Privacy-preserving Data Sharing with Attribute-based Private Matching Based on Edge Computation in the Internet-of-Things

被引:0
作者
Hsu, Ruei-Hau [1 ]
Hu, Yu-Hsaing [1 ]
Lin, Guan-Wei [1 ]
Ko, Bing-Cheng [1 ]
机构
[1] Natl Sun Yat Sen Univ, Kaohsiung, Taiwan
来源
2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC) | 2020年
关键词
CHALLENGES; NETWORKS; ENCRYPTION; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The data sharing is essential for the analytics of specific tasks in internet-of-things (IoT). The availability and the latency of data exchange affect the validity of critical and real-time IoT services. Thus, a new computing model, i.e., edge computing model, is urgently required for data sharing in IoT. However, data sharing based on edge computing model needs to address additional security issues, i.e., the privacy protection of data acquisition and transmission against honest-but-curious edge devices. Thus, this work proposes a privacy-preserving data sharing with attribute-based private matching based on edge computation in IoT. In the proposed scheme, IoT users/devices can acquire/distribute data based on attribute-based private matching on honest-but-curious edge devices without exposing attribute/policy information and exchanged data. Moreover, the proposed scheme guarantees anonymous IoT user/device authentication with the support of handover between the regions covered by two adjacent edge devices. Nonetheless, the data transmission is of secure end-to-end communications between IoT users and devices to reduce the consumption of bandwidth between IoT users/devices and edge devices. Finally, this work implements the system to evaluate the performance and provides the security analysis of the proposed security system.
引用
收藏
页码:1578 / 1587
页数:10
相关论文
共 30 条
  • [1] A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges
    Akpakwu, Godfrey Anuga
    Silva, Bruno J.
    Hancke, Gerhard P.
    Abu-MAhfouz, Adnan M.
    [J]. IEEE ACCESS, 2018, 6 : 3619 - 3647
  • [2] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [3] [Anonymous], 2010, INFOCOM, 2010 Proceedings IEEE, DOI DOI 10.1109/INFCOM.2010.5462196
  • [4] [Anonymous], DEVICE DEMOCRACY SAV
  • [5] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [6] A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective
    Chen, Shanzhi
    Xu, Hui
    Liu, Dake
    Hu, Bo
    Wang, Hucheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04): : 349 - 359
  • [7] Chen YA, 2014, IEEE WCNC, P3396, DOI 10.1109/WCNC.2014.6953125
  • [8] The Internet of Things: A Review of Enabled Technologies and Future Challenges
    Din, Ikram Ud
    Guizani, Mohsen
    Hassan, Suhaidi
    Kim, Byung-Seo
    Khan, Muhammad Khurram
    Atiquzzaman, Mohammed
    Ahmed, Syed Hassan
    [J]. IEEE ACCESS, 2019, 7 : 7606 - 7640
  • [9] ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications
    Fan, Chun-, I
    Huang, Jheng-Jia
    Zhong, Min-Zhe
    Hsu, Ruei-Hau
    Chen, Wen-Tsuen
    Lee, Jemin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 927 - 942
  • [10] Anonymous Multireceiver Identity-Based Encryption
    Fan, Chun-I
    Huang, Ling-Ying
    Ho, Pei-Hsiu
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) : 1239 - 1249