{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T09:21:57Z","timestamp":1775726517475,"version":"3.50.1"},"reference-count":38,"publisher":"MDPI AG","issue":"17","license":[{"start":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T00:00:00Z","timestamp":1661731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"General Project of Science and Technology of Beijing Municipal Education Commission","award":["KM202110005026"],"award-info":[{"award-number":["KM202110005026"]}]},{"name":"General Project of Science and Technology of Beijing Municipal Education Commission","award":["KM202210005023"],"award-info":[{"award-number":["KM202210005023"]}]},{"name":"General Project of Science and Technology of Beijing Municipal Education Commission","award":["4214062"],"award-info":[{"award-number":["4214062"]}]},{"name":"General Project of Science and Technology of Beijing Municipal Education Commission","award":["62006009"],"award-info":[{"award-number":["62006009"]}]},{"name":"General Project of Science and Technology of Beijing Municipal Education Commission","award":["KM202210011012"],"award-info":[{"award-number":["KM202210011012"]}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["KM202110005026"],"award-info":[{"award-number":["KM202110005026"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["KM202210005023"],"award-info":[{"award-number":["KM202210005023"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["4214062"],"award-info":[{"award-number":["4214062"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["62006009"],"award-info":[{"award-number":["62006009"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Beijing Natural Science Foundation","doi-asserted-by":"publisher","award":["KM202210011012"],"award-info":[{"award-number":["KM202210011012"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["KM202110005026"],"award-info":[{"award-number":["KM202110005026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["KM202210005023"],"award-info":[{"award-number":["KM202210005023"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["4214062"],"award-info":[{"award-number":["4214062"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62006009"],"award-info":[{"award-number":["62006009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["KM202210011012"],"award-info":[{"award-number":["KM202210011012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program of Beijing Municipal Education Commission","award":["KM202110005026"],"award-info":[{"award-number":["KM202110005026"]}]},{"name":"Program of Beijing Municipal Education Commission","award":["KM202210005023"],"award-info":[{"award-number":["KM202210005023"]}]},{"name":"Program of Beijing Municipal Education Commission","award":["4214062"],"award-info":[{"award-number":["4214062"]}]},{"name":"Program of Beijing Municipal Education Commission","award":["62006009"],"award-info":[{"award-number":["62006009"]}]},{"name":"Program of Beijing Municipal Education Commission","award":["KM202210011012"],"award-info":[{"award-number":["KM202210011012"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Data integrity is a prerequisite for ensuring data availability of IoT data and has received extensive attention in the field of IoT big data security. Stream computing systems are widely used in the field of IoT for real-time data acquisition and computing. However, the real-time, volatility, suddenness, and disorder of stream data make data integrity verification difficult. According to the survey, there is no mature and universal solution. To solve this issue, we constructed a data integrity verification algorithm scheme of the stream computing system (S-DIV) by utilizing homomorphic message authentication code and pseudo-random function security assumption. Furthermore, based on S-DIV, an external data integrity tracking and verification system is constructed to track and analyze the message data stream in real time. By verifying the data integrity of message during the whole life cycle, the problem of data corruption or data loss can be found in time, and error alarm and message recovery can be actively implemented. Then, we conduct the formal security analysis under the standard model and, finally, implement the S-DIV scheme in simulation environment. Experimental results show that the scheme can guarantee data integrity in an acceptable time without affecting the efficiency of the original system.<\/jats:p>","DOI":"10.3390\/s22176496","type":"journal-article","created":{"date-parts":[[2022,8,30]],"date-time":"2022-08-30T01:37:55Z","timestamp":1661823475000},"page":"6496","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Design and Implementation of the External Data Integrity Tracking and Verification System for Stream Computing System in IoT"],"prefix":"10.3390","volume":"22","author":[{"given":"Hongyuan","family":"Wang","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Baokai","family":"Zu","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Wanting","family":"Zhu","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Yafang","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Jingbang","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beijing Technology and Business University, Beijing 100048, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,8,29]]},"reference":[{"key":"ref_1","first-page":"164","article-title":"Research and Development of Provable Data Integrity in Cloud Storage","volume":"38","author":"Tan","year":"2015","journal-title":"J. Comput."},{"key":"ref_2","first-page":"839","article-title":"Big Data Stream Computing: Technologies and Instances","volume":"25","author":"Sun","year":"2014","journal-title":"Ruan Jian Xue Bao J. Softw."},{"key":"ref_3","unstructured":"(2022, August 28). Storm Acker. Available online: https:\/\/www.cnblogs.com\/DreamDrive\/p\/6671194.html."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., and Curtmola, R. (2007, January 1). Provable Data Possession at Untrusted Stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/1315245.1315318"},{"key":"ref_5","first-page":"213","article-title":"Dynamic Provable Data Possession","volume":"17","author":"Erway","year":"2009","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"2291","DOI":"10.1002\/sec.1489","article-title":"A Universal Method for Realizing Non-Repudiable Provable Data Possession in Cloud Storage","volume":"9","author":"Wang","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/978-981-10-7200-0_31","article-title":"Improved key generation scheme of RSA (IKGSR) algorithm based on offline storage for cloud","volume":"645","author":"Chinnasamy","year":"2018","journal-title":"Adv. Big Data Cloud Comput."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Di, P.R., Mancini, L.V., and Tsudik, G. (2008, January 22\u201325). Scalable and Efficient Provable Data Possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey.","DOI":"10.1145\/1460877.1460889"},{"key":"ref_9","unstructured":"Juels, A., and Kaliski, B.S. (October, January 2). Pors: Proofs of Retrievability for Large Files. