Skip to main content
Erschienen in: Wireless Personal Communications 3/2021

31.08.2020

Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments

verfasst von: Meng Zhao, Yong Ding, Qianhong Wu, Yujue Wang, Bo Qin, Kefeng Fan

Erschienen in: Wireless Personal Communications | Ausgabe 3/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The fast development of Internet of Things (IoT) has shown that it becomes one of the most popular techniques. In the IoT paradigm, ubiquitous sensors and smart devices can be interconnected to collect various status data and share with others. When deployed in an environment status monitoring system, distributed sensors may be requested to periodically report real-time data. The large-scale data would make the system controller unable to process in time. In this case, a third-party server can be engaged to conduct most of monitoring work, where sensors direct report to the server to generate intermediate monitoring results for the system controller. However, the server may be curious about the contents of outsourced system standing queries, data vectors of sensors, and monitoring results. In addition, due to the limited computing resources of distributed sensors, existing cryptographic solutions are not applicable to such monitoring scenario. To address these issues, this paper proposes a lightweight server-aided data monitoring scheme (SIM). Thorough efficiency and privacy analysis confirm the practicality of the proposed SIM scheme. Moreover, this paper extends Lu et al.’s privacy-preserving cosine similarity computing protocol in the two-party setting in big data environment to support computing on any dimensional data, without incurring expensive calculations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lv, Z., Bin, H., & Lv, H. (2020). Infrastructure monitoring and operation for smart cities based on iot system. IEEE Transactions on Industrial Informatics, 16(3), 1957–1962.CrossRef Lv, Z., Bin, H., & Lv, H. (2020). Infrastructure monitoring and operation for smart cities based on iot system. IEEE Transactions on Industrial Informatics, 16(3), 1957–1962.CrossRef
2.
Zurück zum Zitat Ding, X., Pang, H., & Lai, J. (2013). Verifiable and private top-k monitoring. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS’13 (pp. 553–558). New York, NY, USA: ACM. Ding, X., Pang, H., & Lai, J. (2013). Verifiable and private top-k monitoring. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS’13 (pp. 553–558). New York, NY, USA: ACM.
3.
Zurück zum Zitat Wang, Y., Pang, H. H., Yang, Y., & Ding, X. (2017). Secure server-aided top-k monitoring. Information Sciences, 420, 345–363.CrossRef Wang, Y., Pang, H. H., Yang, Y., & Ding, X. (2017). Secure server-aided top-k monitoring. Information Sciences, 420, 345–363.CrossRef
4.
Zurück zum Zitat Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficient and privacy-preserving computing in big data era. IEEE Network, 28(4), 46–50.CrossRef Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficient and privacy-preserving computing in big data era. IEEE Network, 28(4), 46–50.CrossRef
5.
Zurück zum Zitat Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279.CrossRef Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279.CrossRef
6.
Zurück zum Zitat Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10–28.CrossRef Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10–28.CrossRef
7.
Zurück zum Zitat Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.CrossRef
8.
Zurück zum Zitat Jaloudi, S. (2019). Communication protocols of an industrial internet of things environment: A comparative study. Future Internet, 11(3), 66.CrossRef Jaloudi, S. (2019). Communication protocols of an industrial internet of things environment: A comparative study. Future Internet, 11(3), 66.CrossRef
9.
