A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT

Fog computing-enhanced Internet of Things (IoT) has recently received considerable attention, as the fog devices deployed at the network edge can not only provide low latency, location awareness but also improve real-time and quality of services in IoT application scenarios. Privacy-preserving data aggregation is one of typical fog computing applications in IoT, and many privacy-preserving data aggregation schemes have been proposed in the past years. However, most of them only support data aggregation for homogeneous IoT devices, and cannot aggregate hybrid IoT devices’ data into one in some real IoT applications. To address this challenge, in this paper, we present a lightweight privacy-preserving data aggregation scheme, called Lightweight Privacy-preserving Data Aggregation, for fog computing-enhanced IoT. The proposed LPDA is characterized by employing the homomorphic Paillier encryption, Chinese Remainder Theorem, and one-way hash chain techniques to not only aggregate hybrid IoT devices’ data into one, but also early filter injected false data at the network edge. Detailed security analysis shows LPDA is really secure and privacy-enhanced with differential privacy techniques. In addition, extensive performance evaluations are conducted, and the results indicate LPDA is really lightweight in fog computing-enhanced IoT.

[1]  Rongxing Lu,et al.  Comment on “Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid” , 2016, IEEE Transactions on Industrial Informatics.

[2]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[3]  Awais Ahmad,et al.  IoT-Based Big Data: From Smart City towards Next Generation Super City Planning , 2017, Int. J. Semantic Web Inf. Syst..

[4]  Rongxing Lu,et al.  A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance , 2017, Peer-to-Peer Netw. Appl..

[5]  Rongxing Lu,et al.  Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing , 2015, 2015 IEEE International Conference on Communications (ICC).

[6]  Rajkumar Buyya,et al.  Fog Computing: Helping the Internet of Things Realize Its Potential , 2016, Computer.

[7]  Murad Khan,et al.  Internet of Things Based Energy Aware Smart Home Control System , 2016, IEEE Access.

[8]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[9]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[10]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[11]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[12]  Rongxing Lu,et al.  PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications , 2015, Peer Peer Netw. Appl..

[13]  Ivan Stojmenovic,et al.  A Security Architecture for Data Aggregation and Access Control in Smart Grids , 2011, ArXiv.

[14]  Xiaodong Lin,et al.  A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications , 2014, GLOBECOM 2014.

[15]  Gene Tsudik,et al.  QUEST Software and , 2022 .

[16]  Elaine Shi,et al.  Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.

[17]  Ming Li,et al.  Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[18]  Rongxing Lu,et al.  Privacy-Enhancing Aggregation Techniques for Smart Grid Communications , 2016, Wireless Networks.

[19]  Tao Zhang,et al.  The emerging era of fog computing and networking [The President's Page] , 2016, IEEE Commun. Mag..

[20]  Vinod Vaikuntanathan,et al.  Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.

[21]  Debiao He,et al.  Privacy-preserving data aggregation scheme against internal attackers in smart grids , 2016, Wirel. Networks.

[22]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[23]  Xiaodong Lin,et al.  MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications , 2015, Peer Peer Netw. Appl..

[24]  Burak Kantarci,et al.  Anchor-Assisted and Vote-Based Trustworthiness Assurance in Smart City Crowdsensing , 2016, IEEE Access.

[25]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[26]  Rongxing Lu,et al.  PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications , 2015, Secur. Commun. Networks.

[27]  Rongxing Lu,et al.  A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications , 2015, IEEE Internet of Things Journal.

[28]  Kwok-Yan Lam,et al.  Identity in the Internet-of-Things (IoT): New Challenges and Opportunities , 2016, ICICS.

[29]  Siu Loon Hoe,et al.  Defining a smart nation: the case of Singapore , 2016, J. Inf. Commun. Ethics Soc..

[30]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[31]  Xiaodong Lin,et al.  LPDA: A lightweight privacy-preserving data aggregation scheme for smart grid , 2012, 2012 International Conference on Wireless Communications and Signal Processing (WCSP).

[32]  Elaine Shi,et al.  Privacy-Preserving Stream Aggregation with Fault Tolerance , 2012, Financial Cryptography.

[33]  Haiyong Bao,et al.  A lightweight privacy‐preserving scheme with data integrity for smart grid communications , 2016, Concurr. Comput. Pract. Exp..