Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis

被引:0
|
作者
Sendhil, R. [1 ]
Amuthan, A. [1 ]
机构
[1] Pondicherry Engn Coll, Dept CSE, Pondicherry, India
关键词
Fog computing; Privacy; Homomorphic Encryption; Io; Cloud Securit;
D O I
10.1109/iccci48352.2020.9104191
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days the attention of the researchers has been grabbed by the advent of fog computing which is found to be a conservatory of cloud computing. The fog computing is found to be more advantageous and it solves mighty issues of the cloud namely higher delay and also no proper mobility awareness and location related awareness are found in the cloud environment. The IoT devices are connected to the fog nodes which support the cloud services to accumulate and process a component of data. The presence of Fog nodes not only reduces the demands of processing data, but it had improved the quality of service in real time scenarios. Nevertheless the fog node endures from challenges of false data injection, privacy violation in IoT devices and violating integrity of data. This paper is going to address the key issues related to homomorphic encryption algorithms which is used by various researchers for providing data integrity and authenticity of the devices with their merits and demerits
引用
收藏
页码:486 / +
页数:5
相关论文
共 50 条
  • [1] Using Homomorphic Encryption to Compute Privacy Preserving Data Mining in a Cloud Computing Environment
    Hammami, Hamza
    Brahmi, Hanen
    Brahmi, Imen
    Ben Yahia, Sadok
    [J]. INFORMATION SYSTEMS, EMCIS 2017, 2017, 299 : 397 - 413
  • [2] Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing
    A. Amuthan
    R. Sendhil
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 5217 - 5231
  • [3] Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing
    Amuthan, A.
    Sendhil, R.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) : 5217 - 5231
  • [4] Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption
    Loukil, Faiza
    Ghedira-Guegan, Chirine
    Boukadi, Khouloud
    Benharkat, Aicha-Nabila
    [J]. SENSORS, 2021, 21 (07)
  • [5] DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
    Wang, Jing
    Wu, Fengheng
    Zhang, Tingbo
    Wu, Xiaohua
    [J]. 2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 29 - 32
  • [6] Fog computing-based privacy preserving data aggregation protocols
    Okay, Feyza Yildirim
    Ozdemir, Suat
    Xiao, Yang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (04)
  • [7] Collaborative Fog Computing Architecture for Privacy-Preserving Data Aggregation
    Qusa, Hani
    Tarazi, Jumana
    [J]. 2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 86 - 91
  • [8] Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption
    Geva, Ravit
    Gusev, Alexander
    Polyakov, Yuriy
    Liram, Lior
    Rosolio, Oded
    Alexandru, Andreea
    Genise, Nicholas
    Blatt, Marcelo
    Duchin, Zohar
    Waissengrin, Barliz
    Mirelman, Dan
    Bukstein, Felix
    Blumenthal, Deborah T.
    Wolf, Ido
    Pelles-Avraham, Sharon
    Schaffer, Tali
    Lavi, Lee A.
    Micciancio, Daniele
    Vaikuntanathan, Vinod
    Al Badawi, Ahmad
    Goldwasser, Shafi
    [J]. PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2023, 120 (33)
  • [9] A homomorphic encryption-based privacy preserving data aggregation scheme for smart grid
    Zhou Wei-jing
    Zhu He-chun
    Yao Shi-ying
    Li Tong
    [J]. 2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019), 2019, : 315 - 319
  • [10] Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption
    Rohloff, Kurt
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 48 - 53