Zurück zum Zitat Hernández-Ramos, J. L., Pawlowski, M. P., Jara, A. J., Skarmeta, A. F., & Ladid, L. (2015). Toward a lightweight authentication and authorization framework for smart objects. IEEE Journal on Selected Areas in Communications, 33(4), 690–702.CrossRef Hernández-Ramos, J. L., Pawlowski, M. P., Jara, A. J., Skarmeta, A. F., & Ladid, L. (2015). Toward a lightweight authentication and authorization framework for smart objects. IEEE Journal on Selected Areas in Communications, 33(4), 690–702.CrossRef
10.
Zurück zum Zitat Hernández-Ramos, J. L., Bernabe, J. B., Moreno, M. V., & Skarmeta, A. F. (2015). Preserving smart objects privacy through anonymous and accountable access control for a m2m-enabled internet of things. Sensors, 15(7), 15611–15639.CrossRef Hernández-Ramos, J. L., Bernabe, J. B., Moreno, M. V., & Skarmeta, A. F. (2015). Preserving smart objects privacy through anonymous and accountable access control for a m2m-enabled internet of things. Sensors, 15(7), 15611–15639.CrossRef
11.
Zurück zum Zitat Tonyali, S., Akkaya, K., Saputro, N., Uluagac, A. S., & Nojoumian, M. (2018). Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems. Future Generation Computer Systems, 78, 547–557.CrossRef Tonyali, S., Akkaya, K., Saputro, N., Uluagac, A. S., & Nojoumian, M. (2018). Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems. Future Generation Computer Systems, 78, 547–557.CrossRef
12.
Zurück zum Zitat Jiang, H., Shen, F., Chen, S., Li, K.-C., & Jeong, Y.-S. (2015). A secure and scalable storage system for aggregate data in iot. Future Generation Computer Systems, 49, 133–141.CrossRef Jiang, H., Shen, F., Chen, S., Li, K.-C., & Jeong, Y.-S. (2015). A secure and scalable storage system for aggregate data in iot. Future Generation Computer Systems, 49, 133–141.CrossRef
13.
Zurück zum Zitat González-Manzano, L., de Fuentes, J. M., Pastrana, S., Peris-Lopez, P., & Hernández-Encinas, L. (2016). PAgIoT–Privacy-preserving Aggregation protocol for Internet of Things. Journal of Network and Computer Applications, 71, 59–71.CrossRef González-Manzano, L., de Fuentes, J. M., Pastrana, S., Peris-Lopez, P., & Hernández-Encinas, L. (2016). PAgIoT–Privacy-preserving Aggregation protocol for Internet of Things. Journal of Network and Computer Applications, 71, 59–71.CrossRef
14.
Zurück zum Zitat Yang, M., Zhu, T., Liu, B., Xiang, Y., & Zhou, W. (2018). Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access, 6, 17119–17129.CrossRef Yang, M., Zhu, T., Liu, B., Xiang, Y., & Zhou, W. (2018). Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access, 6, 17119–17129.CrossRef
15.
Zurück zum Zitat Yang, J., Wang, C., Zhao, Q., Jiang, B., Lv, Z., & Sangaiah, A. K. (2018). Marine surveying and mapping system based on cloud computing and internet of things. Future Generation Computer Systems, 85, 39–50.CrossRef Yang, J., Wang, C., Zhao, Q., Jiang, B., Lv, Z., & Sangaiah, A. K. (2018). Marine surveying and mapping system based on cloud computing and internet of things. Future Generation Computer Systems, 85, 39–50.CrossRef
16.
Zurück zum Zitat Puliafito, A., Celesti, A., Villari, M., & Fazio, M. (2015). Towards the integration between iot and cloud computing: an approach for the secure self-configuration of embedded devices. International Journal of Distributed Sensor Networks, 11(12), 286860.CrossRef Puliafito, A., Celesti, A., Villari, M., & Fazio, M. (2015). Towards the integration between iot and cloud computing: an approach for the secure self-configuration of embedded devices. International Journal of Distributed Sensor Networks, 11(12), 286860.CrossRef
17.
Zurück zum Zitat Salhaoui, M., Guerrero-González, A., Arioua, M., Ortiz, F. J., El Oualkadi, A., & Torregrosa, C. L. (2019). Smart industrial iot monitoring and control system based on uav and cloud computing applied to a concrete plant. Sensors, 19(15), 3316.CrossRef Salhaoui, M., Guerrero-González, A., Arioua, M., Ortiz, F. J., El Oualkadi, A., & Torregrosa, C. L. (2019). Smart industrial iot monitoring and control system based on uav and cloud computing applied to a concrete plant. Sensors, 19(15), 3316.CrossRef
18.
