Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT

被引:6
|
作者
Rezaeibagha, Fatemeh [1 ,2 ]
Mu, Yi [3 ]
Huang, Ke [4 ]
Chen, Lanxiang [5 ]
Zhang, Leyou [6 ]
机构
[1] Murdoch Univ, Discipline Informat Technol, HBI Inst, Murdoch, WA 6150, Australia
[2] Murdoch Univ, Hlth Ageing Ctr, Murdoch, WA 6150, Australia
[3] City Univ Macau, Fac Data Sci, Macau 999078, Peoples R China
[4] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610056, Sichuan, Peoples R China
[5] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[6] Xidian Univ, Sch Math & Stat, Xian 710126, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; data security; homomorphic encryption; DATA AGGREGATION SCHEME; PRIVACY; ENCRYPTION; SECURE;
D O I
10.1109/TSC.2022.3211349
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integration of Internet of Things (IoT) and cloud computing are always seen as promising technologies to enhance streamlined data collection, share and exchange. Although the advances in edge computing, particularly mobile edge computing (MEC), could enhance the performance of data collection and computation via computing offloading, security and privacy impediments have made new challenges to data integrity and confidentiality, in particular when multiple edges or nodes at different locations collect IoT data. Homomorphic encryption therefore has shown promising advantages for cloud computing, offering arithmetic operations to be carried out on the encrypted data without revealing the secret key. While fully homomorphic encryption introduced by Gentry, in 2009, allows both additive and multiplicative operations, it has shown significant implementation drawbacks due to the parameters generation and memory consumption. In this work, we focus on partially homomorphic encryption, which can be efficiently computed. However, it is challenging to add authentication feature for the verification and aggregation capability. We propose a novel secure and privacy preserving authenticable homomorphic encryption (AHEC) scheme. We demonstrate an application of our AHEC scheme for MEC-based IoT systems and provide security analysis to prove that our scheme is secure against chosen plaintext attack (IND-CPA) and unforgeability (UNF) under DDH-ZN2 and Lift-DH-ZN2 assumptions. Experimental results show that our proposed scheme is efficient for practical applications.
引用
收藏
页码:1664 / 1672
页数:9
相关论文
共 50 条
  • [41] Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption
    Song, Mingyang
    Sang, Yingpeng
    Zeng, Yuying
    Luo, Shunchao
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [42] A Key Escrow-Free KP-ABE Scheme and Its Application in Standalone Authentication in IoT
    He, Xu
    Li, Lixiang
    Peng, Haipeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 11381 - 11394
  • [43] Temporal Integration Based Visual Cryptography Scheme and Its Application
    Wang, Wen
    Liu, Feng
    Guo, Teng
    Ren, Yawei
    DIGITAL FORENSICS AND WATERMARKING, 2017, 10431 : 406 - 419
  • [44] Wavelets based on lifting scheme and its application on image processing
    Xiao, Jinsheng
    Yi, Benshun
    Yao, Yuan
    KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 628 - 631
  • [45] A new identity based blind signature scheme and its application
    Wang Shuang
    Yu Hao
    Liu Dongnan
    PROCEEDINGS OF 2018 IEEE 3RD ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC 2018), 2018, : 672 - 676
  • [46] Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network
    A. Hassen, Oday
    A. Abdulhussein, Ansam
    M. Darwish, Saad
    Othman, Zulaiha Ali
    Tiun, Sabrina
    A. Lotfy, Yasmin
    SYMMETRY-BASEL, 2020, 12 (10): : 1 - 18
  • [47] New digital signature algorithm based on ECC and its application in bitcoin and IoT
    Xiao S.
    Wang H.
    Zhang J.
    International Journal of High Performance Systems Architecture, 2021, 10 (01) : 20 - 31
  • [48] PES-DAS: Privacy Enhancing Subset-Data Aggregation Scheme Leveraging Homomorphic Cryptosystem in Fog-Cloud Based IoT Applications
    Prashant Shukla
    Sudhakar Pandey
    SN Computer Science, 6 (3)
  • [49] Trust Management for SOA-Based IoT and Its Application to Service Composition
    Chen, Ing-Ray
    Guo, Jia
    Bao, Fenye
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2016, 9 (03) : 482 - 495
  • [50] A Novel Energy Planning Scheme Based on PGA Algorithm and Its Application
    Lv, Xian-Long
    Tang, Shikai
    Su, Jia
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022