Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities

被引:70
|
作者
Ren, Hao [1 ]
Li, Hongwei [1 ,3 ]
Dai, Yuanshun [2 ]
Yang, Kan [4 ,5 ]
Lin, Xiaodong [6 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Cybersecur, Chengdu, Sichuan, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu, Sichuan, Peoples R China
[4] Univ Memphis, Dept CS, Memphis, TN 38152 USA
[5] Univ Memphis, Ctr Informat Assurance CfIA, Memphis, TN 38152 USA
[6] Wilfrid Laurier Univ, Comp Sci, Dept Phys & Comp Sci, Waterloo, ON, Canada
来源
IEEE NETWORK | 2018年 / 32卷 / 06期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
RANGE QUERIES; SECURE;
D O I
10.1109/MNET.2018.1700374
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IoT is envisioned as the next stage of the information revolution, enabling various daily applications and providing better service by conducting a deep fusion with cloud and fog computing. As the key mission of most IoT applications, data management, especially the fundamental function-data query, has long been plagued by severe security and privacy problems. Most query service providers, including the big ones (e.g., Google, Facebook, Amazon, and so on) are suffering from intensive attacks launched by insiders or outsiders. As a consequence, processing various queries in IoT without compromising the data and query privacy is an urgent and challenging issue. In this article, we propose a thing-fog-cloud architecture for secure query processing based on well studied classical paradigms. Following with a description of crucial technical challenges in terms of functionality, privacy and efficiency assurance, we survey the latest milestone-like approaches, and provide an insight into the advantages and limitations of each scheme. Based on the recent advances, we also discuss future research opportunities to motivate efforts to develop practical private query protocols in IoT.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [41] Open Security And Privacy Challenges For the Internet of Things
    Strazdins, Girts
    Wang, Hao
    2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,
  • [42] Security and privacy in the Internet of Things: threats and challenges
    Youakim Badr
    Xiaoyang Zhu
    Mansour Naser Alraja
    Service Oriented Computing and Applications, 2021, 15 : 257 - 271
  • [43] Security and Privacy Grand Challenges for the Internet of Things
    Fink, Glenn A.
    Zarzhitsky, Dimitri V.
    Carroll, Thomas E.
    Farquhar, Ethan D.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS, 2015, : 27 - 34
  • [44] Internet of Things - New security and privacy challenges
    Weber R.H.
    Computer Law and Security Review, 2010, 26 (01): : 23 - 30
  • [45] Vehicular Internet: Security & Privacy Challenges and Opportunities
    Zaidi, Kamran
    Rajarajan, Muttukrishnan
    FUTURE INTERNET, 2015, 7 (03) : 257 - 275
  • [46] An Overview of Current Solutions for Privacy in the Internet of Things
    Yang, Guang
    FRONTIERS IN ARTIFICIAL INTELLIGENCE, 2022, 5
  • [47] Quantifying Security and Privacy in Internet of Things Solutions
    Alsubaei, Faisal
    Abuhussein, Abdullah
    Shiva, Sajjan
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [48] Challenges and Opportunities in Securing the Industrial Internet of Things
    Serror, Martin
    Hack, Sacha
    Henze, Martin
    Schuba, Marko
    Wehrle, Klaus
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (05) : 2985 - 2996
  • [49] Smart contracts for the Internet of Things: opportunities and challenges
    Fotiou, Nikos
    Polyzos, George C.
    2018 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2018, : 256 - 260
  • [50] A Survey on the Challenges and Opportunities of the Internet of Things (IoT)
    Farhan, Laith
    Shukur, Sinan T.
    Alissa, Ali E.
    Alrweg, Mohmad
    Raza, Umar
    Kharel, Rupak
    2017 ELEVENTH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2017, : 37 - 41