Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement

Jun Wu, Mianxiong Dong*, Kaoru Ota, Lin Liang, Zhenyu Zhou

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

25 Citations (Scopus)

Abstract

In Social Internet of Things (SIoT) scenarios the data fragments should be stored in a number of sensor nodes, and for the self-sustaining purposes, the storage should possess the ability to repair the lost fragment and to protect data secrecy. For achieving the above goals, we propose employment of the regenerating codes and symmetric-key encryption with a Blom based key management. Particularly note that the encoded blocks stored in the i-th node and originating from the j-th node are encrypted by symmetric key Kij. A common and desirable feature regarding the considered regenerating codes and Blom’s key management scheme is that the both are based on employment of Vandermonde matrix, and accordingly yield a unified implementation framework. The security analysis and repairing probability simulation results verify the security and repairing capability of the proposed scheme. Moreover, preliminary consideration of the implementation complexity of the proposed scheme implies that the energy costs in the both cases, regarding the scenarios with and without the faults, are lower in comparison with related SIoT schemes and accordingly suitable for applications related to resources-constrained SIoT. Resource consumption evaluations show the feasibility of the proposed scheme for SIoT. To our best knowledge, this paper is the first to realize the secure sensor distributed storage for SioT with repairing capability.

Original languageEnglish
Pages (from-to)1133-1142
Number of pages10
JournalPeer-to-Peer Networking and Applications
Volume8
Issue number6
DOIs
Publication statusPublished - 2015 Nov 21
Externally publishedYes

Keywords

  • Distributed storage
  • Security
  • Sensor networks
  • Social Internet of Things

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Securing distributed storage for Social Internet of Things using regenerating code and Blom key agreement'. Together they form a unique fingerprint.

Cite this