Fig 1.
The DIA system model.
Table 1.
Advantages and disadvantages of existing methods.
Table 2.
Notations used in the design of TOD.
Table 3.
Computational complexities of the Paillier, RSA and LiSHA schemes.
Fig 2.
Four types of tags, their relationship and inputs and schemes used to generate them.
Fig 3.
The functional components of the TOD method.
Table 4.
Math equations for the generations of different tags.
Table 5.
Math equations for tag verifications (private and public).
Table 6.
Notations used in the security analysis.
Fig 4.
Costs of brute-force attack on IDTag versus the value of m.
Fig 5.
BFADBTagTag cost: Scenarios-1 vs Scenarios-2 (GF(2128), bits and LMappingSecretKey = 160 bits).
Fig 6.
BFADBTagTag cost: Scenarios-2 vs Scenarios-3 (LMappingSecretKey = 160 bits).
Fig 7.
BFASTagPriVer vs the length of tag (m) and the total number of IDTags for a data file (d).
Fig 8.
PPubVer vs. the bit-lengths of DBTag, En_IDTag and DBTagTag.
Fig 9.
Cost of BFAAECH vs. the bit-lengths of the element in G1 and p.
Fig 10.
Level of efforts on brute-force attack on a LiSHE key vs. the key length and the key space.
Fig 11.
Given C = 50 blocks: Selection space (number of possible combinations) vs. file size (number of data blocks).
Table 7.
Basic operations: Symbols and meanings.
Fig 12.
TOD method vs the OTfMB and OTfSB approaches: The number of tags generated against data redundancy percentage, K = 1000, total number of blocks in a data file, 4 Data Blocks are used in generating one tag in OTfMB approach.
Table 8.
Tag generation and verification costs.
Table 9.
Comparing TOD method with existing tagging methods against the specified requirements.
Fig 13.
The required time of encryption vs. data redundancy percentage.
Table 10.
Comparing the TOD method and the related works: The required time of tag generation (in seconds).
Fig 14.
Tag generation cost vs data blocks number.
Table 11.
TOD method vs. BLS based tagging method: The required time (in seconds) of private and public tag verification.
Fig 15.
Public tag verification cost: Individual vs batch verifications.
Fig 16.
Batch verification cost: Private vs public.
Table 12.
TOD method vs the related work: The tag size generated (in bytes).