TPTVer: A trusted third party based trusted verifier for multi-layered outsourced big data system in cloud environment

2018 ◽  
Vol 15 (2) ◽  
pp. 122-137 ◽  
Author(s):  
Jing Zhan ◽  
Xudong Fan ◽  
Lei Cai ◽  
Yaqi Gao ◽  
Junxi Zhuang
2017 ◽  
Vol 5 (4) ◽  
pp. 642-655 ◽  
Author(s):  
Mazhar Ali ◽  
Saif U. R. Malik ◽  
Samee U. Khan

Author(s):  
Songzhu Mei ◽  
Cong Liu ◽  
Yong Cheng ◽  
Jiangjiang Wu ◽  
Zhiying Wang

Author(s):  
V E Sathishkumar ◽  
Wesam Atef Hatamleh ◽  
Abeer Ali Alnuaim ◽  
Mohamed Abdelhady ◽  
B. Venkatesh ◽  
...  

2016 ◽  
Vol 26 (2) ◽  
pp. 170-184 ◽  
Author(s):  
Wei Guo ◽  
Yun Fang ◽  
Weimei Pan ◽  
Dekun Li

Purpose This paper aims to present a case wherein a public archive intervenes in maintaining and preserving digital records (including underlying technological infrastructure) created by a private company to protect the trustworthiness of records, thereby helping the company to discharge their accountability. Design/methodology/approach This paper details the intervention of Tianjin Municipal Archives in the management of the records of Tianjin Otis Elevator Co., Ltd, the technical infrastructure that enables and supports such configuration, the issues encountered and the theoretical implications of this case. Findings This case suggests that not only does the concept of archives as a trusted third party remain relevant in the changing technological environment but also, in certain cases (e.g. wherein the supplier of evidentiary documents holds a monopoly over an industry), archives are becoming increasingly critical in maintaining the reliability and authenticity of digital records in the cloud environment. Research limitations/implications Given the challenges raised by the emerging cloud environment, it is vital to develop a renewed understanding of the concept of archives as a trusted third party, the relationship between archives and commercial third party services and the relationship between public archives and private records. Furthermore, this case identifies the need to re-examine archival methodologies to protect the authenticity of structured data. Originality/value This case exemplifies how archives can help private organizations address issues related to guaranteeing and demonstrating the evidential nature of digital records and provides empirical evidence for archives being conceptualized as a trusted third party in maintaining and preserving digital records.


Information ◽  
2021 ◽  
Vol 12 (9) ◽  
pp. 340
Author(s):  
Ping Zhang ◽  
Huanhuan Chi ◽  
Jiechang Wang ◽  
Youlin Shang

Compared with the traditional system, cloud storage users have no direct control over their data, so users are most concerned about security for their data stored in the cloud. One security requirement is to resolve any threats from semi-trusted key third party managers. The proposed data security for cloud environment with semi-trusted third party (DaSCE) protocol has solved the security threat of key managers to some extent but has not achieved positive results. Based on this, this paper proposes a semi-trusted third-party data security protocol (ADSS), which can effectively remove this security threat by adding time stamp and blind factor to prevent key managers and intermediaries from intercepting and decrypting user data. Moreover, the ADSS protocol is proved to provide indistinguishable security under a chosen ciphertext attack. Finally, the performance evaluation and simulation of the protocol show that the ADSS security is greater than DaSCE, and the amount of time needed is lower than DaSCE.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Houshyar Honar Pajooh ◽  
Mohammed A. Rashid ◽  
Fakhrul Alam ◽  
Serge Demidenko

AbstractThe diversity and sheer increase in the number of connected Internet of Things (IoT) devices have brought significant concerns associated with storing and protecting a large volume of IoT data. Storage volume requirements and computational costs are continuously rising in the conventional cloud-centric IoT structures. Besides, dependencies of the centralized server solution impose significant trust issues and make it vulnerable to security risks. In this paper, a layer-based distributed data storage design and implementation of a blockchain-enabled large-scale IoT system are proposed. It has been developed to mitigate the above-mentioned challenges by using the Hyperledger Fabric (HLF) platform for distributed ledger solutions. The need for a centralized server and a third-party auditor was eliminated by leveraging HLF peers performing transaction verifications and records audits in a big data system with the help of blockchain technology. The HLF blockchain facilitates storing the lightweight verification tags on the blockchain ledger. In contrast, the actual metadata are stored in the off-chain big data system to reduce the communication overheads and enhance data integrity. Additionally, a prototype has been implemented on embedded hardware showing the feasibility of deploying the proposed solution in IoT edge computing and big data ecosystems. Finally, experiments have been conducted to evaluate the performance of the proposed scheme in terms of its throughput, latency, communication, and computation costs. The obtained results have indicated the feasibility of the proposed solution to retrieve and store the provenance of large-scale IoT data within the Big Data ecosystem using the HLF blockchain. The experimental results show the throughput of about 600 transactions, 500 ms average response time, about 2–3% of the CPU consumption at the peer process and approximately 10–20% at the client node. The minimum latency remained below 1 s however, there is an increase in the maximum latency when the sending rate reached around 200 transactions per second (TPS).


Sign in / Sign up

Export Citation Format

Share Document