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-88313-5_15","article-title":"Remote Integrity Check with Dishonest Storage Server","volume":"Volume 5283","author":"Chang","year":"2008","journal-title":"Computer Security\u2014ESORICS 2008"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","article-title":"Compact Proofs of Retrievability","volume":"26","author":"Shacham","year":"2008","journal-title":"J. Cryptol."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Khan, O., Burns, R., and Ateniese, G. (2008, January 17\u201320). MR-PDP: Multiple-Replica Provable Data Possession. Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems, Beijing, China.","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref_13","unstructured":"Wang, C., Wang, Q., Ren, K., and Lou, W. (2009, January 13\u201315). Ensuring Data Storage Security in Cloud Computing. Proceedings of the 2009 17th International Workshop on Quality of Service, Charleston, SC, USA."},{"key":"ref_14","unstructured":"Hanser, C., and Slamanig, D. (2013, January 29\u201331). Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves. Proceedings of the 2013 International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland."},{"key":"ref_15","first-page":"97","article-title":"An Efficient Provable Data Possession based on Elliptic Curves in Cloud Storage","volume":"8","author":"Wang","year":"2014","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","article-title":"Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage","volume":"23","author":"Zhu","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., and Lou, W.J. (2010, January 15\u201319). Privacy-Preserving public auditing for data storage security in cloud computing. Proceedings of the 2010 IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","article-title":"Privacy-Preserving public auditing for secure cloud storage","volume":"62","author":"Wang","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/TCC.2018.2865554","article-title":"Outsourced Proofs of Retrievability","volume":"9","author":"Armknecht","year":"2014","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Tate, S.R., Vishwanathan, R., and Everhart, L. (2013, January 18\u201320). Multi-user Dynamic Proofs of Data Possession Using Trusted Hardware. Proceedings of the Third ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA.","DOI":"10.1145\/2435349.2435400"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","article-title":"Oruta: Privacy-Preserving Public Auditing for Shared Data in The Cloud","volume":"2","author":"Wang","year":"2014","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","article-title":"Panda: Public Auditing for Shared Data with Efficient User Revocation in The Cloud","volume":"8","author":"Wang","year":"2015","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_23","first-page":"1417","article-title":"Group Provable Data Possession with Deduplication in Cloud Storage","volume":"27","author":"Wang","year":"2016","journal-title":"Ruan Jian Xue Bao J. Softw."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"75476","DOI":"10.1109\/ACCESS.2019.2917919","article-title":"Efficient Group Proof of Storage with Malicious-Member Distinction and Revocation","volume":"7","author":"Zhu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Chen, B., Curtmola, R., Ateniese, G., and Burns, R. (2010, January 8). Remote Data Checking for Network Coding-based Distributed Stroage Systems. Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, Chicago, IL, USA.","DOI":"10.1145\/1866835.1866842"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Halevi, S., Harnik, D., Pinkas, B., and Shulman, A. (2011, January 17\u201321). Proofs of Ownership in Remote Storage Systems. Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/2046707.2046765"},{"key":"ref_27","unstructured":"Cao, N., Yu, S., Yang, Z., Lou, W., and Hou, Y.T. (2012, January 25\u201330). LT Codes-based Secure and Reliable Cloud Storage Service. Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zheng, Q., and Xu, S. (2012, January 7\u20139). Secure and Efficient Proof of Storage with Deduplication. Proceedings of the Second ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA.","DOI":"10.1145\/2133601.2133603"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","article-title":"Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems","volume":"16","author":"Li","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.future.2019.01.009","article-title":"Outsourced Dynamic Provable Data Possession with Batch Update for Secure Cloud Storage","volume":"95","author":"Guo","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1813","DOI":"10.1109\/TSC.2020.3022812","article-title":"Dynamic Proof of Data Possession and Replication with Tree Sharing and Batch Verification in the Cloud","volume":"15","author":"Guo","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Yaling, Z., and Li, S. (2020, January 18\u201320). Dynamic Flexible Multiple-Replica Provable Data Possession in Cloud. Proceedings of the 2020 17th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China.","DOI":"10.1109\/ICCWAMTIP51612.2020.9317378"},{"key":"ref_33","first-page":"289","article-title":"Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as A Service","volume":"13","author":"Xu","year":"2019","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_34","first-page":"37","article-title":"Cloud-edge-device Collaborative Integrity Verification Scheme Based on Chameleon Authentication Tree for Streaming Data","volume":"1","author":"Li","year":"2022","journal-title":"Netinfo Secur."},{"key":"ref_35","unstructured":"Wang, H. (2019, January 17\u201320). An External Data Integrity Tracking and Verification System for Universal Stream Computing System Framework. Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea."},{"key":"ref_36","first-page":"292","article-title":"Homomorphic MACs: MAC-Based Integrity for Network Coding","volume":"Volume 157","author":"Agrawal","year":"2009","journal-title":"ACNS 2009: Applied Cryptography and Network Security"},{"key":"ref_37","first-page":"501","article-title":"Functional Signatures and Pseudorandom Functions","volume":"Volume 8383","author":"Boyle","year":"2014","journal-title":"PKC 2014: Public-Key Cryptography"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s00145-002-0116-x","article-title":"A Note on Negligible Functions","volume":"15","author":"Bellare","year":"2002","journal-title":"J. Cryptol."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/17\/6496\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:19:45Z","timestamp":1760141985000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/17\/6496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,29]]},"references-count":38,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["s22176496"],"URL":"https:\/\/doi.org\/10.3390\/s22176496","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,29]]}}}