{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:24:03Z","timestamp":1760149443729,"version":"build-2065373602"},"reference-count":40,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003213","name":"Beijing Municipal Education Commission","doi-asserted-by":"publisher","award":["KM202110005026","KM202210005023"],"award-info":[{"award-number":["KM202110005026","KM202210005023"]}],"id":[{"id":"10.13039\/501100003213","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The integrity of real-time data streams has not been solved for a long time and has gradually become a difficult problem in the field of data security. Most of the current data integrity verification schemes are constructed using cryptographic algorithms with complex computation, which cannot be directly applied to real-time stream computing systems. Aiming at the above issue, this paper adopts the Carter\u2013Wegman MAC method, pseudo-random function and symmetric cryptography mechanism to construct the Real-Time Data Integrity Verification scheme based on symmetric key in stream computing systems (RT-DIV), which converts a one-time MAC to a multiple-time MAC and retains the advantage of security performance. Then, a security analysis is given under the standard model. Finally, experiments and data analysis are conducted in a simulated environment, and the experimental results show that the RT-DIV scheme can effectively guarantee the integrity of real-time data streams. Furthermore, the RT-DIV scheme lays the foundation for the secure application of the stream computing system.<\/jats:p>","DOI":"10.3390\/sym15081541","type":"journal-article","created":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T10:21:39Z","timestamp":1691230899000},"page":"1541","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Efficient and Universal Real-Time Data Integrity Verification Scheme Based on Symmetric Key in Stream Computing System"],"prefix":"10.3390","volume":"15","author":[{"given":"Hongyuan","family":"Wang","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Wanting","family":"Zhu","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Baokai","family":"Zu","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]},{"given":"Yafang","family":"Li","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"ref_1","first-page":"164","article-title":"Research and Development of Provable Data Integrity in Cloud Storage","volume":"38","author":"Tan","year":"2015","journal-title":"J. Comput."},{"key":"ref_2","first-page":"839","article-title":"Big Data Stream Computing: Technologies and Instances","volume":"25","author":"Sun","year":"2014","journal-title":"J. Softw."},{"key":"ref_3","unstructured":"(2023, June 16). Storm Acker. Available online: https:\/\/www.cnblogs.com\/DreamDrive\/p\/6671194.html."},{"key":"ref_4","unstructured":"Ateniese, G., Burns, R., and Curtmola, R. (November, January 31). Provable Data Possession at Untrusted Stores. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Di, P.R., Mancini, L.V., and Tsudik, G. (2008, January 22\u201325). Scalable and Efficient Provable Data Possession. Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey.","DOI":"10.1145\/1460877.1460889"},{"key":"ref_6","first-page":"213","article-title":"Dynamic Provable Data Possession","volume":"17","author":"Erway","year":"2009","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2291","DOI":"10.1002\/sec.1489","article-title":"A Universal Method for Realizing Non-Repudiable Provable Data Possession in Cloud Storage","volume":"9","author":"Wang","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_8","unstructured":"Shacham, H., and Waters, B. (2008). Advances in Cryptology (ASIACRYPT), Springer."},{"key":"ref_9","unstructured":"Juels, A., and Kaliski, B.S. (October, January 2). Pors: Proofs of Retrievability for Large Files. Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Khan, O., Burns, R., and Ateniese, G. (2008, January 17\u201320). MR-PDP: Multiple-Replica Provable Data Possession. Proceedings of the 2008 the 28th International Conference on Distributed Computing Systems, Beijing, China.","DOI":"10.1109\/ICDCS.2008.68"},{"key":"ref_11","unstructured":"Wang, C., Wang, Q., Ren, K., and Lou, W. (2009, January 13\u201315). Ensuring Data Storage Security in Cloud Computing. Proceedings of the 2009 17th International Workshop on Quality of Service, Charleston, SC, USA."},{"key":"ref_12","unstructured":"Wang, H. (2019, January 17\u201320). An External Data Integrity Tracking and Verification System for Universal Stream Computing System Framework. Proceedings of the 2019 21st International Conference on Advanced Communication Technology (ICACT), PyeongChang, Republic of Korea."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Wang, H., Zu, B., Zhu, W., Li, Y., and Wu, J. (2022). On the Design and Implementation of the External Data Integrity Tracking and Verification System for Stream Computing System in IoT. Sensors, 22.","DOI":"10.3390\/s22176496"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Wang, H., and Hu, Z. (2010, January 4\u20138). Efficient Provable Data Possession for Hybrid Clouds. Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1866307.1866421"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1109\/TPDS.2012.66","article-title":"Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage","volume":"23","author":"Zhu","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSC.2011.51","article-title":"Dynamic Audit Services for Outsourced Storages in Clouds","volume":"6","author":"Zhu","year":"2013","journal-title":"IEEE Trans. Services Comput."