Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT

被引:6
|
作者
Rezaeibagha, Fatemeh [1 ,2 ]
Mu, Yi [3 ]
Huang, Ke [4 ]
Chen, Lanxiang [5 ]
Zhang, Leyou [6 ]
机构
[1] Murdoch Univ, Discipline Informat Technol, HBI Inst, Murdoch, WA 6150, Australia
[2] Murdoch Univ, Hlth Ageing Ctr, Murdoch, WA 6150, Australia
[3] City Univ Macau, Fac Data Sci, Macau 999078, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610056, Sichuan, Peoples R China
[5] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[6] Xidian Univ, Sch Math & Stat, Xian 710126, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; data security; homomorphic encryption; DATA AGGREGATION SCHEME; PRIVACY; ENCRYPTION; SECURE;
D O I
10.1109/TSC.2022.3211349
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of Internet of Things (IoT) and cloud computing are always seen as promising technologies to enhance streamlined data collection, share and exchange. Although the advances in edge computing, particularly mobile edge computing (MEC), could enhance the performance of data collection and computation via computing offloading, security and privacy impediments have made new challenges to data integrity and confidentiality, in particular when multiple edges or nodes at different locations collect IoT data. Homomorphic encryption therefore has shown promising advantages for cloud computing, offering arithmetic operations to be carried out on the encrypted data without revealing the secret key. While fully homomorphic encryption introduced by Gentry, in 2009, allows both additive and multiplicative operations, it has shown significant implementation drawbacks due to the parameters generation and memory consumption. In this work, we focus on partially homomorphic encryption, which can be efficiently computed. However, it is challenging to add authentication feature for the verification and aggregation capability. We propose a novel secure and privacy preserving authenticable homomorphic encryption (AHEC) scheme. We demonstrate an application of our AHEC scheme for MEC-based IoT systems and provide security analysis to prove that our scheme is secure against chosen plaintext attack (IND-CPA) and unforgeability (UNF) under DDH-ZN2 and Lift-DH-ZN2 assumptions. Experimental results show that our proposed scheme is efficient for practical applications.
引用
收藏
页码:1664 / 1672
页数:9
相关论文
共 50 条
  • [1] An MEC-based VNF Placement and Scheduling Scheme for AR Application Topology
    Tseng, Hsueh-Wen
    Yang, Ting-Ting
    Hsu, Fang-Tzu
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [2] Low-complexity access control scheme for MEC-based services
    Sepczuk, Mariusz
    Kotulski, Zbigniew
    Niewolski, Wojciech
    Nowak, Tomasz W.
    PROCEEDINGS OF THE 2022 17TH CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENCE SYSTEMS (FEDCSIS), 2022, : 673 - 681
  • [3] A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT
    Wu, Bin
    Wang, Caifen
    Yao, Hailong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (02) : 852 - 872
  • [4] A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT
    Li, Tong
    Chen, Wenbin
    Tang, Yi
    Yan, Hongyang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [5] A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT
    Bin Wu
    Caifen Wang
    Hailong Yao
    Peer-to-Peer Networking and Applications, 2021, 14 : 852 - 872
  • [6] Energy efficient offloading scheme for MEC-based augmented reality system
    Abdelhamied A. Ateya
    Ammar Muthanna
    Andrey Koucheryavy
    Yassine Maleh
    Ahmed A. Abd El-Latif
    Cluster Computing, 2023, 26 : 789 - 806
  • [7] Energy efficient offloading scheme for MEC-based augmented reality system
    Ateya, Abdelhamied A.
    Muthanna, Ammar
    Koucheryavy, Andrey
    Maleh, Yassine
    El-Latif, Ahmed A. Abd
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (01): : 789 - 806
  • [8] Machine Learning-Driven Trust Prediction for MEC-based IoT Services
    Abeysekara, Prabath
    Dong, Hai
    Qin, A. K.
    2019 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2019), 2019, : 188 - 192
  • [9] A Multi-Protocol MEC-based Approach to Deploy and Consume IoT Services
    Borsatti, Davide
    Bassi, Lorenzo
    Cerroni, Walter
    Davoli, Gianluca
    Raffaelli, Carla
    25TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS (ICIN 2022), 2022, : 154 - 156
  • [10] Testing the Resilience of MEC-Based IoT Applications Against Resource Exhaustion Attacks
    Pietrantuono, Roberto
    Ficco, Massimo
    Palmieri, Francesco
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 804 - 818