Two Secure Privacy-Preserving Data Aggregation Schemes for IoT

As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life. However, pervasive security and priva...

Full description

Bibliographic Details
Main Authors: Yuwen Pu, Jin Luo, Chunqiang Hu, Jiguo Yu, Ruifeng Zhao, Hongyu Huang, Tao Xiang
Format: Article
Language:English
Published: Hindawi-Wiley 2019-01-01
Series:Wireless Communications and Mobile Computing
Online Access:http://dx.doi.org/10.1155/2019/3985232
id doaj-8827641899d9497695d6cd2fbb0046e1
record_format Article
spelling doaj-8827641899d9497695d6cd2fbb0046e12020-11-25T01:08:42ZengHindawi-WileyWireless Communications and Mobile Computing1530-86691530-86772019-01-01201910.1155/2019/39852323985232Two Secure Privacy-Preserving Data Aggregation Schemes for IoTYuwen Pu0Jin Luo1Chunqiang Hu2Jiguo Yu3Ruifeng Zhao4Hongyu Huang5Tao Xiang6School of Big Data & Software Engineering, Chongqing University, Chongqing 400044, ChinaSchool of Big Data & Software Engineering, Chongqing University, Chongqing 400044, ChinaSchool of Big Data & Software Engineering, Chongqing University, Chongqing 400044, ChinaSchool of Computer Science and Technology, Qilu University of Technology, Jinan, Shandong, ChinaElectric Power Dispatching and Control Center of Guangdong Power Grid Co., Ltd., Guangzhou, ChinaCollege of Computer Science, Chongqing University, Chongqing, ChinaCollege of Computer Science, Chongqing University, Chongqing, ChinaAs the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life. However, pervasive security and privacy issues are also increasing in IoT. For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application. Therefore, it is very important for users to protect their private data. In this paper, we present two efficient data aggregation schemes to preserve private data of customers. In the first scheme, each IoT device slices its actual data randomly, keeps one piece to itself, and sends the remaining pieces to other devices which are in the same group via symmetric encryption. Then, each IoT device adds the received pieces and the held piece together to get an immediate result, which is sent to the aggregator after the computation. Moreover, homomorphic encryption and AES encryption are employed to guarantee secure communication. In the second scheme, the slicing strategy is also employed. Noise data are introduced to prevent the exchanged actual data of devices from disclosure when the devices blend data each other. AES encryption is also employed to guarantee secure communication between devices and aggregator, compared to homomorphic encryption, which has significantly less computational cost. Analysis shows that integrity and confidentiality of IoT devices’ data can be guaranteed in our schemes. Both schemes can resist external attack, internal attack, colluding attack, and so on.http://dx.doi.org/10.1155/2019/3985232
collection DOAJ
language English
format Article
sources DOAJ
author Yuwen Pu
Jin Luo
Chunqiang Hu
Jiguo Yu
Ruifeng Zhao
Hongyu Huang
Tao Xiang
spellingShingle Yuwen Pu
Jin Luo
Chunqiang Hu
Jiguo Yu
Ruifeng Zhao
Hongyu Huang
Tao Xiang
Two Secure Privacy-Preserving Data Aggregation Schemes for IoT
Wireless Communications and Mobile Computing
author_facet Yuwen Pu
Jin Luo
Chunqiang Hu
Jiguo Yu
Ruifeng Zhao
Hongyu Huang
Tao Xiang
author_sort Yuwen Pu
title Two Secure Privacy-Preserving Data Aggregation Schemes for IoT
title_short Two Secure Privacy-Preserving Data Aggregation Schemes for IoT
title_full Two Secure Privacy-Preserving Data Aggregation Schemes for IoT
title_fullStr Two Secure Privacy-Preserving Data Aggregation Schemes for IoT
title_full_unstemmed Two Secure Privacy-Preserving Data Aggregation Schemes for IoT
title_sort two secure privacy-preserving data aggregation schemes for iot
publisher Hindawi-Wiley
series Wireless Communications and Mobile Computing
issn 1530-8669
1530-8677
publishDate 2019-01-01
description As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life. However, pervasive security and privacy issues are also increasing in IoT. For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application. Therefore, it is very important for users to protect their private data. In this paper, we present two efficient data aggregation schemes to preserve private data of customers. In the first scheme, each IoT device slices its actual data randomly, keeps one piece to itself, and sends the remaining pieces to other devices which are in the same group via symmetric encryption. Then, each IoT device adds the received pieces and the held piece together to get an immediate result, which is sent to the aggregator after the computation. Moreover, homomorphic encryption and AES encryption are employed to guarantee secure communication. In the second scheme, the slicing strategy is also employed. Noise data are introduced to prevent the exchanged actual data of devices from disclosure when the devices blend data each other. AES encryption is also employed to guarantee secure communication between devices and aggregator, compared to homomorphic encryption, which has significantly less computational cost. Analysis shows that integrity and confidentiality of IoT devices’ data can be guaranteed in our schemes. Both schemes can resist external attack, internal attack, colluding attack, and so on.
url http://dx.doi.org/10.1155/2019/3985232
work_keys_str_mv AT yuwenpu twosecureprivacypreservingdataaggregationschemesforiot
AT jinluo twosecureprivacypreservingdataaggregationschemesforiot
AT chunqianghu twosecureprivacypreservingdataaggregationschemesforiot
AT jiguoyu twosecureprivacypreservingdataaggregationschemesforiot
AT ruifengzhao twosecureprivacypreservingdataaggregationschemesforiot
AT hongyuhuang twosecureprivacypreservingdataaggregationschemesforiot
AT taoxiang twosecureprivacypreservingdataaggregationschemesforiot
_version_ 1725181921214857216