4.8 Article

An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 1, Pages 589-600

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3083136

Keywords

Encryption; Security; Data aggregation; Internet of Things; Sensors; Edge computing; Cryptography; Data aggregation; edge computing; Internet of Things (IoT); privacy preserving

Funding

  1. National Key Research and Development Program of China [2018YFC1604000]
  2. Ministry of Education of China [2020KJ010301]
  3. National Natural Science Foundation of China [61932016, 61972294]
  4. Special Project on Science and Technology Program of Hubei Province [2020AEA013]
  5. Natural Science Foundation of Hubei Province [2020CFA052]
  6. Wuhan Municipal Science and Technology Project [2020010601012187]
  7. King Saud University, Riyadh, Saudi Arabia [RSP-2020/12]

Ask authors/readers for more resources

This article proposes an efficient privacy-preserving multidimensional data aggregation scheme called PMDA for IoT. Through the use of homomorphic encryption method and signature mechanism, the scheme ensures nonrepudiation of device data and verification efficiency at edge nodes.
Internet of Things (IoT) enables terminal devices connecting with the Internet and provides various intelligent applications by analyzing devices data. As a typical IoT technique, edge computing provides a three-tier architecture to reduce communications and improve efficiency. Specifically, edge nodes are responsible for collecting and aggregating device data, and then send processed results to the cloud for subsequent analysis. However, the data aggregation function will compromise the privacy of device data. In this article, we proposed an efficient privacy-preserving multidimensional data aggregation scheme for IoT, called PMDA. The scheme uses the Chinese remainder theorem to design a homomorphic encryption method that encryptes a multiple-dimensional small integer vector into one ciphertext and keeps linear homomorphic properties per dimension. Combining with the signature mechanism and the batch verification method, the scheme guarantees nonrepudiation of device data and enhance verification efficiency at edge nodes. Through theoretical analysis, we demonstrate that the proposed scheme can achieve correctness, privacy, authentication, and integrity. After performance evaluation, we demonstrate that our scheme is superior to other schemes in terms of computation and communication costs. In particular, as the message dimension increases, our scheme computation costs almost a tenth of others at the 80-bits security level.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available