A Secure Data Assimilation for Large-Scale Sensor Networks Using an Untrusted Cloud

被引:0
|
作者
Xu, Zhiheng [1 ]
Zhu, Quanyan [1 ]
机构
[1] NYU, Tandon Sch Engn, Brooklyn, NY 11201 USA
来源
IFAC PAPERSONLINE | 2017年 / 50卷 / 01期
基金
美国国家科学基金会;
关键词
Homomorphic Encryption; Cloud Computing; Sensor Networks; Data Assimilation;
D O I
10.1016/j.ifacol.2017.08.135
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing technologies (CCTs) enable a large-scale sensor network (LSN) to outsource the computations of data assimilation to improve its performance. However, the cyber-physical nature of cloud-enabled LSNs (CE-LSNs) introduces new challenges. Outsourcing the computations to an untrusted cloud may expose the privacy of the sensing data. To address the security issues, we proposed a secure approach to achieve data confidentiality in the outsourcing process. We develop our mechanism by combining a conventional homomorphic encryption and a customized encryption scheme. We present theorems to characterize the correctness of the encryption and investigate the estimation performance and the security of the proposed method. We also analyze the impacts of the quantization errors on the estimation performance. Finally, we present numerical experiments to consolidate our analytical results. (C) 2017, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.
引用
收藏
页码:2609 / 2614
页数:6
相关论文
共 50 条
  • [1] Secure routing for large-scale wireless sensor networks
    Yin, CQ
    Huang, SY
    Su, PC
    Gao, CS
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1282 - 1286
  • [2] Scalable and Secure Routing for Large-Scale Sensor Networks
    Tang, Feilong
    Guo, Minyi
    Li, Minglu
    Wang, Zhijun
    Cheng, Zixue
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 300 - +
  • [3] Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks
    Li, Xing
    Chen, Dexin
    Li, Chunyan
    Wang, Liangmin
    [J]. SENSORS, 2015, 15 (07): : 15952 - 15973
  • [4] Group Based Secure Communication for Large-Scale Wireless Sensor Networks
    Kifayat, Kashif
    Merabti, Madjid
    Shi, Qi
    Llewellyn-Jones, David
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2007, 2 (02): : 139 - 152
  • [5] An Efficient Scheme for Secure Communication in Large-Scale Wireless Sensor Networks
    Su, Zhong
    Lin, Chuang
    Ren, Fengyuan
    Jiang, Yixin
    Chu, Xiaowen
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 333 - +
  • [6] Simulation of large-scale sensor networks using GTSNetS
    Ould-Ahmed-Vall, E
    Riley, GF
    Heck, BS
    Reddy, D
    [J]. MASCOTS 2005:13TH IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2005, : 211 - 218
  • [7] Secure routing based on distributed key sharing in large-scale sensor networks
    Park, Taejoon
    Shin, Kang G.
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2008, 7 (02)
  • [8] Data Center Networks Recovery for Large-scale Disasters in Optical Cloud Networks
    Yang, Yuan
    Yin, Shan
    Guo, Bingli
    Zhang, Yu
    Wang, Chenge
    Huang, Shanguo
    [J]. 2016 15TH INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATIONS AND NETWORKS (ICOCN), 2016,
  • [9] Big Data Collection in Large-Scale Wireless Sensor Networks
    Djedouboum, Asside Christian
    Ari, Ado Adamou Abba
    Gueroui, Abdelhak Mourad
    Mohamadou, Alidou
    Aliouat, Zibouda
    [J]. SENSORS, 2018, 18 (12)
  • [10] Data Gathering and Processing for Large-Scale Wireless Sensor Networks
    Xing, Xiaofei
    Xie, Dongqing
    Wang, Guojun
    [J]. 2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 354 - 358