Skip to main content

An Efficient Privacy-Preserving Data Aggregation Scheme for IoT

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10874))

Abstract

Internet of Things (IoT) provides the most flexibility and convenience in our various daily applications as the IoT devices can improve efficiency, accuracy and economic benefit in addition to reduced human intervention. However, security and privacy challenges are also arising in IoT. To address this challenge, in this paper, we present a privacy-preserving data aggregation scheme for IoT to preserve privacy of customers. In our scheme, the IoT devices slice their actual data, keep one piece to themselves, and send the remaining pieces to other group devices via symmetric key. Then each IoT device adds the received slices and the held piece together to get immediate result, which should be sent to the server after the computation. Finally, analysis shows that our scheme can guarantee the integrity, confidentiality of IoT device’s data, and can resist external attack, internal attack and collusion attack and so on.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alrawais, A., Alhothaily, A., Hu, C., Cheng, X.: Fog computing for the internet of things: security and privacy issues. IEEE Internet Comput. 21(2), 34–42 (2017)

    Article  Google Scholar 

  2. Bao, H., Lu, R.: A new differentially private data aggregation with fault tolerance for smart grid communications. IEEE Internet Things J. 2(3), 248–258 (2015)

    Article  Google Scholar 

  3. Bao, H., Lu, R.: Comment on privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Ind. Inform. 12(1), 2–5 (2016)

    Article  Google Scholar 

  4. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secur. Comput., 1 (2017)

    Google Scholar 

  5. Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng., 1 (2018)

    Google Scholar 

  6. Erkin, Z., Troncoso-Pastoriza, J.R., Lagendijk, R.L., Perez-Gonzalez, F.: Privacy-preserving data aggregation in smart metering systems: an overview. IEEE Signal Process. Mag. 30(2), 75–86 (2013)

    Article  Google Scholar 

  7. Fan, C.I., Huang, S.Y., Lai, Y.L.: Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Ind. Inform. 10(1), 666–675 (2014)

    Article  Google Scholar 

  8. Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007(1), 1–10 (2007)

    Google Scholar 

  9. He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)

    Article  Google Scholar 

  10. Hu, C., Cheng, X., Yu, J., Tian, Z., Lv, W., Chen, X.: Achieving privacy preservation and billing via delayed information release. IEEE Trans. Comput. (2018, submitted)

    Google Scholar 

  11. Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X., Chen, D.: OPFKA: secure and efficient ordered-physiological-feature-based key agreement for wireless body area networks. In: 2013 Proceedings of IEEE INFOCOM, pp. 2274–2282. IEEE (2013)

    Google Scholar 

  12. Hu, C., Huo, Y., Ma, L., Liu, H., Deng, S., Feng, L.: An attribute-based secure and scalable scheme for data communications in smart grids. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds.) WASA 2017. LNCS, vol. 10251, pp. 469–482. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60033-8_41

    Chapter  Google Scholar 

  13. Hu, C., Li, H., Huo, Y., Xiang, T., Liao, X.: Secure and efficient data communication protocol for wireless body area networks. IEEE Trans. Multi-Scale Comput. Syst. 2(2), 94–107 (2016)

    Article  Google Scholar 

  14. Hu, C., Li, W., Cheng, X., Yu, J., Wang, S., Rongfang, B.: A secure and verifiable access control scheme for big data storage in clouds. IEEE Trans. Big Data, 1 (2017)

    Google Scholar 

  15. Hu, C., Liu, H., Ma, L., Huo, Y., Alrawais, A., Li, X., Li, H., Xiong, Q.: A secure and scalable data communication scheme in smart grids. Wirel. Commun. Mob. Comput. 2018, 1–17 (2018)

    Google Scholar 

  16. Hu, C., Yu, J., Cheng, X., Tian, Z., Akkaya, K., Sun, L.: CP_ABSC: an attribute-based signcryption scheme to secure multicast communications in smart grids. Math. Found. Comput. 1(1), 77–100 (2018)

