Data security in multiparty edge computing environments

The paper considers data security issues in edge computing scenarios that involve data streams coming out from individual devices to edge controllers (ECs). We assume multiple edge controllers each possibly belonging to a different party and controlling some devices. In this environment, there are issues in regards to the scalability of key management and computation limitations at the edge of the network. To address these issues, we suggest the formation of groups in the device layer, where a group leader is assigned to communicate with group devices and the EC. We propose a lightweight permutation mechanism for preserving the confidentiality of sensory data. Keywords—Edge Computing; Data Security; IoT; Multitenancy; Scalability; Access Control

[1]  Lei Wei,et al.  Garbled Circuits via Structured Encryption , 2013, Financial Cryptography Workshops.

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Bernhard Walke,et al.  The IEEE 802.11 universe , 2010, IEEE Communications Magazine.

[4]  Sushil Jajodia,et al.  Minimum cost rule enforcement for cooperative database access , 2016, J. Comput. Secur..

[5]  Krishna Kant,et al.  A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid , 2017, SECRYPT.

[6]  Josep Domingo-Ferrer,et al.  Individual Differential Privacy: A Utility-Preserving Formulation of Differential Privacy Guarantees , 2016, IEEE Transactions on Information Forensics and Security.

[7]  Krishna Kant,et al.  A lightweight integrity protection scheme for low latency smart grid applications , 2019, Comput. Secur..

[8]  Adam O'Neill,et al.  Privacy-preserving Network Provenance , 2017, Proc. VLDB Endow..

[9]  Melissa Chase,et al.  Structured Encryption and Controlled Disclosure , 2010, IACR Cryptol. ePrint Arch..

[10]  Amitangshu Pal,et al.  IoT-Based Sensing and Communications Infrastructure for the Fresh Food Supply Chain , 2018, Computer.

[11]  Mihir Bellare,et al.  "Pseudo-Random" Number Generation Within Cryptographic Algorithms: The DDS Case , 1997, CRYPTO.

[12]  Ling Liu,et al.  Output privacy in data mining , 2011, TODS.

[13]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[14]  Charalampos Papamanthou,et al.  Dynamic searchable symmetric encryption , 2012, IACR Cryptol. ePrint Arch..

[15]  Philippe Oechslin,et al.  Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.

[16]  Rafail Ostrovsky,et al.  Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.

[17]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.