Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing

被引:17
作者
Amuthan, A. [1 ]
Sendhil, R. [1 ]
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pondicherry, India
关键词
Fog computing; False data injection attacks; Fully homomorphic encryption; Privacy preserving data aggregation; Internet of things (IoT); EFFICIENT;
D O I
10.1007/s12652-020-01849-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the area of fog computing is receiving maximum focus due to the potential improvements in the cloud computing field. Fog computing is capable of resolving issues that includes location awareness, inadequate mobility support and high latency in the cloud computing environment. The internet of things (IoT) comprises of a collection of IoT equipments connected to fog nodes in order to aid the cloud service center for storing and processed a portion of data in prior. This process of storing and processing greatly minimizes the pressure in data processing with enhanced service and real time quality. However, data modification attacks and false data injection attacks introduce significant challenges over the fog nodes during the event of data processing. In this paper, Hybrid GSW (Gentry, Sahai, and Waters) and DM (Ducas and Micciancio) based fully homomorphic encryption (HGSW-DM-FHE) scheme was proposed for handling false data injection attacks under privacy preserving data aggregation in fog computing. This proposed HGSW-DM-FHE scheme is highly fault tolerant, since the process of data aggregation from other devices is not influenced even when the fog devices fails in operation. In addition, the proposed HGSW-DM-FHE scheme is determined to be efficient and secure by preventing the data injected from legal IoT devices are unaltered and protected immaterial to the honesty and maliciousness of the cloud control center and fog nodes.
引用
收藏
页码:5217 / 5231
页数:15
相关论文
共 25 条
[1]  
[Anonymous], 2018, IEEE INTERNET THINGS, DOI DOI 10.1145/3154815
[2]  
Bonomi F, 2012, P 1 ED MCC WORKSH MO, V12, P12
[3]   Lattice-based linearly homomorphic signatures in the standard model [J].
Chen, Wenbin ;
Lei, Hao ;
Qi, Ke .
THEORETICAL COMPUTER SCIENCE, 2016, 634 :47-54
[4]   New Publicly Verifiable Databases with Efficient Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :546-556
[5]   Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries [J].
He, Debiao ;
Kumar, Neeraj ;
Zeadally, Sherali ;
Vinel, Alexey ;
Yang, Laurence T. .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2411-2419
[6]   Error-Resilient Masking Approaches for Privacy Preserving Data Aggregation [J].
Knirsch, Fabian ;
Eibl, Guenther ;
Engel, Dominik .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) :3351-3361
[7]   Secure attribute-based data sharing for resource-limited users in cloud computing [J].
Li, Jin ;
Zhang, Yinghui ;
Chen, Xiaofeng ;
Xiang, Yang .
COMPUTERS & SECURITY, 2018, 72 :1-12
[8]   An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain [J].
Lin, Qun ;
Yan, Hongyang ;
Huang, Zhengan ;
Chen, Wenbin ;
Shen, Jian ;
Tang, Yi .
IEEE ACCESS, 2018, 6 :20632-20640
[9]   A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT [J].
Lu, Rongxing ;
Heung, Kevin ;
Lashkari, Arash Habibi ;
Ghorbani, Ali A. .
IEEE ACCESS, 2017, 5 :3302-3312
[10]  
Lu RX, 2016, WIRELESS NETW-GER, P41, DOI 10.1007/978-3-319-32899-7_3