An efficient and secure aggregation encryption scheme in edge computing

被引:6
作者
Wu, Junhua [1 ]
Sheng, Xiaofei [2 ]
Li, Guangshun [1 ]
Yu, Kan [1 ]
Liu, Junke [3 ]
机构
[1] Qufu Normal Univ, Sch Informat Sci & Engn, Rizhao 276800, Peoples R China
[2] Shandong Yingcai Univ, Sch Business Dept, Jinan 250000, Peoples R China
[3] Shandong Zhengyuan Geol Explorat Inst Met Geol Ch, Jinan 250000, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge computing; data aggregation; encryption; Simulated annealing;
D O I
10.23919/JCC.2022.03.018
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Edge computing is a highly virtualized paradigm that can services the Internet of Things(IoT) devices more efficiently. It is a non-trivial extension of cloud computing, which can not only meet the big data processing requirements of cloud computing, but also collect and analyze distributed data. However, it inherits many security and privacy challenges of cloud computing, such as: authentication and access control. To address these problem, we proposed a new efficient privacy-preserving aggregation scheme for edge computing. Our scheme consists of two steps. First, we divided the data of the end users with the Simulated Annealing Module Partition (SAMP) algorithm. And then, the end sensors and edge nodes performed respectively differential aggregation mechanism with the Differential Aggregation Encryption (DAE) algorithm which can make noise interference and encryption algorithm with trusted authority (TA). Experiment results show that the DAE can preserve user privacy, and has significantly less computation and communication overhead than existing approaches.
引用
收藏
页码:245 / 257
页数:13
相关论文
共 24 条
[1]  
[Anonymous], 2018, WIREL COMMUN MOB COM
[2]   Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption [J].
Ben Othman, Soufiene ;
Bahattab, Abdullah Ali ;
Trad, Abdelbasset ;
Youssef, Habib .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (02) :867-889
[3]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[4]   Trading Private Range Counting over Big IoT Data [J].
Cai, Zhipeng ;
He, Zaobo .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :144-153
[5]   Software Defined Cooperative Offloading for Mobile Cloudlets [J].
Cui, Yong ;
Song, Jian ;
Ren, Kui ;
Li, Minming ;
Li, Zongpeng ;
Ren, Qingmei ;
Zhang, Yangjun .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (03) :1746-1760
[6]  
Domingo-Ferrer J, 2002, LECT NOTES COMPUT SC, V2433, P471
[7]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[8]   Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions [J].
Emura, Keita .
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 :193-213
[9]   Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid [J].
Fan, Chun-I ;
Huang, Shi-Yuan ;
Lai, Yih-Loong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (01) :666-675
[10]  
Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15