Two Secure Privacy-Preserving Data Aggregation Schemes for IoT

Joint Authors

Pu, Yuwen
Luo, Jin
Hu, Chunqiang
Zhao, Ruifeng
Huang, Hongyu
Xiang, Tao
Yu, Jiguo

Source

Wireless Communications and Mobile Computing

Issue

Vol. 2019, Issue 2019 (31 Dec. 2019), pp.1-11, 11 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2019-09-17

Country of Publication

Egypt

No. of Pages

11

Main Subjects

Information Technology and Computer Science

Abstract EN

As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life.

However, pervasive security and privacy issues are also increasing in IoT.

For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application.

Therefore, it is very important for users to protect their private data.

In this paper, we present two efficient data aggregation schemes to preserve private data of customers.

In the first scheme, each IoT device slices its actual data randomly, keeps one piece to itself, and sends the remaining pieces to other devices which are in the same group via symmetric encryption.

Then, each IoT device adds the received pieces and the held piece together to get an immediate result, which is sent to the aggregator after the computation.

Moreover, homomorphic encryption and AES encryption are employed to guarantee secure communication.

In the second scheme, the slicing strategy is also employed.

Noise data are introduced to prevent the exchanged actual data of devices from disclosure when the devices blend data each other.

AES encryption is also employed to guarantee secure communication between devices and aggregator, compared to homomorphic encryption, which has significantly less computational cost.

Analysis shows that integrity and confidentiality of IoT devices’ data can be guaranteed in our schemes.

Both schemes can resist external attack, internal attack, colluding attack, and so on.

American Psychological Association (APA)

Pu, Yuwen& Luo, Jin& Hu, Chunqiang& Yu, Jiguo& Zhao, Ruifeng& Huang, Hongyu…[et al.]. 2019. Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wireless Communications and Mobile Computing،Vol. 2019, no. 2019, pp.1-11.
https://search.emarefa.net/detail/BIM-1212108

Modern Language Association (MLA)

Pu, Yuwen…[et al.]. Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wireless Communications and Mobile Computing No. 2019 (2019), pp.1-11.
https://search.emarefa.net/detail/BIM-1212108

American Medical Association (AMA)

Pu, Yuwen& Luo, Jin& Hu, Chunqiang& Yu, Jiguo& Zhao, Ruifeng& Huang, Hongyu…[et al.]. Two Secure Privacy-Preserving Data Aggregation Schemes for IoT. Wireless Communications and Mobile Computing. 2019. Vol. 2019, no. 2019, pp.1-11.
https://search.emarefa.net/detail/BIM-1212108

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1212108