Two Secure Privacy-Preserving Data Aggregation Schemes for IoT

المؤلفون المشاركون

Pu, Yuwen
Luo, Jin
Hu, Chunqiang
Zhao, Ruifeng
Huang, Hongyu
Xiang, Tao
Yu, Jiguo

المصدر

Wireless Communications and Mobile Computing

العدد

المجلد 2019، العدد 2019 (31 ديسمبر/كانون الأول 2019)، ص ص. 1-11، 11ص.

الناشر

Hindawi Publishing Corporation

تاريخ النشر

2019-09-17

دولة النشر

مصر

عدد الصفحات

11

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الملخص EN

As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life.

However, pervasive security and privacy issues are also increasing in IoT.

For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application.

Therefore, it is very important for users to protect their private data.

In this paper, we present two efficient data aggregation schemes to preserve private data of customers.

In the first scheme, each IoT device slices its actual data randomly, keeps one piece to itself, and sends the remaining pieces to other devices which are in the same group via symmetric encryption.

Then, each IoT device adds the received pieces and the held piece together to get an immediate result, which is sent to the aggregator after the computation.

Moreover, homomorphic encryption and AES encryption are employed to guarantee secure communication.

In the second scheme, the slicing strategy is also employed.

Noise data are introduced to prevent the exchanged actual data of devices from disclosure when the devices blend data each other.

AES encryption is also employed to guarantee secure communication between devices and aggregator, compared to homomorphic encryption, which has significantly less computational cost.

Analysis shows that integrity and confidentiality of IoT devices’ data can be guaranteed in our schemes.

Both schemes can resist external attack, internal attack, colluding attack, and so on.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Pu, Yuwen& Luo, Jin& Hu, Chunqiang& Yu, Jiguo& Zhao, Ruifeng& Huang, Hongyu…[et al.]. 2019. Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wireless Communications and Mobile Computing،Vol. 2019, no. 2019, pp.1-11.
https://search.emarefa.net/detail/BIM-1212108

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Pu, Yuwen…[et al.]. Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wireless Communications and Mobile Computing No. 2019 (2019), pp.1-11.
https://search.emarefa.net/detail/BIM-1212108

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Pu, Yuwen& Luo, Jin& Hu, Chunqiang& Yu, Jiguo& Zhao, Ruifeng& Huang, Hongyu…[et al.]. Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wireless Communications and Mobile Computing. 2019. Vol. 2019, no. 2019, pp.1-11.
https://search.emarefa.net/detail/BIM-1212108

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references

رقم السجل

BIM-1212108