Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing

被引:29
作者
Zhang, Yinghui [1 ,2 ]
Zhao, Jiangfan [1 ]
Zheng, Dong [1 ,2 ]
Deng, Kaixin [1 ]
Ren, Fangyuan [1 ]
Zheng, Xiaokun [3 ]
Shu, Jiangang [4 ]
机构
[1] Xian Univ Posts & Telecommun, Natl Engn Lab Wireless Secur, Xian 710121, Shaanxi, Peoples R China
[2] Westone Cryptol Res Ctr, Beijing 100070, Peoples R China
[3] Xian Univ Posts & Telecommun, Sch Comp Sci & Technol, Xian 710121, Shaanxi, Peoples R China
[4] City Univ Hong Kong, Dept Comp Sci, Kowloon Tong, Hong Kong, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
fog computing; Internet of Things; homomorphic encryption; privacy; data aggregation; HANDOFF AUTHENTICATION SCHEMES; ACCESS-CONTROL; EFFICIENT; SECURE; ENCRYPTION; CONSTRUCTION; NETWORKS; USERS;
D O I
10.3390/s18082659
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices' privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient.
引用
收藏
页数:16
相关论文
共 53 条
  • [1] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [2] Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks
    Bhuiyan, Md Zakirul Alam
    Wu, Jie
    Wang, Guojun
    Chen, Zhigang
    Chen, Jianer
    Wang, Tian
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (02) : 572 - 583
  • [3] Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring
    Bhuiyan, Md Zakirul Alam
    Wu, Jie
    Wang, Guojun
    Cao, Jiannong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (06) : 2103 - 2114
  • [4] Bonomi F., 2012, P MCCWORKSHOP MOB CL, P13, DOI 10.1145/2342509.2342513
  • [5] Lattice-based linearly homomorphic signatures in the standard model
    Chen, Wenbin
    Lei, Hao
    Qi, Ke
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 634 : 47 - 54
  • [6] Verifiable Computation over Large Database with Incremental Updates
    Chen, Xiaofeng
    Li, Jin
    Weng, Jian
    Ma, Jianfeng
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) : 3184 - 3195
  • [7] New Publicly Verifiable Databases with Efficient Updates
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Ma, Jianfeng
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 546 - 556
  • [8] Secrecy Cooperative Networks With Outdated Relay Selection Over Correlated Fading Channels
    Fan, Lisheng
    Lei, Xianfu
    Yang, Nan
    Duong, Trung Q.
    Karagiannidis, George K.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) : 7599 - 7603
  • [9] Secure Multiple Amplify-and-Forward Relaying With Cochannel Interference
    Fan, Lisheng
    Lei, Xianfu
    Yang, Nan
    Duong, Trung Q.
    Karagiannidis, George K.
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2016, 10 (08) : 1494 - 1505
  • [10] Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack
    Gao, Chong-zhi
    Cheng, Qiong
    He, Pei
    Susilo, Willy
    Li, Jin
    [J]. INFORMATION SCIENCES, 2018, 444 : 72 - 88