Secure multi-party computation with secret sharing for real-time data aggregation in IIoT

被引:0
|
作者
Liu, Dengzhi [1 ,2 ,3 ]
Yu, Geng [1 ]
Zhong, Zhaoman [1 ,3 ]
Song, Yuanzhao [4 ]
机构
[1] Jiangsu Ocean Univ, Sch Comp Engn, Lianyungang 210005, Peoples R China
[2] Jiangsu Inst Marine Resources Dev, Lianyungang 210005, Peoples R China
[3] Jiangsu Ocean Univ, Jiangsu Engn Res Ctr Intelligent Port, Lianyungang 210005, Peoples R China
[4] Gachon Univ, Dept Business, Seongnam 13120, Gyeonggi Do, South Korea
基金
中国国家自然科学基金;
关键词
Real-time analytics; IIoT; Data aggregation; Secure multi-party computation; Secret sharing; SCHEME; SMART;
D O I
10.1016/j.comcom.2024.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Real-time analytics in Industrial Internet-of-Things (IIoT) has received remarkable attention recently due to its capacity to prevent downtime and manage risks. However, the sensed data in IIoT is considered private. Thus, the sensed data of IIoT nodes cannot be transmitted and utilized directly in the cloud server due to the risk of privacy leakage. Data aggregation can effectively balance the availability of data with privacy concerns, making it particularly well-suited for IIoT systems. Although several privacy-preserving aggregation schemes in IIoT have been proposed, the majority of them can only support a single type of aggregation that limits the application scenarios of data aggregation. To address the problems mentioned above, a real-time aggregation analysis scheme for IIoT is proposed, which is constructed based on secure multi-party computation with secret sharing. Specifically, the multi-party computation with secret sharing is utilized to implement data aggregation process for IIoT that achieves multiple types of data aggregation. In addition, the secret sharing is utilized in the proposed scheme that can significantly improve the efficiency of the proposed scheme compared with similar schemes. Moreover, the proposed scheme does not require the involvement of a trusted authority in the data aggregation. Security and performance analyses show that the proposed scheme can enhance the security of the sensed data while effectively aggregating data for real-time analytics in IIoT.
引用
收藏
页码:159 / 168
页数:10
相关论文
共 50 条
  • [1] Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
    黄征
    龚征
    李强
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 112 - 116
  • [2] Batch secret sharing for secure multi-party computation in asynchronous network
    Huang Z.
    Gong Z.
    Li Q.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (01) : 112 - 116
  • [3] Multi-party computation with conversion of secret sharing
    Hossein Ghodosi
    Josef Pieprzyk
    Ron Steinfeld
    Designs, Codes and Cryptography, 2012, 62 : 259 - 272
  • [4] Multi-party computation with conversion of secret sharing
    Ghodosi, Hossein
    Pieprzyk, Josef
    Steinfeld, Ron
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 62 (03) : 259 - 272
  • [5] On codes, matroids and secure multi-party computation from linear secret sharing schemes
    Cramer, R
    Daza, V
    Gracia, I
    Urroz, JJ
    Leander, G
    Martí-Farré, J
    Padró, C
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 327 - 343
  • [6] An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
    Pu, Hongquan
    Cui, Zhe
    Liu, Ting
    International Journal of Network Security, 2021, 23 (06) : 997 - 1004
  • [7] Multi-party computation enables secure polynomial control based solely on secret-sharing
    Schlor, Sebastian
    Hertneck, Michael
    Wildhagen, Stefan
    Allgower, Frank
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4882 - 4887
  • [8] General secure multi-party computation from any linear secret-sharing scheme
    Cramer, R
    Damgård, I
    Maurer, U
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 316 - 334
  • [9] A trusted IoT data sharing method based on secure multi-party computation
    Ma, Li
    Duan, Binbin
    Zhang, Bo
    Li, Yang
    Fu, Yingxun
    Ma, Dongchao
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [10] Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority
    Blanton, Marina
    Kang, Ahreum
    Yuan, Chen
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 377 - 397