PVF-DA: Privacy-Preserving, Verifiable and Fault-Tolerant Data Aggregation in MEC

被引:0
作者
Zhang, Jianhong [1 ,2 ]
Zhang, Qijia [1 ]
Ji, Shenglong [3 ]
Bai, Wenle [1 ]
机构
[1] North China Univ Technol, Sch Informat Sci & Technol, Beijing 100144, Peoples R China
[2] Guizhou Univ, Guizhou Prov Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[3] Legendsec Informat Technol Beijing Inc, Beijing 100085, Peoples R China
基金
北京市自然科学基金;
关键词
MEC; data aggregation; verifiability; privacy-preserving; fault-tolerance; SCHEME; SYSTEM;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for IoT systems. To reduce communication pressure from IoT devices, data aggregation is a good candidate. However. data processing in MEC may suffer from many challenges, such as unverifiability of aggregated data, privacy-violation and fault-tolerance. To address these challenges, we propose PVF-DA: privacy-preserving, verifiable and fault-tolerant data aggregation in MEC based on aggregator-oblivious encryption and zero-knowledge-proof. The proposed scheme can not only provide privacy protection of the reported data, but also resist the collusion between MEC server and corrupted IoT devices. Furthermore, the proposed scheme has two outstanding features: verifiability and strong fault-tolerance. Verifiability can make IoT device to verify whether the reported sensing data is correctly aggregated. Strong fault-tolerance makes the aggregator to compute an aggregate even if one or several IoTs fail to report their data. Finally, the detailed security proofs are shown that the proposed scheme can achieve security and privacy-preservation properties in MEC.
引用
收藏
页码:58 / 69
页数:12
相关论文
共 32 条
[1]  
[Anonymous], 2016, INFORM SPEKTRUM, DOI DOI 10.1007/S00287-016-0957-6
[2]  
[Anonymous], LNCS
[3]  
[Anonymous], P 7 ANN IEEE COMM SO
[4]  
Armbrust M., 2012, UCBEECS200928
[5]  
Bao HY, 2015, IEEE ICC, P7240, DOI 10.1109/ICC.2015.7249482
[6]  
Benkaouz Yahya, 2015, Networked Systems. Third International Conference, NETYS 2015. Revised Selected Papers: LNCS 9466, P94, DOI 10.1007/978-3-319-26850-7_7
[7]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[8]   Private data aggregation with integrity assurance and fault tolerance for mobile crowd-sensing [J].
Chen, Jianwei ;
Ma, Huadong ;
Zhao, Dong .
WIRELESS NETWORKS, 2017, 23 (01) :131-144
[9]   Private Data Aggregation over Selected Subsets of Users [J].
Datta, Amit ;
Joye, Marc ;
Fawaz, Nadia .
CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 :375-391
[10]   Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid [J].
Fan, Chun-I ;
Huang, Shi-Yuan ;
Lai, Yih-Loong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) :666-675