期刊
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
卷 19, 期 5, 页码 3401-3416出版社
IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2021.3095933
关键词
Internet of Things; Cryptography; Encryption; Cloud computing; Servers; Privacy; Edge computing; Fog-enhanced Internet of Things (IoT); order-revealing encryption; encrypted geographic range query
类别
资金
- Fundamental Research Funds for the Central Universities [310421108]
- Research Grants Council of Hong Kong under GRF Project [CityU 11213920, 11217819, 11217620]
- Innovation and Technology Commission of Hong Kong under ITF Project [ITS/145/19]
- National Natural Science Foundation of China [61572412]
- Research Grants Council of Hong Kong under RIF Project [R6021-20]
This article presents a geographic range-match scheme for fog-enhanced services that securely collects sensed data while protecting the location privacy of IoT devices. By formulating the problem as range-based pattern matching and designing security schemes in the ciphertext domain, efficient range queries can be performed with reduced accessible information.
The explosive growth of the Internet of Things (IoT) is pushing forward the paradigm of fog computing services today. An important service for most fog-enhanced applications is geographic range-match, which means the fog-nodes can accurately collect sensed data from IoT devices based on their location distances. However, due to the increasing attacking surfaces, outsourcing range query operations to untrusted fog-nodes inevitably raises new privacy concerns about query content and device location exposure. In this article, we devise a new geographic range-match scheme for fog-enhanced services, which allows fog-nodes to securely collect range-based sensed data while protecting the location privacy of IoT devices. Our main idea is to formulate the problem of encrypted geographic queries as range-based pattern matching and carefully craft security schemes to enable efficient range queries in the ciphertext domain. The proposed range-match scheme is provably secure and can reduce accessible information during distance comparisons. We formally analyze the security strengths and complete the prototype implementation. The comprehensive experimental results demonstrate the practicality of our designs.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据