Zurück zum Zitat Qin, B., Wang, L., Wang, Y., Wu, Q., Shi, W., & Liang, B. (2016). Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks. Concurrency and Computation: Practice and Experience, 28(10), 2920–2939.CrossRef Qin, B., Wang, L., Wang, Y., Wu, Q., Shi, W., & Liang, B. (2016). Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks. Concurrency and Computation: Practice and Experience, 28(10), 2920–2939.CrossRef
19.
Zurück zum Zitat Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for iot under eavesdropper collusion. IEEE Transactions on Automation Science and Engineering, 13(3), 1281–1293.CrossRef Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for iot under eavesdropper collusion. IEEE Transactions on Automation Science and Engineering, 13(3), 1281–1293.CrossRef
20.
Zurück zum Zitat Lindner, W., & Meier, J. (2006). Towards a secure data stream management system. In Proceedings of the 31st VLDB Conference on Trends in Enterprise Application Architecture, TEAA’05 (pp. 114–128), Berlin, Heidelberg: Springer-Verlag. Lindner, W., & Meier, J. (2006). Towards a secure data stream management system. In Proceedings of the 31st VLDB Conference on Trends in Enterprise Application Architecture, TEAA’05 (pp. 114–128), Berlin, Heidelberg: Springer-Verlag.
21.
Zurück zum Zitat Aggarwal, C. C. (2007). On randomization, public information and the curse of dimensionality. In 2007 IEEE 23rd International Conference on Data Engineering (pp. 136–145). Aggarwal, C. C. (2007). On randomization, public information and the curse of dimensionality. In 2007 IEEE 23rd International Conference on Data Engineering (pp. 136–145).
22.
Zurück zum Zitat Xu, Y., Wang, K., Fu, A. W.-C., She, R., & Pei, J. (2008). Privacy-preserving data stream classification. In Aggarwal, C. C., & Yu, P. S. (Eds.), Privacy-Preserving Data Mining: Models and Algorithms (pp. 487–510). Boston, MA: Springer US. Xu, Y., Wang, K., Fu, A. W.-C., She, R., & Pei, J. (2008). Privacy-preserving data stream classification. In Aggarwal, C. C., & Yu, P. S. (Eds.), Privacy-Preserving Data Mining: Models and Algorithms (pp. 487–510). Boston, MA: Springer US.
23.
Zurück zum Zitat Ostrovsky , R., & Skeith, W. E. (2005). Private Searching on Streaming Data. In Shoup, V. (Ed.), Advances in Cryptology—CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 223–240). Berlin, Heidelberg: Springer Berlin Heidelberg. Ostrovsky , R., & Skeith, W. E. (2005). Private Searching on Streaming Data. In Shoup, V. (Ed.), Advances in Cryptology—CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 223–240). Berlin, Heidelberg: Springer Berlin Heidelberg.
24.
Zurück zum Zitat Bethencourt, J., Song, D. X., & Waters, B. (2006). New Constructions and Practical Applications for Private Stream Searching. In 2006 IEEE Symposium on Security and Privacy (SP’06) (pp. 132–139). Bethencourt, J., Song, D. X., & Waters, B. (2006). New Constructions and Practical Applications for Private Stream Searching. In 2006 IEEE Symposium on Security and Privacy (SP’06) (pp. 132–139).
25.
Zurück zum Zitat Papadopoulos, S., Cormode, G., Deligiannakis, A., & Garofalakis, M. (2013). Lightweight authentication of linear algebraic queries on data streams. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, SIGMOD ’13 (pp. 881–892). New York, NY, USA: ACM. Papadopoulos, S., Cormode, G., Deligiannakis, A., & Garofalakis, M. (2013). Lightweight authentication of linear algebraic queries on data streams. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, SIGMOD ’13 (pp. 881–892). New York, NY, USA: ACM.
26.
Zurück zum Zitat Boneh, D., Lynn, B., & Shacham, H. (2004). Short signatures from the weil pairing. Journal of Cryptology, 17(4), 297–319.MathSciNetCrossRef Boneh, D., Lynn, B., & Shacham, H. (2004). Short signatures from the weil pairing. Journal of Cryptology, 17(4), 297–319.MathSciNetCrossRef
Metadaten
Titel
Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments
verfasst von
Meng Zhao
Yong Ding
Qianhong Wu
Yujue Wang
Bo Qin
Kefeng Fan
Publikationsdatum
31.08.2020
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2021
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07760-x

Weitere Artikel der Ausgabe 3/2021

Wireless Personal Communications 3/2021 Zur Ausgabe

Neuer Inhalt