Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing

被引:27
|
作者
Zhang, Yinghui [1 ,2 ]
Zhao, Jiangfan [1 ]
Zheng, Dong [1 ,2 ]
Deng, Kaixin [1 ]
Ren, Fangyuan [1 ]
Zheng, Xiaokun [3 ]
Shu, Jiangang [4 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[3] Xian Univ Posts & Telecommun, Sch Comp Sci & Technol, Xian 710121, Shaanxi, Peoples R China
[4] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
fog computing; Internet of Things; homomorphic encryption; privacy; data aggregation; HANDOFF AUTHENTICATION SCHEMES; ACCESS-CONTROL; EFFICIENT; SECURE; ENCRYPTION; CONSTRUCTION; NETWORKS; USERS;
D O I
10.3390/s18082659
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices' privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient.
引用
下载
收藏
页数:16
相关论文
共 50 条
  • [1] Collaborative Fog Computing Architecture for Privacy-Preserving Data Aggregation
    Qusa, Hani
    Tarazi, Jumana
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 86 - 91
  • [2] A privacy-preserving data aggregation scheme for dynamic groups in fog computing
    Shen, Xiaodong
    Zhu, Liehuang
    Xu, Chang
    Sharif, Kashif
    Lu, Rongxing
    INFORMATION SCIENCES, 2020, 514 (514) : 118 - 130
  • [3] Lightweight, Divide-and-Conquer privacy-preserving data aggregation in fog computing
    Sarwar, Kinza
    Yongchareon, Sira
    Yu, Jian
    Rehman, Saeed Ur
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 119 : 188 - 199
  • [4] Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing
    Amuthan, A.
    Sendhil, R.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5217 - 5231
  • [5] Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing
    A. Amuthan
    R. Sendhil
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5217 - 5231
  • [6] Privacy-Preserving Consensus Strategy for Secondary Control in Microgrids Against Multilink False Data Injection Attacks
    Hu, Jie
    Sun, Qiuye
    Zhai, Meina
    Wang, Bingyu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (10) : 10334 - 10343
  • [7] A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT
    Lu, Rongxing
    Heung, Kevin
    Lashkari, Arash Habibi
    Ghorbani, Ali A.
    IEEE ACCESS, 2017, 5 : 3302 - 3312
  • [8] Privacy-preserving federated learning for detecting false data injection attacks on power system
    Lin, Wen -Ting
    Chen, Guo
    Zhou, Xiaojun
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 229
  • [9] A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing
    Ushida, Mebae
    Itoh, Kouichi
    Katayama, Yoshinori
    Kozakura, Fumihiko
    Tsuda, Hiroshi
    2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, : 141 - 148
  • [10] A Privacy-preserving Algorithm for AC Microgrid Cyber-physical System Against False Data Injection Attacks
    Jun Yang
    Yu Zhang
    Journal of Modern Power Systems and Clean Energy, 2023, 11 (05) : 1646 - 1658