Two secure privacy-preserving data aggregation schemes for IoT

24Citations
Citations of this article
50Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life. However, pervasive security and privacy issues are also increasing in IoT. For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application. Therefore, it is very important for users to protect their private data. In this paper, we present two efficient data aggregation schemes to preserve private data of customers. In the first scheme, each IoT device slices its actual data randomly, keeps one piece to itself, and sends the remaining pieces to other devices which are in the same group via symmetric encryption. Then, each IoT device adds the received pieces and the held piece together to get an immediate result, which is sent to the aggregator after the computation. Moreover, homomorphic encryption and AES encryption are employed to guarantee secure communication. In the second scheme, the slicing strategy is also employed. Noise data are introduced to prevent the exchanged actual data of devices from disclosure when the devices blend data each other. AES encryption is also employed to guarantee secure communication between devices and aggregator, compared to homomorphic encryption, which has significantly less computational cost. Analysis shows that integrity and confidentiality of IoT devices' data can be guaranteed in our schemes. Both schemes can resist external attack, internal attack, colluding attack, and so on.

Cite

CITATION STYLE

APA

Pu, Y., Luo, J., Hu, C., Yu, J., Zhao, R., Huang, H., & Xiang, T. (2019). Two secure privacy-preserving data aggregation schemes for IoT. Wireless Communications and Mobile Computing, 2019. https://doi.org/10.1155/2019/3985232

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free