MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT

High-speed Internet becomes more widely accessible, the cost of connecting devices is reducing, more devices are being created with Wi-Fi abilities and sensors are built into those devices, technology costs are cost-effective. All of these things are creating a ``storm" for the Internet of Things (IoT) era. With the emergence of the Internet of Things, connect things through internet, there are many devices that are providing data. The more devices, the more data. If these devices want to share data with the aim of achieving abstract knowledge, they need to pass through the network. Some devices provide sensitive information that can be time. We should protect these sensitive data, from unwanted disclosure that is called privacy. In other words, privacy preserving of data is one of the main problems of IoT devices, protecting sensitive data against unauthorized users when we do analysis and even transferring data. To achieve this in this paper, we propose a new method based on modular arithmetic for privacy-preserving when IoT devices produce sensitive time label called MAPP. We applied Number Theory, Modular Arithmetic to achieve that aim. We used CupCarbon 3.0 for simulation and evaluating our proposed method. Performance evaluation shows that our proposed method has good performance from the energy consumption point of view.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  M. Tahar Kechadi,et al.  CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.

[3]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[4]  Ji Zhang,et al.  NSSSD: A new semantic hierarchical storage for sensor data , 2016, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[5]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[6]  Wei Wang,et al.  A Survey of Body Sensor Networks , 2013, Sensors.

[7]  Zheng Yan,et al.  A Review on Privacy-Preserving Data Mining , 2014, 2014 IEEE International Conference on Computer and Information Technology.

[8]  Alberto Eduardo Cerpa Sensor Networks Challenges for Intelligent Buildings , 2006 .

[9]  Chris Clifton,et al.  Privacy preserving data mining over vertically partitioned data , 2004 .

[10]  Qi Wang,et al.  Random-data perturbation techniques and privacy-preserving data mining , 2005, Knowledge and Information Systems.

[11]  Pallavi Sharma,et al.  A Coherent Technique for Privacy Preservation in Data Mining Using Classification , 2016 .

[12]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[13]  Jing Wang,et al.  Automatic text summarization using fuzzy inference , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).

[14]  Md. Zakirul Alam Bhuiyan,et al.  A Survey on Deep Learning in Big Data , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[15]  Bang Wang,et al.  Effective placement of femtocell base stations in commercial buildings , 2014, 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN).

[16]  M. Castro,et al.  Data Randomization , 2008 .

[17]  Thomas A. Henzinger,et al.  The Embedded Systems Design Challenge , 2006, FM.

[18]  Mehdi Gheisari,et al.  An Evaluation of Proposed Systems of Sensor Datas Storage in Total Data Parameter , 2012 .

[19]  Qi Wang,et al.  On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.

[20]  Steven Barker Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security , 2008 .

[21]  Xiaolin Zhang,et al.  Research on privacy preserving classification data mining based on random perturbation , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).

[22]  Lei Yang,et al.  A multi-cloud based privacy-preserving data publishing scheme for the internet of things , 2016, ACSAC.

[23]  Md Zakirul Alam Bhuiyan,et al.  Maintaining the Balance between Privacy and Data Integrity in Internet of Things , 2017, ICMSS '17.

[24]  Seyed Mojtaba Hosseini Bamakan,et al.  Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem , 2017, Knowl. Based Syst..

[25]  Anirban Basu,et al.  Privacy-friendly secure bidding scheme for demand response in smart grid , 2015, 2015 IEEE First International Smart Cities Conference (ISC2).