A trusted IoT data sharing method based on secure multi-party computation

被引:0
|
作者
Ma, Li [1 ]
Duan, Binbin [1 ]
Zhang, Bo [1 ]
Li, Yang [1 ]
Fu, Yingxun [1 ]
Ma, Dongchao [1 ]
机构
[1] North China Univ Technol, Sch Informat, Beijing 100144, Peoples R China
基金
中国国家自然科学基金;
关键词
IOT; Blockchain; Edge computing; Secure multi-party computing; Bloom filter;
D O I
10.1186/s13677-024-00704-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing nodes close to the perception layer of IoT systems are susceptible to data leaks and unauthorized access. To address these security concerns, this paper proposes a trusted IoT data sharing method based on secure multi-party computation (SMC). By running a reliable third-party blockchain service at edge computing nodes, the data computation relationships between IoT devices in the perception layer are registered in blockchain smart contracts. This constructs a publicly verifiable IoT data sharing method combining on-chain audit verification and off-chain SMC. Furthermore, a Bloom filter is maintained at the on-chain smart contract layer to track the trust status of IoT devices in the perception layer, filtering out non-trustworthy device requests and enabling secure data sharing among trusted devices. Comparative analysis and performance tests demonstrate the proposed method's high computational efficiency for IoT device nodes.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [2] Conclave: secure multi-party computation on big data
    Volgushev, Nikolaj
    Schwarzkopf, Matte
    Ben Getchell
    Varia, Mayank
    Lapets, Andrei
    Bestavros, Azer
    [J]. PROCEEDINGS OF THE FOURTEENTH EUROSYS CONFERENCE 2019 (EUROSYS '19), 2019,
  • [3] Brief Announcement: Secure Data Structures based on Multi-Party Computation
    Toft, Tomas
    [J]. PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 291 - 292
  • [4] SECURE MULTI-PARTY COMPUTATION PROTOCOL FOR STATISTICAL COMPUTATION ON ENCRYPTED DATA
    Pathak, Rohit
    Joshi, Satyadhar
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 78 - +
  • [5] Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
    黄征
    龚征
    李强
    [J]. Journal of Shanghai Jiaotong University(Science), 2009, 14 (01) : 112 - 116
  • [6] Batch secret sharing for secure multi-party computation in asynchronous network
    Huang Z.
    Gong Z.
    Li Q.
    [J]. Journal of Shanghai Jiaotong University (Science), 2009, 14 E (01) : 112 - 116
  • [7] An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
    Pu, Hongquan
    Cui, Zhe
    Liu, Ting
    [J]. International Journal of Network Security, 2021, 23 (06) : 997 - 1004
  • [8] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [9] A secure multi-party computing and scenario application for trusted data circulation
    Wang, Dan-Chen
    Xu, Yang
    Zhang, Xiao-Song
    [J]. DEVELOPMENTS OF ARTIFICIAL INTELLIGENCE TECHNOLOGIES IN COMPUTATION AND ROBOTICS, 2020, 12 : 369 - 377
  • [10] Quorum-based secure multi-party computation
    Beaver, D
    Wool, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 375 - 390