Privacy-preserving Data Sharing with Attribute-based Private Matching Based on Edge Computation in the Internet-of-Things

被引:0
|
作者
Hsu, Ruei-Hau [1 ]
Hu, Yu-Hsaing [1 ]
Lin, Guan-Wei [1 ]
Ko, Bing-Cheng [1 ]
机构
[1] Natl Sun Yat Sen Univ, Kaohsiung, Taiwan
关键词
CHALLENGES; NETWORKS; ENCRYPTION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data sharing is essential for the analytics of specific tasks in internet-of-things (IoT). The availability and the latency of data exchange affect the validity of critical and real-time IoT services. Thus, a new computing model, i.e., edge computing model, is urgently required for data sharing in IoT. However, data sharing based on edge computing model needs to address additional security issues, i.e., the privacy protection of data acquisition and transmission against honest-but-curious edge devices. Thus, this work proposes a privacy-preserving data sharing with attribute-based private matching based on edge computation in IoT. In the proposed scheme, IoT users/devices can acquire/distribute data based on attribute-based private matching on honest-but-curious edge devices without exposing attribute/policy information and exchanged data. Moreover, the proposed scheme guarantees anonymous IoT user/device authentication with the support of handover between the regions covered by two adjacent edge devices. Nonetheless, the data transmission is of secure end-to-end communications between IoT users and devices to reduce the consumption of bandwidth between IoT users/devices and edge devices. Finally, this work implements the system to evaluate the performance and provides the security analysis of the proposed security system.
引用
收藏
页码:1578 / 1587
页数:10
相关论文
共 50 条
  • [41] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh J.
    Yadav S.K.
    Bhandari G.M.
    Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [42] On the User Acceptance of Privacy-Preserving Attribute-Based Credentials - A Qualitative Study
    Sabouri, Ahmad
    DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 130 - 145
  • [43] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [44] Attribute-Based User Revocable Data Integrity Audit for Internet-of-Things Devices in Cloud Storage
    Wang, Yaowei
    Chen, Chen
    Chen, Zhenwei
    He, Jiangyong
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [45] PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks
    Guo, Linke
    Zhang, Chi
    Sun, Jinyuan
    Fang, Yuguang
    2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2012, : 224 - 233
  • [46] A Privacy-Preserving Data Sharing Scheme Based on Blockchain for Vehicular Edge Networks
    Hao, Puhe
    Pan, Tianyu
    Han, Rui
    Qu, Xiao
    Yang, Zhexuan
    Sun, Guozi
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5116 - 5121
  • [47] A privacy-preserving model for blockchain-based data sharing in the industrial internet
    Xue, Yudai
    Wang, Jinsong
    Shi, Kai
    Zhang, Hongwei
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (04)
  • [48] A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles
    Wang, Yangpeng
    Xiong, Ling
    Niu, Xianhua
    Wang, Yunxiang
    Liang, Dexin
    FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 18 - 33
  • [49] Two Practical Attribute-Based Encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications
    Chen, Zhenhua
    Li, Ni
    Huang, Luqi
    Jia, Xingxing
    Wang, Yilei
    Wang, Hao
    Su, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5148 - 5159
  • [50] Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things
    Gai, Keke
    Choo, Kim-Kwang Raymond
    Qiu, Meikang
    Zhu, Liehuang
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 3059 - 3067