Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT

被引:6
|
作者
Rezaeibagha, Fatemeh [1 ]
Mu, Yi [2 ]
Huang, Ke [3 ]
Chen, Lanxiang [4 ]
Zhang, Leyou [5 ]
机构
[1] Murdoch Univ, Ctr Hlth Ageing & HBI, Discipline Informat Technol, Perth, WA 6150, Australia
[2] City Univ Macau, Inst Data Sci, Macau 999078, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 610054, Peoples R China
[4] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Peoples R China
[5] Xidian Univ, Sch Math & Stat, Xian 710126, Peoples R China
基金
中国国家自然科学基金;
关键词
IoT; cloud computing; homomorphic encryption; data security; PRESERVING DATA AGGREGATION; PUBLIC-KEY CRYPTOSYSTEM; PRIVACY; ENCRYPTION; INTERNET;
D O I
10.1109/TCC.2021.3087614
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based IoT systems prone to internal or external attacks. To protect IoT data against potential malicious users and adversaries, some cryptographic schemes have been applied to ensure confidentiality and integrity of IoT data. It is however a challenging task to perform any arithmetical computations once data items are encrypted. Fully-homomorphic encryption which is based on lattices can, in principle, provide a solution, but it is unfortunately inefficient in computation and hence cannot be applied to IoT. Fully-homomorphic encryption is feasible when we allow the involvement of a semi-trusted server. However, it is challenging to provide such a system in the situation of distributed environments for shared IoT data. We solve this problem and provide a fully-homomorphic encryption scheme for cloud-based IoT applications. We introduce a new method with the aid of a semi-trusted server that can help compute the homomorphic multiplications without gaining any useful information of the encrypted data. We show how our scheme is applied to multi-user IoT security and prove its semantic security. We also conduct experiments to justify its efficiency and applicability to multi-user cloud-based IoT systems.
引用
收藏
页码:217 / 228
页数:12
相关论文
共 50 条
  • [1] Multi-user Cloud-Based Secure Keyword Search
    Kermanshahi, Shabnam Kasra
    Liu, Joseph K.
    Steinfeld, Ron
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 227 - 247
  • [2] Secure Computation Offloading for Multi-user Multi-server MEC-enabled IoT
    Xu, Jun
    Zhu, Pengcheng
    Li, Jiamin
    You, Xiaohu
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [3] Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT
    Shen, Meng
    Ma, Baoli
    Zhu, Liehuang
    Du, Xiaojiang
    Xu, Ke
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1998 - 2008
  • [4] Index Generation and Secure Multi-User Access Control over an Encrypted Cloud Data
    Raghavendra, S.
    Meghana, K.
    Doddabasappa, P. A.
    Geeta, C. M.
    Buyya, Rajkumar
    Venugopal, K. R.
    Iyengar, S. S.
    Patnaik, L. M.
    [J]. TWELFTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2016 / TWELFTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2016 / TWELFTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2016, 2016, 89 : 293 - 300
  • [5] Efficient Outsourced Data Access Control with User Revocation for Cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Liu, Jian
    Xian, Ming
    Shen, Xuemin
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [6] Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data
    Ge, Xinrui
    Yu, Jia
    Chen, Fei
    Kong, Fanyu
    Wang, Huaqun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16): : 12902 - 12918
  • [7] Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems
    Hussien, Zaid Alaa
    Abdulmalik, Husam. A. A.
    Hussain, Mohammed Abdulridha
    Nyangaresi, Vincent Omollo
    Ma, Junchao
    Abduljabbar, Zaid Ameen
    Abduljaleel, Iman Qays
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [8] IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: A Hybrid Post-Quantum Cryptographic and Blockchain-Based Approach Toward a Trustworthy Cloud Computing
    Irshad, Reyazur Rashid
    Hussain, Shahid
    Hussain, Ihtisham
    Nasir, Jamal Abdul
    Zeb, Asim
    Alalayah, Khaled M.
    Alattab, Ahmed Abdu
    Yousif, Adil
    Alwayle, Ibrahim M.
    [J]. IEEE ACCESS, 2023, 11 : 105479 - 105498
  • [9] Achieving IoT Devices Secure Sharing in Multi-User Smart Space
    Al-Shaboti, Mohammed
    Chen, Gang
    Welch, Ian
    [J]. PROCEEDINGS OF THE 2020 IEEE 45TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2020), 2020, : 88 - 99
  • [10] A Novel Cloud-Based IoT Framework for Secure Health Monitoring
    Ebadinezhad, Sahar
    Mobolade, Temitope Emmanuel
    [J]. SUSTAINABILITY, 2024, 16 (03)