A coding computation scheme for secure aggregation

被引:0
|
作者
Yang, Ze
Tian, Youliang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
基金
中国国家自然科学基金;
关键词
Data aggregation; Coding theory; Chinese Residual Theorem (CRT); Privacy preservation;
D O I
10.1016/j.jksuci.2024.102073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic requirements for data aggregation involving private data, how to achieve fault tolerance and interference of aggregation in real computing networks is imminent and is the main contribution of this paper. In this paper, we propose a secure aggregation framework involving multiple servers based on coding theory, which is not only robust to clients dropping out and tolerant to partial server withdrawal but also resistant to malicious computation by servers and forgery attacks by adversaries. In particular, the proposed protocol employs the Chinese Residual Theorem (CRT) to encode private data and constructs Lagrange interpolation polynomials to perform aggregation, which achieves lightweight privacy preservation while achieving robust, verifiable and secure aggregation goals.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Aggregation Scheme with Secure Hierarchical Clustering for Wireless Sensor Networks
    Su, Tung-Shih
    Huang, Mei-Wen
    Li, Wei-Shou
    Hsieh, Wen-Shyong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [32] Secure Data Aggregation Scheme in Wireless Sensor Networks for IoT
    Alghamdi, Ahmed
    Alshamrani, Mesfar
    Alqahtani, Abdullah
    Al Ghamdi, Sultan Safar A.
    Harrathi, Rami
    2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [33] A secure image coding scheme using residue number system
    Ammar, A
    Al Kabbany, A
    Youssef, M
    Emam, A
    PROCEEDINGS OF THE EIGHTEENTH NATIONAL RADIO SCIENCE CONFERENCE, VOLS 1 AND 2, 2001, : 399 - 405
  • [34] An efficient MAC scheme for secure network coding with probabilistic detection
    Boyang Wang
    Hui Li
    Jin Cao
    Frontiers of Computer Science, 2012, 6 : 429 - 441
  • [35] A Secure, lightweight, and verifiable data aggregation scheme for smart grids
    Yu, Pengfei
    Huang, Weicong
    Li, Zhenjiang
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)
  • [36] A secure and efficient data aggregation scheme for wireless sensor networks
    Zhu, Wen Tao
    Gao, Fei
    Xiang, Yang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1414 - 1430
  • [37] SAS: A Secure Data Aggregation Scheme in Vehicular Sensing Networks
    Han, Qi
    Du, Suguo
    Ren, Dandan
    Zhu, Haojin
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [38] An Efficient Secure Data Aggregation Scheme for Wireless Sensor Networks
    Ben Othman, Soufiene
    Alzaid, Hani
    Trad, Abdelbasset
    Youssef, Habib
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 49 - 52
  • [39] Secure and Efficient Sharing Aggregation Scheme for Data Protection in WSNs
    Bouakkaz, Feriel
    Omar, Mawloud
    Bounceur, Ahcene
    Tari, Abdelkamel
    2015 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2015, : 432 - 437
  • [40] A Secure Lightweight Data Aggregation scheme for Cloud assisted IoT
    Tripathi, Aishwarya
    Pasupuleti, Syam Kumar
    2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 187 - 192