PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices

被引:5
|
作者
Wang, Mei [1 ]
He, Kun [1 ]
Chen, Jing [1 ,2 ]
Du, Ruiying [1 ,3 ]
Zhang, Bingsheng [4 ]
Li, Zengpeng [5 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan 430072, Peoples R China
[2] Wuhan Univ, Rizhao Inst Informat Technol, Rizhao 276800, Peoples R China
[3] Collaborat Innovat Ctr Geospatial Technol, Wuhan 430079, Peoples R China
[4] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310007, Peoples R China
[5] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Privacy-preserving data aggregation; Trusted Execution Environment; SECURE DATA AGGREGATION; EFFICIENT; SMART;
D O I
10.1016/j.future.2022.01.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy-preserving data aggregation is becoming a demanding necessity for many promising scenarios, e.g., health care analysis. Sensitive data are collected and aggregated in a privacy-preserving approach using current Internet of Things (IoT) technology, leading to immense challenge and consequent interest in developing secure computing algorithms for individual and organizational data. However, most existing solutions focus on specific evaluations (e.g., SUM), and they use heavy cryptographic techniques, which are far from practice for constrained IoT devices. The Trusted Execution Environment (TEE, implemented with Intel SGX) can assist in computing arbitrary functions and avoiding resource consuming operations. Nevertheless, TEE is subject to several challenges because TEE is vulnerable to limited resource and even function violations, e.g., the attacker may bypass the boundary of TEE. In this paper, we propose a lightweight non-interactive privacy-preserving data aggregation scheme for resource-constrained devices, named PANDA, where TEE is introduced to bypass the trusted entities requirement and heavy overhead. Additionally, PANDA explores the certificate-aided function authorization to prevent leakage from unauthorized functions, and designs the public verifiable certificate management to detect the abnormal behaviors of the host to mitigate the external host compromise. We formalize PANDA with rigorous security analysis to indicate privacy protection against the compromised aggregator and analyst. The evaluation results show that PANDA has constant online communication cost and lightweight computation overhead for constrained devices, which is suitable for IoT applications. (c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:28 / 42
页数:15
相关论文
共 50 条
  • [1] Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
    Brunetta, Carlo
    Tsaloli, Georgia
    Liang, Bei
    Banegas, Gustavo
    Mitrokotsa, Aikaterini
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 510 - 528
  • [2] Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing
    Song, Fuyuan
    Qin, Zheng
    Liang, Jinwen
    Xiong, Pulei
    Lin, Xiaodong
    [J]. 2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [3] Non-interactive verifiable privacy-preserving federated learning
    Xu, Yi
    Peng, Changgen
    Tan, Weijie
    Tian, Youliang
    Ma, Minyao
    Niu, Kun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 128 : 365 - 380
  • [4] Non-interactive privacy-preserving neural network prediction
    Ma, Xu
    Chen, Xiaofeng
    Zhang, Xiaoyu
    [J]. INFORMATION SCIENCES, 2019, 481 : 507 - 519
  • [5] Non-interactive set intersection for privacy-preserving contact tracing
    Wu, Axin
    Yang, Yuer
    Wen, Jinghang
    Zhang, Yu
    Zhao, Qiuxia
    [J]. Journal of Systems Architecture, 2025, 158
  • [6] Enabling privacy-preserving non-interactive computation for Hamming distance
    Gao, Wenjing
    Liang, Wei
    Hao, Rong
    Yu, Jia
    [J]. INFORMATION SCIENCES, 2024, 670
  • [7] Non-interactive Privacy-preserving k-NN Classifier
    Pereira, Hilder V. L.
    Aranha, Diego F.
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 362 - 371
  • [8] Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data
    Zheng, Peijia
    Cheng, Ziyan
    Tian, Xianhao
    Liu, Hongmei
    Luo, Weiqi
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3452 - 3468
  • [9] Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms
    Hua, Jingyu
    Tang, An
    Fang, Yixin
    Shen, Zhenyu
    Zhong, Sheng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2298 - 2311
  • [10] Efficient and Privacy-Preserving Non-Interactive Truth Discovery for Mobile Crowdsensing
    Zhang, Chuan
    Zhu, Liehuang
    Xu, Chang
    Ni, Jianbing
    Huang, Cheng
    Shen, Xuemin
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,