Skip to main content
Top

2018 | OriginalPaper | Chapter

Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing

Authors : Yinghui Zhang, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the rapid development of the Internet of Things (IoT), a large number of IoT device data has flooded into cloud computing service centers, which has greatly increased the data processing task of cloud computing. To alleviate this situation, IoT enabled fog computing comes into being and it is necessary to aggregate the collected data of multiple IoT devices at the fog node. In this paper, we consider a privacy-aware data collection and aggregation scheme for fog computing. Although the fog node and the cloud control center are honest-but-curious, the proposed scheme also ensures that the data privacy will not be leaked. Our security and performance analysis indicates that the proposed scheme is secure and efficient in terms of computation and communication cost.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRef Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)CrossRef
2.
go back to reference Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012) Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)
4.
go back to reference He, D., Kumar, N., Zeadally, S., Vinel, A., Yang, L.T.: Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans. Smart Grid 8(5), 2411–2419 (2017)CrossRef He, D., Kumar, N., Zeadally, S., Vinel, A., Yang, L.T.: Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans. Smart Grid 8(5), 2411–2419 (2017)CrossRef
6.
go back to reference Huang, J.Y., Hong, W.C., Tsai, P.S., Liao, I.E.: A model for aggregation and filtering on encrypted XML streams in fog computing. Int. J. Distrib. Sens. Netw. 13(5), 1–14 (2017)CrossRef Huang, J.Y., Hong, W.C., Tsai, P.S., Liao, I.E.: A model for aggregation and filtering on encrypted XML streams in fog computing. Int. J. Distrib. Sens. Netw. 13(5), 1–14 (2017)CrossRef
7.
go back to reference Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things. IEEE Access 5, 12941–12950 (2017)CrossRef Huang, Q., Yang, Y., Wang, L.: Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things. IEEE Access 5, 12941–12950 (2017)CrossRef
8.
go back to reference Jia, W., Zhu, H., Cao, Z., Dong, X., Xiao, C.: Human-factor-aware privacy-preserving aggregation in smart grid. IEEE Syst. J. 8(2), 598–607 (2014)CrossRef Jia, W., Zhu, H., Cao, Z., Dong, X., Xiao, C.: Human-factor-aware privacy-preserving aggregation in smart grid. IEEE Syst. J. 8(2), 598–607 (2014)CrossRef
9.
go back to reference Liu, Y., Zhang, Y., Ling, J., Liu, Z.: Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener. Comput. Syst. 78, 1020–1026 (2018)CrossRef Liu, Y., Zhang, Y., Ling, J., Liu, Z.: Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener. Comput. Syst. 78, 1020–1026 (2018)CrossRef
10.
go back to reference Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302–3312 (2017)CrossRef Lu, R., Heung, K., Lashkari, A.H., Ghorbani, A.A.: A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5, 3302–3312 (2017)CrossRef
11.
go back to reference Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)CrossRef Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)CrossRef
12.
go back to reference Mahmoud, M., Saputro, N., Akula, P., Akkaya, K.: Privacy-preserving power injection over a hybrid AMI/LTE smart grid network. IEEE IoT J. 4(4), 870–880 (2016) Mahmoud, M., Saputro, N., Akula, P., Akkaya, K.: Privacy-preserving power injection over a hybrid AMI/LTE smart grid network. IEEE IoT J. 4(4), 870–880 (2016)
13.
go back to reference Mell, P.M., Grance, T.: SP 800–145. The NIST definition of cloud computing (2011) Mell, P.M., Grance, T.: SP 800–145. The NIST definition of cloud computing (2011)
14.
go back to reference Mukherjee, M., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293–19304 (2017)CrossRef Mukherjee, M., et al.: Security and privacy in fog computing: challenges. IEEE Access 5, 19293–19304 (2017)CrossRef
16.
go back to reference Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964–975 (2018)CrossRef Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964–975 (2018)CrossRef