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., and Lou, W.J. (2010, January 15\u201319). Privacy-Preserving public auditing for data storage security in cloud computing. Proceedings of the 2010 IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462173"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TC.2011.245","article-title":"Privacy-Preserving public auditing for secure cloud storage","volume":"62","author":"Wang","year":"2013","journal-title":"IEEE Trans. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/TCC.2018.2865554","article-title":"Outsourced Proofs of Retrievability","volume":"9","author":"Armknecht","year":"2014","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_20","unstructured":"Hanser, C., and Slamanig, D. (2013, January 29\u201331). Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves. Proceedings of the 2013 International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland."},{"key":"ref_21","first-page":"97","article-title":"An Efficient Provable Data Possession based on Elliptic Curves in Cloud Storage","volume":"8","author":"Wang","year":"2014","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Tate, S.R., Vishwanathan, R., and Everhart, L. (2013, January 18\u201320). Multi-user Dynamic Proofs of Data Possession Using Trusted Hardware. Proceedings of the Third ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA.","DOI":"10.1145\/2435349.2435400"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/TCC.2014.2299807","article-title":"Oruta: Privacy-Preserving Public Auditing for Shared Data in The Cloud","volume":"2","author":"Wang","year":"2014","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","article-title":"Panda: Public Auditing for Shared Data with Efficient User Revocation in The Cloud","volume":"8","author":"Wang","year":"2015","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"75476","DOI":"10.1109\/ACCESS.2019.2917919","article-title":"Efficient Group Proof of Storage with Malicious-Member Distinction and Revocation","volume":"7","author":"Zhu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_26","first-page":"1417","article-title":"Group Provable Data Possession with Deduplication in Cloud Storage","volume":"27","author":"Wang","year":"2016","journal-title":"J. Softw."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","article-title":"Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems","volume":"16","author":"Li","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_28","first-page":"289","article-title":"Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as A Service","volume":"13","author":"Xu","year":"2019","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.future.2019.01.009","article-title":"Outsourced Dynamic Provable Data Possession with Batch Update for Secure Cloud Storage","volume":"95","author":"Guo","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1813","DOI":"10.1109\/TSC.2020.3022812","article-title":"Dynamic Proof of Data Possession and Replication with Tree Sharing and Batch Verification in the Cloud","volume":"15","author":"Guo","year":"2020","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_31","first-page":"37","article-title":"Cloud-edge-device Collaborative Integrity Verification Scheme Based on Chameleon Authentication Tree for Streaming Data","volume":"1","author":"Li","year":"2022","journal-title":"Netinfo. Secur."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1177\/15501329221092940","article-title":"Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems","volume":"18","author":"Zhou","year":"2022","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2226","DOI":"10.1109\/TSC.2020.3041324","article-title":"Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme with Public Integrity Verification","volume":"15","author":"Wang","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_34","first-page":"17","article-title":"Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices","volume":"73","author":"Qi","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","article-title":"Universal Classes of Hash Functions","volume":"18","author":"Carter","year":"1979","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_36","first-page":"501","article-title":"Functional Signatures and Pseudorandom Functions","volume":"Volume 8383","author":"Boyle","year":"2014","journal-title":"PKC 2014: Public-Key Cryptography"},{"key":"ref_37","unstructured":"Stinson, D.R. (1995). Cryptography Theory and Practice, CRC Press."},{"key":"ref_38","unstructured":"(2023, June 16). Kafka. Available online: https:\/\/kafka.apache.org\/."},{"key":"ref_39","unstructured":"(2023, June 16). Storm. Available online: https:\/\/storm.apache.org\/."},{"key":"ref_40","unstructured":"(2023, June 16). Openssl. Available online: https:\/\/www.openssl.org\/."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/8\/1541\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:26:08Z","timestamp":1760127968000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/15\/8\/1541"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":40,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2023,8]]}},"alternative-id":["sym15081541"],"URL":"https:\/\/doi.org\/10.3390\/sym15081541","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2023,8,4]]}}}