Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing

With the rapid development of the Internet of Things (IoT), a large number of IoT device data has flooded into cloud computing service centers, which has greatly increased the data processing task of cloud computing. To alleviate this situation, IoT enabled fog computing comes into being and it is necessary to aggregate the collected data of multiple IoT devices at the fog node. In this paper, we consider a privacy-aware data collection and aggregation scheme for fog computing. Although the fog node and the cloud control center are honest-but-curious, the proposed scheme also ensures that the data privacy will not be leaked. Our security and performance analysis indicates that the proposed scheme is secure and efficient in terms of computation and communication cost.

[1]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[2]  I-En Liao,et al.  A model for aggregation and filtering on encrypted XML streams in fog computing , 2017, Int. J. Distributed Sens. Networks.

[3]  H. Li,et al.  Identity-based construction for secure and efficient handoff authentication schemes in wireless networks , 2012, Secur. Commun. Networks.

[4]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[5]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[6]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[7]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[8]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[9]  Jie Ling,et al.  Secure and fine-grained access control on e-healthcare records in mobile cloud computing , 2018, Future Gener. Comput. Syst..

[10]  Xiaolei Dong,et al.  Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid , 2014, IEEE Systems Journal.

[11]  Sherali Zeadally,et al.  Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries , 2017, IEEE Transactions on Smart Grid.

[12]  Jin Li,et al.  Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks , 2014, Comput. Networks.

[13]  Kemal Akkaya,et al.  Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network , 2017, IEEE Internet of Things Journal.

[14]  Yixian Yang,et al.  Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.

[15]  Josep Domingo-Ferrer,et al.  Anonymous and secure aggregation scheme in fog-based public cloud computing , 2018, Future Gener. Comput. Syst..

[16]  Mario Nemirovsky,et al.  Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[17]  Jin Li,et al.  FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[18]  Ivan Stojmenovic,et al.  Fog computing: A cloud to the ground support for smart things and machine-to-machine networks , 2014, 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC).

[19]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[20]  Jin Li,et al.  Efficient attribute-based data sharing in mobile clouds , 2016, Pervasive Mob. Comput..

[21]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[22]  Jin Li,et al.  Anonymous attribute-based proxy re-encryption for access control in cloud computing , 2016, Secur. Commun. Networks.

[23]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[24]  Fatos Xhafa,et al.  Privacy-aware attribute-based PHR sharing with user accountability in cloud computing , 2014, The Journal of Supercomputing.

[25]  Jin Li,et al.  Anonymous attribute-based encryption supporting efficient decryption test , 2013, ASIA CCS '13.

[26]  Leandros Maglaras,et al.  Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.

[27]  Amin Hosseinian-Far,et al.  Emerging Trends in Cloud Computing, Big Data, Fog Computing, IoT and Smart Living , 2018 .

[28]  Qi Han,et al.  Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks , 2012, NSS.