17.
go back to reference Stojmenovic, I.: Fog computing: a cloud to the ground support for smart things and machine-to-machine networks. In: 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC), pp. 117–122 (2015) Stojmenovic, I.: Fog computing: a cloud to the ground support for smart things and machine-to-machine networks. In: 2014 Australasian Telecommunication Networks and Applications Conference (ATNAC), pp. 117–122 (2015)
18.
go back to reference Wang, H., Wang, Z., Domingo-Ferrer, J.: Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener. Comput. Syst. 78, 712–719 (2018)CrossRef Wang, H., Wang, Z., Domingo-Ferrer, J.: Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gener. Comput. Syst. 78, 712–719 (2018)CrossRef
19.
go back to reference Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J.: Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5), 1607–1619 (2015)CrossRef Xhafa, F., Feng, J., Zhang, Y., Chen, X., Li, J.: Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5), 1607–1619 (2015)CrossRef
20.
go back to reference Yannuzzi, M., Milito, R., Serral-Gracia, R., Montero, D., Nemirovsky, M.: Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, pp. 325–329 (2015) Yannuzzi, M., Milito, R., Serral-Gracia, R., Montero, D., Nemirovsky, M.: Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, pp. 325–329 (2015)
21.
go back to reference Zhang, Y., Zheng, D., Deng, R.H.: Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE IoT J. 5(3), 2130–2145 (2018) Zhang, Y., Zheng, D., Deng, R.H.: Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE IoT J. 5(3), 2130–2145 (2018)
22.
go back to reference Zhang, Y.H., Chen, X.F., Li, H., Cao, J.: Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. Secur. Commun. Netw. 5(10), 1121–1130 (2012)CrossRef Zhang, Y.H., Chen, X.F., Li, H., Cao, J.: Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. Secur. Commun. Netw. 5(10), 1121–1130 (2012)CrossRef
23.
go back to reference Zhang, Y., Chen, X., Li, J., Li, H.: Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Comput. Netw. 75, 192–211 (2014)CrossRef Zhang, Y., Chen, X., Li, J., Li, H.: Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Comput. Netw. 75, 192–211 (2014)CrossRef
24.
go back to reference Zhang, Y., Chen, X., Li, J., Li, H., Li, F.: FDR-ABE: attribute-based encryption with flexible and direct revocation. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 38–45. IEEE (2013) Zhang, Y., Chen, X., Li, J., Li, H., Li, F.: FDR-ABE: attribute-based encryption with flexible and direct revocation. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 38–45. IEEE (2013)
25.
go back to reference Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security ASIA CCS 2013, pp. 511–516. ACM, New York (2013) Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security ASIA CCS 2013, pp. 511–516. ACM, New York (2013)
26.
go back to reference Zhang, Y., Li, J., Chen, X., Li, H.: Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur. Commun. Netw. 9(14), 2397–2411 (2016)CrossRef Zhang, Y., Li, J., Chen, X., Li, H.: Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur. Commun. Netw. 9(14), 2397–2411 (2016)CrossRef
27.
go back to reference Zhang, Y., Zhao, J., Zheng, D.: Efficient and privacy-aware power injection over AMI and smart grid slice in future 5G networks. Mobile Inf. Syst. 2017, 1–11 (2017) Zhang, Y., Zhao, J., Zheng, D.: Efficient and privacy-aware power injection over AMI and smart grid slice in future 5G networks. Mobile Inf. Syst. 2017, 1–11 (2017)
28.
go back to reference Zhang, Y., Zheng, D., Chen, X., Li, J., Li, H.: Efficient attribute-based data sharing in mobile clouds. Pervasive Mobile Comput. 28, 135–149 (2016)CrossRef Zhang, Y., Zheng, D., Chen, X., Li, J., Li, H.: Efficient attribute-based data sharing in mobile clouds. Pervasive Mobile Comput. 28, 135–149 (2016)CrossRef
Metadata
Title
Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing
Authors
Yinghui Zhang
Jiangfan Zhao
Dong Zheng
Kaixin Deng
Fangyuan Ren
Xiaokun Zheng
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_44

Premium Partner