Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
المؤلف | Xu, Chang |
المؤلف | Zhang, Lvhan |
المؤلف | Zhu, Liehuang |
المؤلف | Zhang, Chuan |
المؤلف | Du, Xiaojiang |
المؤلف | Guizani, Mohsen |
المؤلف | Sharif, Kashif |
تاريخ الإتاحة | 2022-11-27T07:37:31Z |
تاريخ النشر | 2020-10-01 |
اسم المنشور | Future Generation Computer Systems |
المعرّف | http://dx.doi.org/10.1016/j.future.2020.04.021 |
الاقتباس | Xu, C., Zhang, L., Zhu, L., Zhang, C., Du, X., Guizani, M., & Sharif, K. (2020). Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN. Future Generation Computer Systems, 111, 107-116. |
الرقم المعياري الدولي للكتاب | 0167739X |
الملخص | Information-Centric Networking (ICN) is a novel future network architecture which in contrast to IP-based networks relies on content and its name. It separates the physical location of data from the discovery and forwarding process and solely relies on the content itself. For the Internet of Thing (IoT) networks, stripping the location information may provide privacy, but this does not translate to operational privacy. Attackers can infer user behavior patterns through operational privacy, by eavesdropping on meaningful information. The content name and designed signature in ICN can associate content with the identity of the provider, even if the IP address is hidden. Although several research efforts focus on the privacy protection of ICN, they do not consider the privacy implications of data aggregation. Most existing privacy-preserving data aggregation protocols are designed for special operations, such as sum, average, variance, max or min, and they cannot support arbitrary aggregation operations in the ciphertexts domain. Besides, the need for trusted authority (TA) restricts the use of existing protocols in the real world. In this paper, we propose a practical and privacy-preserving data aggregation scheme that can compute arbitrary aggregation functions without a TA. On one hand, our scheme can ensure users’ anonymity and privacy protection, while on the other, the scheme is efficient in enabling participants to join or leave the system dynamically. Security analysis shows that the proposed scheme can achieve the desired security properties, while experimental results demonstrate its effectiveness and efficiency. |
راعي المشروع | This research is supported by the National Natural Science Foundation of China (Grant Nos. 61972037 , 61402037 , 61872041 , U1836212 ). |
اللغة | en |
الناشر | Elsevier B.V. |
الموضوع | Aggregation Arbitrary aggregate function information-Centric Networking Internet of Things Privacy preservation |
النوع | Article |
الصفحات | 107-116 |
رقم المجلد | 111 |
تحقق من خيارات الوصول
الملفات في هذه التسجيلة
الملفات | الحجم | الصيغة | العرض |
---|---|---|---|
لا توجد ملفات لها صلة بهذه التسجيلة. |
هذه التسجيلة تظهر في المجموعات التالية
-
علوم وهندسة الحاسب [2402 items ]