Secure multi-party computation with secret sharing for real-time data aggregation in IIoT

被引:0
|
作者
Liu, Dengzhi [1 ,2 ,3 ]
Yu, Geng [1 ]
Zhong, Zhaoman [1 ,3 ]
Song, Yuanzhao [4 ]
机构
[1] Jiangsu Ocean Univ, Sch Comp Engn, Lianyungang 210005, Peoples R China
[2] Jiangsu Inst Marine Resources Dev, Lianyungang 210005, Peoples R China
[3] Jiangsu Ocean Univ, Jiangsu Engn Res Ctr Intelligent Port, Lianyungang 210005, Peoples R China
[4] Gachon Univ, Dept Business, Seongnam 13120, Gyeonggi Do, South Korea
基金
中国国家自然科学基金;
关键词
Real-time analytics; IIoT; Data aggregation; Secure multi-party computation; Secret sharing; SCHEME; SMART;
D O I
10.1016/j.comcom.2024.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Real-time analytics in Industrial Internet-of-Things (IIoT) has received remarkable attention recently due to its capacity to prevent downtime and manage risks. However, the sensed data in IIoT is considered private. Thus, the sensed data of IIoT nodes cannot be transmitted and utilized directly in the cloud server due to the risk of privacy leakage. Data aggregation can effectively balance the availability of data with privacy concerns, making it particularly well-suited for IIoT systems. Although several privacy-preserving aggregation schemes in IIoT have been proposed, the majority of them can only support a single type of aggregation that limits the application scenarios of data aggregation. To address the problems mentioned above, a real-time aggregation analysis scheme for IIoT is proposed, which is constructed based on secure multi-party computation with secret sharing. Specifically, the multi-party computation with secret sharing is utilized to implement data aggregation process for IIoT that achieves multiple types of data aggregation. In addition, the secret sharing is utilized in the proposed scheme that can significantly improve the efficiency of the proposed scheme compared with similar schemes. Moreover, the proposed scheme does not require the involvement of a trusted authority in the data aggregation. Security and performance analyses show that the proposed scheme can enhance the security of the sensed data while effectively aggregating data for real-time analytics in IIoT.
引用
收藏
页码:159 / 168
页数:10
相关论文
共 50 条
  • [31] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [32] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [33] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [34] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [35] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [36] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [37] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [38] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [39] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [40] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287