    Google Scholar 

  17. Hu, C., Zhang, N., Li, H., Cheng, X., Liao, X.: Body area network security: a fuzzy attribute-based signcryption scheme. IEEE J. Sel. Areas Commun. 31(9), 37–46 (2013)

    Article  Google Scholar 

  18. Huang, L., Fan, X., Huo, Y., Hu, C., Tian, Y., Qian, J.: A novel cooperative jamming scheme for wireless social networks without known CSI. IEEE Access 5, 26476–26486 (2017)

    Article  Google Scholar 

  19. Huo, Y., Dong, W., Qian, J., Jing, T.: Coalition game-based secure and effective clustering communication in vehicular cyber-physical system (VCPS). Sensors 17(3), 475 (2017)

    Article  Google Scholar 

  20. Huo, Y., Hu, C., Qi, X., Jing, T.: LoDPD: a location difference-based proximity detection protocol for fog computing. IEEE Internet Things J. 4(5), 1117–1124 (2017)

    Article  Google Scholar 

  21. Huo, Y., Tian, Y., Ma, L., Cheng, X., Jing, T.: Jamming strategies for physical layer security. IEEE Wirel. Commun. 25(1), 148–153 (2018)

    Article  Google Scholar 

  22. Li, H., Lin, X., Yang, H., Liang, X., Lu, R., Shen, X.: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 25(8), 2053–2064 (2014)

    Article  Google Scholar 

  23. Li, R., Song, T., Capurso, N., Yu, J., Couture, J., Cheng, X.: IoT applications on secure smart shopping system. IEEE Internet Things J. 4(6), 1945–1954 (2017)

    Article  Google Scholar 

  24. Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. (2018, to appear)

    Google Scholar 

  25. Lu, Y., Zhao, Z., Zhang, B., Ma, L., Huo, Y., Jing, G.: A context-aware budget-constrained targeted advertising system for vehicular networks. IEEE Access 6, 8704–8713 (2018)

    Article  Google Scholar 

  26. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  27. Saputro, N., Akkaya, K.: Performance evaluation of smart grid data aggregation via homomorphic encryption. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2945–2950. IEEE (2012)

    Google Scholar 

  28. Shim, K.A., Park, C.M.: A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(8), 2128–2139 (2015)

    Article  Google Scholar 

  29. Song, T., Li, R., Mei, B., Yu, J., Xing, X., Cheng, X.: A privacy preserving communication protocol for IoT applications in smart homes. IEEE Internet Things J. 4(6), 1844–1852 (2017)

    Article  Google Scholar 

  30. Thai, C.D.T., Lee, J., Ryu, J.Y., Quek, T.Q.: Privacy preservation with channel-based jamming for data aggregation in smart grids. In: 2017 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2017)

    Google Scholar 

  31. Xing, K., Hu, C., Yu, J., Cheng, X., Zhang, F.: Mutual privacy preserving k-means clustering in social participatory sensing. IEEE Trans. Ind. Inform. 13(4), 2066–2076 (2017)

    Article  Google Scholar 

  32. Zheng, X., Cai, Z., Li, Y.: Data linkage in smart IoT systems: a consideration from privacy perspective. IEEE Commun. Mag. (2018, to appear)

    Google Scholar 

Download references

Acknowledgments

Thank all the reviewers for their helpful comments. This project was partial supported by the National Key R&D Program of China (No. 2017YFB0802000), the National Natural Science Foundation of China (Grant No. 61702062, 61672118, 61672321, 61373027), Science and Technology Project of Guangdong Power Grid Co. Ltd. (GDKJXM20180250), and Chongqing Research Program of Basic Research and Frontier Technology (No. cstc2014jcyjA40030).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunqiang Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, C. et al. (2018). An Efficient Privacy-Preserving Data Aggregation Scheme for IoT. In: Chellappan, S., Cheng, W., Li, W. (eds) Wireless Algorithms, Systems, and Applications. WASA 2018. Lecture Notes in Computer Science(), vol 10874. Springer, Cham. https://doi.org/10.1007/978-3-319-94268-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94268-1_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94267-4

  • Online ISBN: 978-3-319-94268-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics