An IoT data sharing privacy preserving scheme

The massive data collection, transmission, storage and processing in IoT are challenging to the cloud computing environment. Aiming at the problem of data sharing and privacy protection of IoT, this paper designed an IoT data sharing model that is based on the edge computing service. The model establishes the virtual data management service by the data abstraction in the edge service layer to provide data service for IoT devices, and further proposed a privacy preserving scheme for data sharing based on attribute encryption. The scheme realized anonymous data sharing and access control and finally is proved to be secure and has a good performance.

[1]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[2]  Shen Su,et al.  Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment , 2019, IEEE Transactions on Industrial Informatics.

[3]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[4]  Peter Corcoran,et al.  Mobile-Edge Computing and the Internet of Things for Consumers: Extending cloud computing and services to the edge of the network , 2016, IEEE Consumer Electronics Magazine.

[5]  Mahadev Satyanarayanan,et al.  The Emergence of Edge Computing , 2017, Computer.

[6]  Mohsen Guizani,et al.  A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[7]  Changjun Hu,et al.  Process Materials Scientific Data for Intelligent Service Using a Dataspace Model , 2016 .

[8]  Xiaojiang Du,et al.  Self-healing sensor networks with distributed decision making , 2007, Int. J. Sens. Networks.

[9]  Xiang Chen,et al.  Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.

[10]  Xiaojiang Du,et al.  Achieving big data privacy via hybrid cloud , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[11]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[12]  Liang Xiao,et al.  Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.

[13]  Jiankun Hu,et al.  Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection , 2018, IEEE Transactions on Information Forensics and Security.

[14]  Xiaojiang Du,et al.  A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows , 2016, 2016 IEEE International Conference on Communications (ICC).

[15]  David Maier,et al.  From databases to dataspaces: a new abstraction for information management , 2005, SGMD.

[16]  Xiaojiang Du,et al.  A Distributed Deep Learning System for Web Attack Detection on Edge Devices , 2020, IEEE Transactions on Industrial Informatics.

[17]  Haoyu Wang,et al.  HealthEdge: Task scheduling for edge computing with health emergency and human behavior consideration in smart homes , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[18]  Toshihiko Yamakami An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Coordination , 2018, 2018 18th International Symposium on Communications and Information Technologies (ISCIT).

[19]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[20]  Quan Zhang,et al.  Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts , 2018, IEEE Internet of Things Journal.

[21]  Mohsen Guizani,et al.  Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles , 2019, IEEE Internet of Things Journal.

[22]  Mohsen Guizani,et al.  Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[23]  Hideki Imai,et al.  Dual-Policy Attribute Based Encryption , 2009, ACNS.