A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System

被引:3
作者
Xu, Chang [1 ]
Shen, Xiaodong [1 ]
Zhu, Liehuang [1 ]
Zhang, Yan [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing Engn Res Ctr Mass Language Informat Proc, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
EFFICIENT;
D O I
10.1155/2017/3715253
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the pervasiveness and increasing capability of smart devices, mobile crowdsensing has been applied in more and more practical scenarios and provides a more convenient solution with low costs for existing problems. In this paper, we consider an untrusted aggregator collecting a group of users' data, in which personal private information may be contained. Most previous work either focuses on computing particular functions based on the sensing data or ignores the collusion attack between users and the aggregator. We design a new protocol to help the aggregator collect all the users' raw data while resisting collusion attacks. Specifically, the bitwise XOR homomorphic functions and aggregate signature are explored, and a novel key system is designed to achieve collusion resistance. In our system, only the aggregator can decrypt the ciphertext. Theoretical analysis shows that our protocol can capture k-source anonymity. In addition, extensive experiments are conducted to demonstrate the feasibility and efficiency of our algorithms.
引用
收藏
页数:11
相关论文
共 25 条
  • [1] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
  • [2] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [3] Boutsis I, 2013, INT CONF PERVAS COMP, P103, DOI 10.1109/PerCom.2013.6526720
  • [4] Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks
    Castelluccia, Claude
    Chan, Aldar C-F
    Mykletun, Einar
    Tsudik, Gene
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) : 1 - 36
  • [5] Consolvo S, 2008, CHI 2008: 26TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS VOLS 1 AND 2, CONFERENCE PROCEEDINGS, P1797
  • [6] Cornelius C, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P211
  • [7] Defending DoS attacks on broadcast authentication in wireless sensor networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Mohsen
    Chen, Hsiao-Hwa
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1653 - +
  • [8] Gaonkar S, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P174
  • [9] Groat MM, 2011, IEEE INFOCOM SER, P2024, DOI 10.1109/INFCOM.2011.5935010
  • [10] Joye M., 2013, LNCS, P111, DOI [DOI 10.1007/978-3-642-39884-1, DOI 10.1007/978-3-642-39884-110]