Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities

被引:70
|
作者
Ren, Hao [1 ]
Li, Hongwei [1 ,3 ]
Dai, Yuanshun [2 ]
Yang, Kan [4 ,5 ]
Lin, Xiaodong [6 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Cybersecur, Chengdu, Sichuan, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu, Sichuan, Peoples R China
[4] Univ Memphis, Dept CS, Memphis, TN 38152 USA
[5] Univ Memphis, Ctr Informat Assurance CfIA, Memphis, TN 38152 USA
[6] Wilfrid Laurier Univ, Comp Sci, Dept Phys & Comp Sci, Waterloo, ON, Canada
来源
IEEE NETWORK | 2018年 / 32卷 / 06期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
RANGE QUERIES; SECURE;
D O I
10.1109/MNET.2018.1700374
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IoT is envisioned as the next stage of the information revolution, enabling various daily applications and providing better service by conducting a deep fusion with cloud and fog computing. As the key mission of most IoT applications, data management, especially the fundamental function-data query, has long been plagued by severe security and privacy problems. Most query service providers, including the big ones (e.g., Google, Facebook, Amazon, and so on) are suffering from intensive attacks launched by insiders or outsiders. As a consequence, processing various queries in IoT without compromising the data and query privacy is an urgent and challenging issue. In this article, we propose a thing-fog-cloud architecture for secure query processing based on well studied classical paradigms. Following with a description of crucial technical challenges in terms of functionality, privacy and efficiency assurance, we survey the latest milestone-like approaches, and provide an insight into the advantages and limitations of each scheme. Based on the recent advances, we also discuss future research opportunities to motivate efforts to develop practical private query protocols in IoT.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [21] Security in Internet of Things: Opportunities and Challenges
    Sha, Kewei
    Wei, Wei
    Yang, Andrew T.
    Shi, Weisong
    2016 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI), 2016, : 512 - 518
  • [22] Internet of Things: Trends, Challenges and Opportunities
    Tropmann-Frick, Marina
    NEW TRENDS IN DATABASES AND INFORMATION SYSTEMS, ADBIS 2018, 2018, 909 : 254 - 261
  • [23] Privacy-Preserving Truth Discovery in Mobile Crowdsensing: Challenges, Solutions, and Opportunities
    Wang, Cong
    SCC'18: PROCEEDINGS OF THE 6TH INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2018, : 1 - 1
  • [24] Editorial for special issue on security, trust, and privacy in internet of things: Challenges and solutions
    Meng, Weizhi
    Cofta, Piotr
    Grandison, Tyrone W. A.
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (02)
  • [25] Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions
    Al Asqah, Muneerah
    Moulahi, Tarek
    FUTURE INTERNET, 2023, 15 (06)
  • [26] Privacy-Preserving Channel Access for Internet of Things
    Banerjee, Debasmit
    Dong, Bo
    Taghizadeh, Mahmoud
    Biswas, Subir
    IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 430 - 445
  • [27] An Overview of Privacy Preserving Schemes for Industrial Internet of Things
    Huo, Yan
    Meng, Chun
    Li, Ruinian
    Jing, Tao
    CHINA COMMUNICATIONS, 2020, 17 (10) : 1 - 18
  • [28] Privacy-Preserving Redactable Blockchain for Internet of Things
    Ren, Yanli
    Cai, Xianji
    Hu, Mingqi
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [29] Privacy-Preserving Delegable Authentication in the Internet of Things
    Gritti, Clementine
    Onen, Melek
    Molva, Refik
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 861 - 869
  • [30] Privacy Preserving Solution for Internet of things with Application to eHealth
    Boussada, Rihab
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 384 - 391