| In the big data environment,people are increasingly concerned about data security.Especially in the Internet of Things,it integrates multiple intelligent technologies such as smart cities,smart homes,smart healthcare,smart grids,and smart industries.Furthermore,the privacy protection of sensitive information is receiving more attentions.The devices and edges of the Internet of Things(IoT)are working together to expand the functional range of the IoT and provide users with a more convenient and efficient life.How to achieve secure data sharing in the IoT systems has become a hot topic in recent years.Furthermore,attribute-based encryption(ABE)technology is currently widely used,and accordingly fine-grained access control of data in the IoT systems can be achieved due to its one-to-many encryption method.However,in the case of limited resources,the complex computing of the ABE is relatively difficult to achieve for general intelligent devices.Considering this,the emergence of edge computing alleviates this dilemma.The edge server(ES)is responsible for calculating all the heavy modular exponentiation or pairing operations and uploading a large amount of encrypted data to the cloud.The general scheme uses the ES to perform outsourced encryption,and almost all consider the ES to be honest and reliable.However,in reality,both the ES and the cloud may be subjected to man-made attacks and destruction.Further,we need to check the correctness of data in the ES and the integrity of cloud data respectively.Therefore,through research on privacy protection in cloud-edge based Internet of Things systems,this article addresses the following two issues:1)To verify the integrity of the cloud data and the correctness of encrypted data from edge servers,this paper designs a lightweight dual auditing scheme based on access control.The first step is to use Proof of Retrievability(PoR)to check the integrity of cloud data,and the second step is to reconstruct an effective zero-knowledge proof(ZKP)to verify the correctness of the ES data in a lightweight way.To prevent the collusion attacks,smart contracts are responsible for verifying the legitimacy of data users.Only the legitimate data user can decrypt the ciphertext.Experiments such as simulating communication overhead show that our multiple audit scheme is relatively safe and efficient.2)Based on Question 1,further research is conducted on how to complete dynamic data updates while verifying the correctness of data in the ES.Our scheme utilizes a combination of the Counting Bloom Filter chained hash-linked lists(CBCH)and fabric blockchain technology to detect the correctness of data in the ES.At the same time,we utilize the dynamic deletion feature of the CBCH to construct a mechanism that supports dynamic updates and auditing.Through simulation experiments simulating the fabric blockchain,we calculated the latency and throughput of the key step.By testing the impact of different parameters on the false positive probability of the CBCH,the most appropriate parameter for the CBCH is selected.By studying the communication cost and computational cost of the scheme,experiments show that our scheme is practical and efficient.Through security analysis and simulation experiments,it has been proved that the specific solutions we proposed based on the above two issues are safe and efficient. |