Secure multi-party computation with secret sharing for real-time data aggregation in IIoT

被引:0
|
作者
Liu, Dengzhi [1 ,2 ,3 ]
Yu, Geng [1 ]
Zhong, Zhaoman [1 ,3 ]
Song, Yuanzhao [4 ]
机构
[1] Jiangsu Ocean Univ, Sch Comp Engn, Lianyungang 210005, Peoples R China
[2] Jiangsu Inst Marine Resources Dev, Lianyungang 210005, Peoples R China
[3] Jiangsu Ocean Univ, Jiangsu Engn Res Ctr Intelligent Port, Lianyungang 210005, Peoples R China
[4] Gachon Univ, Dept Business, Seongnam 13120, Gyeonggi Do, South Korea
基金
中国国家自然科学基金;
关键词
Real-time analytics; IIoT; Data aggregation; Secure multi-party computation; Secret sharing; SCHEME; SMART;
D O I
10.1016/j.comcom.2024.06.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Real-time analytics in Industrial Internet-of-Things (IIoT) has received remarkable attention recently due to its capacity to prevent downtime and manage risks. However, the sensed data in IIoT is considered private. Thus, the sensed data of IIoT nodes cannot be transmitted and utilized directly in the cloud server due to the risk of privacy leakage. Data aggregation can effectively balance the availability of data with privacy concerns, making it particularly well-suited for IIoT systems. Although several privacy-preserving aggregation schemes in IIoT have been proposed, the majority of them can only support a single type of aggregation that limits the application scenarios of data aggregation. To address the problems mentioned above, a real-time aggregation analysis scheme for IIoT is proposed, which is constructed based on secure multi-party computation with secret sharing. Specifically, the multi-party computation with secret sharing is utilized to implement data aggregation process for IIoT that achieves multiple types of data aggregation. In addition, the secret sharing is utilized in the proposed scheme that can significantly improve the efficiency of the proposed scheme compared with similar schemes. Moreover, the proposed scheme does not require the involvement of a trusted authority in the data aggregation. Security and performance analyses show that the proposed scheme can enhance the security of the sensed data while effectively aggregating data for real-time analytics in IIoT.
引用
收藏
页码:159 / 168
页数:10
相关论文
共 50 条
  • [41] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
  • [42] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [43] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
  • [44] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [45] Secure Multi-party Computation and Its Applications
    Veugen, Thijs
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 3 - 5
  • [46] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [47] Dynamic Multi-Party to Multi-Party Quantum Secret Sharing based on Bell States
    Tian, Yuan
    Wang, Jialong
    Bian, Genqing
    Chang, Jinyong
    Li, Jian
    ADVANCED QUANTUM TECHNOLOGIES, 2024, 7 (07)
  • [48] A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY
    Ul Ain, Noor
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 112 - 116
  • [49] Brief Announcement: Secure Data Structures based on Multi-Party Computation
    Toft, Tomas
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 291 - 292
  • [50] Secure Multi-Party Computation in Differential Private Data with Data Integrity Protection
    Sundari, S.
    Ananthi, M.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 180 - 184