scholarly journals Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption

2021 ◽  
Vol 58 (6) ◽  
pp. 102745
Author(s):  
Cristina Regueiro ◽  
Iñaki Seco ◽  
Santiago de Diego ◽  
Oscar Lage ◽  
Leire Etxebarria
2018 ◽  
Vol 14 (11) ◽  
pp. 40
Author(s):  
Bohua Guo ◽  
Yanwu Zhang

<p class="0abstract"><span lang="EN-US">To improve the data aggregation privacy protection scheme in wireless sensor network (WSN), a new scheme is put forward based on the privacy protection of polynomial regression and the privacy protection method based on the homomorphic encryption. The polynomial data aggregation (PRDA+) protocol is also proposed. In this scheme, the node and the base station will pre-deploy a secret key, and the random number generator encrypts the random number for the seed through the private key, which protects the privacy of the data. Then, by comparing the decrypted aggregate data through the correlation between the two metadata, the integrity protection of the data is realized. A weighted average aggregation scheme that can be verified is proposed. In view of the different importance of user information, the corresponding weights are set for each sensor node. EL Gamal digital signature is used to authenticate sensor nodes. The results show that the signature verification algorithm enables the scheme to resist data tampering and data denial, and to trace the source of erroneous data.</span></p>


2014 ◽  
Vol 721 ◽  
pp. 732-735
Author(s):  
Hua Zhang

This paper proposed an integrity and privacy preserving data aggregation algorithm for WSNs, which is called IPPDA. First, it attached a group of congruent numbers to the sensing data in order to execute integrity checking operated by sink node using Chinese remainder theorem (CRT); then it computed the hash function-based message authentication codes with time and key as the parameters to satisfy data freshness; finally, it adopted a homomorphic encryption scheme to provide privacy preserving. The simulation results show that IPPDA can effectively preserve data privacy, check data integrity, satisfy data freshness, and get accurate data aggregation results while having less computation and communication cost than iCPDA and iPDA.


2011 ◽  
Vol 181 (16) ◽  
pp. 3308-3322 ◽  
Author(s):  
Licheng Wang ◽  
Lihua Wang ◽  
Yun Pan ◽  
Zonghua Zhang ◽  
Yixian Yang

2014 ◽  
Vol 543-547 ◽  
pp. 3017-3022 ◽  
Author(s):  
Tristan Daladier Engouang ◽  
Liu Yun ◽  
Zhen Jiang Zhang

Tiny autonomous embedded electronics (sensor nodes) devices able to communicate through wireless channels are ensuring the emission and reception of data through a communication radio between two sensors grouped by hundreds and thousands within Wireless Sensor Networks (WSNs). These amazing new technology with ongoing research worldwide, are merging networking, systems hardware, systems software and programming methodologies thus enabling applications that previously were not practical. Hence numerical simulations on computers can now visualize the physical world phenomena that could be observed through empirical means, as sensors are deployed in a dedicated environment, to fulfill their aim of sensing for any occurrence of the event of interest. The data sensed by these wireless sensors are now very sensitive, thus need to be fully protected by all means, which is why T. D. Engouang et al., argued that securityand reliability and also durability are mandatory when deploying any sensor nodes or hard device. The Pallier based homomorphic encryption data aggregation is proposed with security measures preserving data integrity and privacy.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2659 ◽  
Author(s):  
Yinghui Zhang ◽  
Jiangfan Zhao ◽  
Dong Zheng ◽  
Kaixin Deng ◽  
Fangyuan Ren ◽  
...  

As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices’ privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Yuwen Pu ◽  
Jin Luo ◽  
Chunqiang Hu ◽  
Jiguo Yu ◽  
Ruifeng Zhao ◽  
...  

As the next generation of information and communication infrastructure, Internet of Things (IoT) enables many advanced applications such as smart healthcare, smart grid, smart home, and so on, which provide the most flexibility and convenience in our daily life. However, pervasive security and privacy issues are also increasing in IoT. For instance, an attacker can get health condition of a patient via analyzing real-time records in a smart healthcare application. Therefore, it is very important for users to protect their private data. In this paper, we present two efficient data aggregation schemes to preserve private data of customers. In the first scheme, each IoT device slices its actual data randomly, keeps one piece to itself, and sends the remaining pieces to other devices which are in the same group via symmetric encryption. Then, each IoT device adds the received pieces and the held piece together to get an immediate result, which is sent to the aggregator after the computation. Moreover, homomorphic encryption and AES encryption are employed to guarantee secure communication. In the second scheme, the slicing strategy is also employed. Noise data are introduced to prevent the exchanged actual data of devices from disclosure when the devices blend data each other. AES encryption is also employed to guarantee secure communication between devices and aggregator, compared to homomorphic encryption, which has significantly less computational cost. Analysis shows that integrity and confidentiality of IoT devices’ data can be guaranteed in our schemes. Both schemes can resist external attack, internal attack, colluding attack, and so on.


Sign in / Sign up

Export Citation Format

Share Document