4.8 Article

An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 1, 页码 589-600

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3083136

关键词

Encryption; Security; Data aggregation; Internet of Things; Sensors; Edge computing; Cryptography; Data aggregation; edge computing; Internet of Things (IoT); privacy preserving

资金

  1. National Key Research and Development Program of China [2018YFC1604000]
  2. Ministry of Education of China [2020KJ010301]
  3. National Natural Science Foundation of China [61932016, 61972294]
  4. Special Project on Science and Technology Program of Hubei Province [2020AEA013]
  5. Natural Science Foundation of Hubei Province [2020CFA052]
  6. Wuhan Municipal Science and Technology Project [2020010601012187]
  7. King Saud University, Riyadh, Saudi Arabia [RSP-2020/12]

向作者/读者索取更多资源

This article proposes an efficient privacy-preserving multidimensional data aggregation scheme called PMDA for IoT. Through the use of homomorphic encryption method and signature mechanism, the scheme ensures nonrepudiation of device data and verification efficiency at edge nodes.
Internet of Things (IoT) enables terminal devices connecting with the Internet and provides various intelligent applications by analyzing devices data. As a typical IoT technique, edge computing provides a three-tier architecture to reduce communications and improve efficiency. Specifically, edge nodes are responsible for collecting and aggregating device data, and then send processed results to the cloud for subsequent analysis. However, the data aggregation function will compromise the privacy of device data. In this article, we proposed an efficient privacy-preserving multidimensional data aggregation scheme for IoT, called PMDA. The scheme uses the Chinese remainder theorem to design a homomorphic encryption method that encryptes a multiple-dimensional small integer vector into one ciphertext and keeps linear homomorphic properties per dimension. Combining with the signature mechanism and the batch verification method, the scheme guarantees nonrepudiation of device data and enhance verification efficiency at edge nodes. Through theoretical analysis, we demonstrate that the proposed scheme can achieve correctness, privacy, authentication, and integrity. After performance evaluation, we demonstrate that our scheme is superior to other schemes in terms of computation and communication costs. In particular, as the message dimension increases, our scheme computation costs almost a tenth of others at the 80-bits security level.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据