An Authentication Algorithm for Sets of Spatial Data Objects
计算机科学
认证(法律)
算法
计算机安全
作者
Wenhao Li,Chengliang Wang,Xiao‐Bing Hu,Hongwen Zhou,Hang Zeng,Y. Wang
出处
期刊:Security and Privacy in Communication Networks日期:2024-10-12卷期号:: 461-475
标识
DOI:10.1007/978-3-031-64948-6_23
摘要
Data play a pivotal role in supporting both national economic development and scientific research, and ensuring their authenticity and integrity has become a key concern for scholars. To this end, various authentication algorithms, such as digital signatures, message authentication codes, and hash functions have been proposed. Many of these algorithms treat data as a unity, which can lead to different authentication results if the elements order of the data changes. However, spatial data object is a point set that lack a predetermined order, varying data acquisition and management systems used by operators may result in the same data appearing in different orders, and these approaches are no longer effective. Therefore, this study proposes an authentication algorithm for spatial data objects based on set nature. We consider spatial data objects as a data set, and each element in set will be transferred into a string data. Then, we use hash function SHA to compute each string data, and perform XOR operation to obtain message M. Finally, the final hash code is obtained by computing M using the SHA. Through tampering experiments, it has been shown this algorithm has the property of ignoring the data order, good sensitivity, diffusion, confusion, and security. This algorithm can overcome the limitations that rely on data order, contribute to improving the authentication process for spatial data objects, and enhance data integrity and reliability in various applications.