Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption

被引:27
作者
Loukil, Faiza [1 ,5 ]
Ghedira-Guegan, Chirine [2 ]
Boukadi, Khouloud [3 ]
Benharkat, Aicha-Nabila [4 ]
机构
[1] Univ Jean Moulin Lyon 3, Univ Lyon, LIRIS, CNRS, F-69372 Lyon, France
[2] Univ Jean Moulin Lyon 3, Univ Lyon, Iaelyon Sch Management, CNRS,LIRIS, F-69372 Lyon, France
[3] Sfax Univ, Miracl Lab, Sfax 3018, Tunisia
[4] Univ Lyon, LIRIS, CNRS, INSALyon, F-69621 Lyon, France
[5] Univ Polytech Hauts de France, CNRS, LAMIH, UMR 8201, F-59313 Valenciennes, France
关键词
privacy; Internet of Things; data aggregation; blockchain technology; homomorphic encryption technology; SCHEME;
D O I
10.3390/s21072452
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Data analytics based on the produced data from the Internet of Things (IoT) devices is expected to improve the individuals' quality of life. However, ensuring security and privacy in the IoT data aggregation process is a non-trivial task. Generally, the IoT data aggregation process is based on centralized servers. Yet, in the case of distributed approaches, it is difficult to coordinate several untrustworthy parties. Fortunately, the blockchain may provide decentralization while overcoming the trust problem. Consequently, blockchain-based IoT data aggregation may become a reasonable choice for the design of a privacy-preserving system. To this end, we propose PrivDA, a Privacy-preserving IoT Data Aggregation scheme based on the blockchain and homomorphic encryption technologies. In the proposed system, each data consumer can create a smart contract and publish both terms of service and requested IoT data. Thus, the smart contract puts together into one group potential data producers that can answer the consumer's request and chooses one aggregator, the role of which is to compute the group requested result using homomorphic computations. Therefore, group-level aggregation obfuscates IoT data, which complicates sensitive information inference from a single IoT device. Finally, we deploy the proposal on a private Ethereum blockchain and give the performance evaluation.
引用
收藏
页数:23
相关论文
共 30 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]  
Benet J., 2016, Ipfs-content addressed, versioned, p2p file system
[3]  
Buterin V, 2013, GitHub repository, V1, P22
[4]  
Corrigan-Gibbs H, 2017, PROCEEDINGS OF NSDI '17: 14TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, P259
[5]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[6]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[7]  
Ertaul Levent, 2007, 2007 International Conference on Wireless Networks (ICWN'07), P186
[8]  
European Parliament and the Council of the European Union, 2016, OFFICIAL J EUROPEAN, P1
[9]  
Finck M., 2019, BLOCKCHAIN GEN DATA
[10]   APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT [J].
Guan, Zhitao ;
Zhang, Yue ;
Wu, Longfei ;
Wu, Jun ;
Li, Jing ;
Ma, Yinglong ;
Hu, Jingjing .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 :82-92