• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN

    Thumbnail
    View/Open
    Publisher version (You have accessOpen AccessIcon)
    Publisher version (Check access options)
    Check access options
    Date
    2020-10-01
    Author
    Xu, Chang
    Zhang, Lvhan
    Zhu, Liehuang
    Zhang, Chuan
    Du, Xiaojiang
    Guizani, Mohsen
    Sharif, Kashif
    ...show more authors ...show less authors
    Metadata
    Show full item record
    Abstract
    Information-Centric Networking (ICN) is a novel future network architecture which in contrast to IP-based networks relies on content and its name. It separates the physical location of data from the discovery and forwarding process and solely relies on the content itself. For the Internet of Thing (IoT) networks, stripping the location information may provide privacy, but this does not translate to operational privacy. Attackers can infer user behavior patterns through operational privacy, by eavesdropping on meaningful information. The content name and designed signature in ICN can associate content with the identity of the provider, even if the IP address is hidden. Although several research efforts focus on the privacy protection of ICN, they do not consider the privacy implications of data aggregation. Most existing privacy-preserving data aggregation protocols are designed for special operations, such as sum, average, variance, max or min, and they cannot support arbitrary aggregation operations in the ciphertexts domain. Besides, the need for trusted authority (TA) restricts the use of existing protocols in the real world. In this paper, we propose a practical and privacy-preserving data aggregation scheme that can compute arbitrary aggregation functions without a TA. On one hand, our scheme can ensure users’ anonymity and privacy protection, while on the other, the scheme is efficient in enabling participants to join or leave the system dynamically. Security analysis shows that the proposed scheme can achieve the desired security properties, while experimental results demonstrate its effectiveness and efficiency.
    URI
    https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85083897987&origin=inward
    DOI/handle
    http://dx.doi.org/10.1016/j.future.2020.04.021
    http://hdl.handle.net/10576/36719
    Collections
    • Computer Science & Engineering [‎2428‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video