Privacy-preserving Data Sharing with Attribute-based Private Matching Based on Edge Computation in the Internet-of-Things

被引:0
|
作者
Hsu, Ruei-Hau [1 ]
Hu, Yu-Hsaing [1 ]
Lin, Guan-Wei [1 ]
Ko, Bing-Cheng [1 ]
机构
[1] Natl Sun Yat Sen Univ, Kaohsiung, Taiwan
关键词
CHALLENGES; NETWORKS; ENCRYPTION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data sharing is essential for the analytics of specific tasks in internet-of-things (IoT). The availability and the latency of data exchange affect the validity of critical and real-time IoT services. Thus, a new computing model, i.e., edge computing model, is urgently required for data sharing in IoT. However, data sharing based on edge computing model needs to address additional security issues, i.e., the privacy protection of data acquisition and transmission against honest-but-curious edge devices. Thus, this work proposes a privacy-preserving data sharing with attribute-based private matching based on edge computation in IoT. In the proposed scheme, IoT users/devices can acquire/distribute data based on attribute-based private matching on honest-but-curious edge devices without exposing attribute/policy information and exchanged data. Moreover, the proposed scheme guarantees anonymous IoT user/device authentication with the support of handover between the regions covered by two adjacent edge devices. Nonetheless, the data transmission is of secure end-to-end communications between IoT users and devices to reduce the consumption of bandwidth between IoT users/devices and edge devices. Finally, this work implements the system to evaluate the performance and provides the security analysis of the proposed security system.
引用
收藏
页码:1578 / 1587
页数:10
相关论文
共 50 条
  • [1] Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing
    Xiong, Hu
    Zhang, Hao
    Sun, Jianfei
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2739 - 2750
  • [2] A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities
    Shen, Xieyang
    Huang, Chuanhe
    Wang, Danxin
    Shi, Jiaoli
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [3] A Privacy-Preserving Attribute-Based Encryption System for Data Sharing in Smart Cities
    Shen, Xieyang
    Huang, Chuanhe
    Wang, Danxin
    Shi, Jiaoli
    Wireless Communications and Mobile Computing, 2021, 2021
  • [4] A privacy-preserving data sharing system with decentralized attribute-based encryption scheme
    Kang, Li
    Zhang, Leyou
    International Journal of Network Security, 2020, 22 (05) : 815 - 827
  • [5] Privacy-Preserving Auditing for Attribute-Based Credentials
    Camenisch, Jan
    Lehmann, Anja
    Neven, Gregory
    Rial, Alfredo
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 109 - 127
  • [6] Privacy-Preserving Distributed Attribute Computation for Usage Control in the Internet of Things
    Costantino, Gianpiero
    La Marra, Antonio
    Martinelli, Fabio
    Mori, Paolo
    Saracino, Andrea
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1844 - 1851
  • [7] Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid
    Zhang, Leyou
    Ren, Juan
    Mu, Yi
    Wang, Baocang
    IEEE ACCESS, 2020, 8 : 23294 - 23307
  • [8] Distributed and Privacy-Preserving Data Dissemination at the Network Edge via Attribute-Based Searchable Encryption
    Huso, Ingrid
    Piro, Giuseppe
    Boggia, Gennaro
    2022 20TH MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE (MEDCOMNET), 2022,
  • [9] Concepts and languages for privacy-preserving attribute-based authentication
    Camenisch, Jan
    Dubovitskaya, Maria
    Enderlein, Robert R.
    Lehmann, Anja
    Neven, Gregory
    Paquin, Christian
    Preiss, Franz-Stefan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 25 - 44
  • [10] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370