Privacy-preserving data aggregation based on ECC

被引:0
作者
Qian, Ping [1 ,2 ]
Wu, Meng [3 ]
机构
[1] School of Computer Science, Nanjing University of Posts and Telecommunications
[2] School of Computer Science and Technology, Jiangsu University of Science and Technology
[3] School of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications
来源
Journal of Computational Information Systems | 2014年 / 10卷 / 04期
关键词
Data aggregation; Ecc homomorphic encryption; Privacy preservation;
D O I
10.12733/jcis9106
中图分类号
学科分类号
摘要
Data aggregation is widely used in applications such as wireless sensor networks (WSN), data mining and cloud computing. Data aggregation can help to save energy consumption and improve efficiency of data collection and procession. A great challenge to data aggregation is how to protect private information of each participant from disclosing during aggregating process as well as obtain accurate aggregated results. In recent years researchers have done much work on privacy-preserving during data aggregation. This paper surveys the general privacy-preserving methods for data aggregation and analyzes their theories and characteristics. A privacy-preserving method based on ECC homomorphic encryption is presented in this paper, which can protect data privacy from disclosing to other participants, illegal users or even aggregators. Experiment data shows that the method has advantages in energy consumption and privacy protection, compared to current methods. © 2014 Binary Information Press.
引用
收藏
页码:1341 / 1348
页数:7
相关论文
共 14 条
[1]  
Shi E., Chan T., Rieffel E., Privacy-preserving aggregation of time-series data, Proceeding of NDSS, (2011)
[2]  
Teo S.G., Lee V., Han S., A study of efficiency and accuracy of secure multiparty protocol in privacy-preserving data mining, Proceeding of the 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 85-90, (2012)
[3]  
Divanis A.G., Verykios V.S., An overview of privacy preserving data mining, Crossroads, 15, 6, pp. 23-26, (2009)
[4]  
Mukesh K.J., Sharma T., Secure data aggregation in wireless sensor network: A survey, International Journal of Engineering Science and Technology, 3, 3, pp. 2013-2019, (2011)
[5]  
Westhoff D., Girao J., Acharya M., Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptations, IEEE Transactions on Mobile Computing, 5, 10, pp. 1417-1431, (2006)
[6]  
Castelluccia C., Chan A.C.F., Mykletun E., Et al., Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Transactions on Sensor Networks (TOSN), 5, 3, (2009)
[7]  
He W., Liu X., Nguyen H., Nahrstedt K., Abdelzaher T., PDA: Privacy-preserving data aggregation in wireless sensor networks, INFOCOM 2007, pp. 2045-2053
[8]  
Liu C.-X., Liu Y., Zhang Z.-J., Et al., High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks, International Journal of Communication Systems, 26, 3, pp. 380-394, (2013)
[9]  
Li H.J., Lin K., Li K.Q., Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks, Computer Communications, 34, 4, pp. 591-597, (2011)
[10]  
Zhou Q., Yang G., Yang Z., A Novel Integrity-preserving Privacy Data Aggregation in Sensor Networks, Journal of Computational Information Systems, 20, 4, pp. 8471-8478, (2012)