APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT

被引:151
作者
Guan, Zhitao [1 ]
Zhang, Yue [1 ]
Wu, Longfei [2 ]
Wu, Jun [3 ]
Li, Jing [1 ]
Ma, Yinglong [1 ]
Hu, Jingjing [4 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
[2] Fayetteville State Univ, Dept Math & Comp Sci, Fayetteville, NC USA
[3] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai, Peoples R China
[4] Beijing Inst Technol, Sch Comp, Beijing, Peoples R China
基金
北京市自然科学基金;
关键词
loT; Fog computing; Data privacy; Anonymity; ACCESS-CONTROL; CLOUD; SECURE; INTERNET; THINGS; EFFICIENT;
D O I
10.1016/j.jnca.2018.09.019
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is a modern computing+ platform that connects the cloud with the edge smart devices located at the edge of the network. The fog computing platform has several characteristics desirable for Internet of Things (IoT) systems, such as the efficient data access, low latency, and location awareness. Data aggregation is a common operation in IoT systems. However, for data aggregation applications in the fog-enhanced loT environment, how to efficiently preserve the privacy of sensitive data is a major concern. To address this challenge, we propose APPA: a device-oriented Anonymous Privacy-Preserving scheme with Authentication for data aggregation applications in fog-enhanced IoT systems, which also supports multi-authority to manage smart devices and fog nodes locally. In APPA scheme, the anonymity and authenticity of the device is guaranteed with pseudonym and pseudonym certificate, which can be updated autonomously. Taking the advantage of a local certification authority, the pseudonym management can be shifted to specialized fogs at the network edge, which provide real-time service for device registration and update. The data privacy can be ensured during data aggregation by using the Paillier algorithm. Detailed security analysis is conducted to show that our scheme can achieve security and privacy-preservation properties in the fog-enhanced IoT systems. Additionally, we compare our scheme with existing schemes to demonstrate the effectiveness and efficiency of our proposed scheme in terms of low computational complexity and communication overhead.
引用
收藏
页码:82 / 92
页数:11
相关论文
共 51 条
[1]   Fog Computing and Smart Gateway Based Communication for Cloud of Things [J].
Aazam, Mohammad ;
Huh, Eui-Nam .
2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, :464-470
[2]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]   Towards secure and flexible EHR sharing in mobile health cloud under static assumptions [J].
Cai, Zhaoquan ;
Yan, Hongyang ;
Li, Ping ;
Huang, Zheng-an ;
Gao, Chongzhi .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03) :2415-2422
[5]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[6]   Verifiable Computation over Large Database with Incremental Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Weng, Jian ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :3184-3195
[7]   Fog and IoT: An Overview of Research Opportunities [J].
Chiang, Mung ;
Zhang, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06) :854-864
[8]   Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies [J].
D'Orazio, Christian J. ;
Choo, Kim-Kwang Raymond ;
Yang, Laurence T. .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02) :524-535
[9]  
De Caro A., 2011, 2011 IEEE Symposium on Computers and Communications (ISCC 2011), P850, DOI 10.1109/ISCC.2011.5983948
[10]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194