Secure multi-party computation with secret sharing for real-time data aggregation in IIoT

被引:0
|
作者
Liu, Dengzhi [1 ,2 ,3 ]
Yu, Geng [1 ]
Zhong, Zhaoman [1 ,3 ]
Song, Yuanzhao [4 ]
机构
[1] Jiangsu Ocean Univ, Sch Comp Engn, Lianyungang 210005, Peoples R China
[2] Jiangsu Inst Marine Resources Dev, Lianyungang 210005, Peoples R China
[3] Jiangsu Ocean Univ, Jiangsu Engn Res Ctr Intelligent Port, Lianyungang 210005, Peoples R China
[4] Gachon Univ, Dept Business, Seongnam 13120, Gyeonggi Do, South Korea
基金
中国国家自然科学基金;
关键词
Real-time analytics; IIoT; Data aggregation; Secure multi-party computation; Secret sharing; SCHEME; SMART;
D O I
10.1016/j.comcom.2024.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Real-time analytics in Industrial Internet-of-Things (IIoT) has received remarkable attention recently due to its capacity to prevent downtime and manage risks. However, the sensed data in IIoT is considered private. Thus, the sensed data of IIoT nodes cannot be transmitted and utilized directly in the cloud server due to the risk of privacy leakage. Data aggregation can effectively balance the availability of data with privacy concerns, making it particularly well-suited for IIoT systems. Although several privacy-preserving aggregation schemes in IIoT have been proposed, the majority of them can only support a single type of aggregation that limits the application scenarios of data aggregation. To address the problems mentioned above, a real-time aggregation analysis scheme for IIoT is proposed, which is constructed based on secure multi-party computation with secret sharing. Specifically, the multi-party computation with secret sharing is utilized to implement data aggregation process for IIoT that achieves multiple types of data aggregation. In addition, the secret sharing is utilized in the proposed scheme that can significantly improve the efficiency of the proposed scheme compared with similar schemes. Moreover, the proposed scheme does not require the involvement of a trusted authority in the data aggregation. Security and performance analyses show that the proposed scheme can enhance the security of the sensed data while effectively aggregating data for real-time analytics in IIoT.
引用
收藏
页码:159 / 168
页数:10
相关论文
共 50 条
  • [11] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [12] Conclave: secure multi-party computation on big data
    Volgushev, Nikolaj
    Schwarzkopf, Matte
    Ben Getchell
    Varia, Mayank
    Lapets, Andrei
    Bestavros, Azer
    PROCEEDINGS OF THE FOURTEENTH EUROSYS CONFERENCE 2019 (EUROSYS '19), 2019,
  • [13] Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing
    Ohara, Kazuma
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (09) : 1079 - 1090
  • [14] Linear multi-secret sharing schemes based on multi-party computation
    Liu, Mulan
    Xiao, Liangliang
    Zhang, Zhifang
    FINITE FIELDS AND THEIR APPLICATIONS, 2006, 12 (04) : 704 - 713
  • [15] EFFICIENT MULTI-PARTY COMPUTATION WITH COLLUSION-DETERRED SECRET SHARING
    Wang, Zhaohong
    Luo, Ying
    Cheung, Sen-ching
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [16] Threshold quantum secret sharing between multi-party and multi-party
    YANG YuGuang1
    2 State Key Laboratory of Integrated Services Network
    3 State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences)
    4 State Key Laboratory of Networking and Switching Technology
    Science China(Physics,Mechanics & Astronomy), 2008, (09) : 1308 - 1315
  • [17] Threshold quantum secret sharing between multi-party and multi-party
    YuGuang Yang
    QiaoYan Wen
    Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51 : 1308 - 1315
  • [18] Threshold quantum secret sharing between multi-party and multi-party
    Yang YuGuang
    Wen QiaoYan
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2008, 51 (09): : 1308 - 1315
  • [19] SECURE MULTI-PARTY COMPUTATION PROTOCOL FOR STATISTICAL COMPUTATION ON ENCRYPTED DATA
    Pathak, Rohit
    Joshi, Satyadhar
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 78 - +
  • [20] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210