangYinxia SunYumei Li

Journal:   Security and Communication Networks Year: 2022 Vol: 2022 Pages: 1-17
© 2026 ScienceGate Book Chapters — All rights reserved.