A trusted IoT data sharing method based on secure multi-party computation

被引:0
|
作者
Ma, Li [1 ]
Duan, Binbin [1 ]
Zhang, Bo [1 ]
Li, Yang [1 ]
Fu, Yingxun [1 ]
Ma, Dongchao [1 ]
机构
[1] North China Univ Technol, Sch Informat, Beijing 100144, Peoples R China
基金
中国国家自然科学基金;
关键词
IOT; Blockchain; Edge computing; Secure multi-party computing; Bloom filter;
D O I
10.1186/s13677-024-00704-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing nodes close to the perception layer of IoT systems are susceptible to data leaks and unauthorized access. To address these security concerns, this paper proposes a trusted IoT data sharing method based on secure multi-party computation (SMC). By running a reliable third-party blockchain service at edge computing nodes, the data computation relationships between IoT devices in the perception layer are registered in blockchain smart contracts. This constructs a publicly verifiable IoT data sharing method combining on-chain audit verification and off-chain SMC. Furthermore, a Bloom filter is maintained at the on-chain smart contract layer to track the trust status of IoT devices in the perception layer, filtering out non-trustworthy device requests and enabling secure data sharing among trusted devices. Comparative analysis and performance tests demonstrate the proposed method's high computational efficiency for IoT device nodes.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    [J]. EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [32] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [33] Secure multi-party computation made simple
    Maurer, U
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [34] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    [J]. 2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
  • [35] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [36] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    [J]. DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [37] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
  • [38] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [39] A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain
    Liu F.
    Yang J.
    Li Z.
    Qi J.
    [J]. Li, Zhibin (lizb@cs.ecnu.edu.cn); Qi, Jiayin (ai@suibe.edu.cn), 2021, Science Press (58): : 281 - 290
  • [40] Multi-party computation with conversion of secret sharing
    Hossein Ghodosi
    Josef Pieprzyk
    Ron Steinfeld
    [J]. Designs, Codes and Cryptography, 2012, 62 : 259 - 272