Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing

被引:27
|
作者
Zhang, Yinghui [1 ,2 ]
Zhao, Jiangfan [1 ]
Zheng, Dong [1 ,2 ]
Deng, Kaixin [1 ]
Ren, Fangyuan [1 ]
Zheng, Xiaokun [3 ]
Shu, Jiangang [4 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[3] Xian Univ Posts & Telecommun, Sch Comp Sci & Technol, Xian 710121, Shaanxi, Peoples R China
[4] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
fog computing; Internet of Things; homomorphic encryption; privacy; data aggregation; HANDOFF AUTHENTICATION SCHEMES; ACCESS-CONTROL; EFFICIENT; SECURE; ENCRYPTION; CONSTRUCTION; NETWORKS; USERS;
D O I
10.3390/s18082659
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices' privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Privacy-Preserving Fog Computing Paradigm
    Abubaker, Nabil
    Dervishi, Leonard
    Ayday, Erman
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 502 - 509
  • [22] Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
    Sendhil, R.
    Amuthan, A.
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 486 - +
  • [23] Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach
    Piao, Chunhui
    Shi, Yajuan
    Yan, Jiaqi
    Zhang, Changyou
    Liu, Liping
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 : 158 - 174
  • [24] Verifiable Privacy-Preserving Data Aggregation Protocols
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Sakai, Yusuke
    Kitagawa, Fuyuki
    Kawai, Yutaka
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 183 - 194
  • [25] Privacy-Preserving Data Aggregation in Wireless Sensor
    Madan, Surbhi
    Kumar, Deepak
    Agnihotri, Anamika
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 165 - 167
  • [26] Privacy-Preserving Distributed Movement Data Aggregation
    Monreale, Anna
    Wang, Wendy Hui
    Pratesi, Francesca
    Rinzivillo, Salvatore
    Pedreschi, Dino
    Andrienko, Gennady
    Andrienko, Natalia
    GEOGRAPHIC INFORMATION SCIENCE AT THE HEART OF EUROPE, 2013, : 225 - 245
  • [27] Privacy-preserving data aggregation based on ECC
    Qian, P. (qptracy@163.com), 1600, Binary Information Press (10):
  • [28] A Privacy-Preserving Health Data Aggregation Scheme
    Liu, Yining
    Liu, Gao
    Cheng, Chi
    Xia, Zhe
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (08): : 3852 - 3864
  • [29] Collaborative, Privacy-Preserving Data Aggregation at Scale
    Applebaum, Benny
    Ringberg, Haakon
    Freedman, Michael J.
    Caesar, Matthew
    Rexford, Jennifer
    PRIVACY ENHANCING TECHNOLOGIES, 2010, 6205 : 56 - +
  • [30] A privacy-preserving data aggregation mechanism for VANETs
    Yang, Wei-Dong
    Gao, Ze-Ming
    Wang, Ke
    Liu, Hong-Yue
    JOURNAL OF HIGH SPEED NETWORKS, 2016, 22 (03) : 223 - 230