scholarly journals Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection

2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Weiping Ouyang ◽  
Chunguang Ma ◽  
Guoyin Zhang ◽  
Keming Diao

The rapid development of the Internet of Things has made the issue of privacy protection even more concerning. Privacy protection has affected the large-scale application of the Internet of Things. Fully Homomorphic Encryption (FHE) is a newly emerging public key encryption scheme, which can be used to prevent information leakage. It allows performing arbitrary algebraic operations on data which are encrypted, such that the operation performed on the ciphertext is directly transformed into the corresponding plaintext. Recently, overwhelming majority of FHE schemes are confined to single-bit encryption, whereas how to achieve a multibit FHE scheme is still an open problem. This problem is partially (rather than fully) solved by Hiromasa-Abe-Okamoto (PKC′15), who proposed a packed message FHE scheme which only supports decryption in a bit-by-bit manner. Followed by that, Li-Ma-Morais-Du (Inscrypt′16) proposed a multibit FHE scheme which can decrypt the ciphertext at one time, but their scheme is based on dual LWE assumption. Armed with the abovementioned two schemes, in this paper, we propose an efficient packed message FHE that supports the decryption in two ways: single-bit decryption and one-time decryption.

2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Wei-Tao Song ◽  
Bin Hu ◽  
Xiu-Feng Zhao

With the rapid development of Internet of Things (IoT), grave questions of privacy protection are raised. This greatly impacts the large-scale applications of IoT. Fully homomorphic encryption (FHE) can provide privacy protection for IoT. But, its efficiency needs to be greatly improved. Nowadays, Gentry’s bootstrapping technique is still the only known method of obtaining a “pure” FHE scheme. And it is also the key for the low efficiency of FHE scheme due to the complexity homomorphic decryption. In this paper, the bootstrapping technique of Halevi and Shoup (EUROCRYPT 15) is improved. Firstly, by introducing a definition of “load capacity”, we optimize the parameter range for which their bootstrapping technique works. Next we generalize their ciphertext modulus from closing to a power of two to more general situations. This enables the method to be applied in a larger number of situations. Moreover, this paper also shows how to introduce SIMD homomorphic computation techniques into the new method, to improve the efficiency of recryption.


CONVERTER ◽  
2021 ◽  
pp. 70-79
Author(s):  
Dongxian Yu, Jiatao Kang, Junlei Dong

The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ideas of the Internet of things are perception, control, transmission and intelligence. Through technical means to achieve the coordination between things, people and things, and people, so as to form a larger complex network system on the basis of sensor network, Internet and mobile communication network. The data Shared by Internet of things information is closely related to personal life behaviors, and the information has a greater perceived correlation with each other. This kind of sensibility and sensitivity put forward higher requirements for the security and privacy protection of Internet of things information sharing. However, due to the characteristics of network structure, terminal equipment, communication mode and application scenario, some security and privacy issues unique to the Internet of things cannot be solved directly through existing Internet security technologies. It is necessary to conduct in-depth research on the key technologies of Internet of things security and privacy protection. This article briefly describes the Internet of things security and privacy issues, then, it gives the research and application status of Internet of things security and privacy protection at home and abroad, then lists the key technical problems in Internet of things security and privacy protection. And for communication between large scale collaborative services. Based on publish/subscribe paradigm, this paper constructs collaborative communication facilities of Internet of things services suitable for large-scale distribution, and an access control architecture for managing service synergy interactions, achieve confidentiality of data exchange between services and privacy protection of service policies.


Author(s):  
Caiping Guo ◽  
Daqing Li

AbstractOnce the Internet of Things was proposed, it has received great attention from all walks of life and has become one of the top ten technologies that change the world. Therefore, more and more people are engaged in the research of the Internet of Things, after the unremitting efforts of all seniors. Now the Internet of Things has been applied to every aspect of our lives. However, in the application process of the Internet of Things, the protection of personal privacy will undoubtedly be involved. If this problem is not effectively resolved, it will become a major obstacle to the development of the Internet of Things. At present, the research of fully homomorphic technology has attracted great attention from the cryptography community. You can directly calculate the encrypted text encryption to obtain the output and decrypt the output. The result is the same as the output of the unencrypted plain text. This article first comprehensively describes the solution to the privacy protection problem in the existing Internet of Things, and then proposes to apply the fully homomorphic technology to the Internet of Things to make the services provided by the network more secure. Through the analysis of the basic composition and architecture of the existing Internet of Things system, a privacy protection interaction model for the Internet of Things is established, which uses a completely homomorphic technology. On this basis, the algorithm for implementing simple homomorphic encryption is improved, and general homomorphic encryption theory is proposed for some security issues. After using this method to encrypt privacy, the success rate of cracking dropped by 24%.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Lei Zhang ◽  
Yu Huo ◽  
Qiang Ge ◽  
Yuxiang Ma ◽  
Qiqi Liu ◽  
...  

Various applications of the Internet of Things assisted by deep learning such as autonomous driving and smart furniture have gradually penetrated people’s social life. These applications not only provide people with great convenience but also promote the progress and development of society. However, how to ensure that the important personal privacy information in the big data of the Internet of Things will not be leaked when it is stored and shared on the cloud is a challenging issue. The main challenges include (1) the changes in access rights caused by the flow of manufacturers or company personnel while sharing and (2) the lack of limitation on time and frequency. We propose a data privacy protection scheme based on time and decryption frequency limitation that can be applied in the Internet of Things. Legitimate users can obtain the original data, while users without a homomorphic encryption key can perform operation training on the homomorphic ciphertext. On the one hand, this scheme does not affect the training of the neural network model, on the other hand, it improves the confidentiality of data. Besides that, this scheme introduces a secure two-party agreement to improve security while generating keys. While revoking, each attribute is specified for the validity period in advance. Once the validity period expires, the attribute will be revoked. By using storage lists and setting tokens to limit the number of user accesses, it effectively solves the problem of data leakage that may be caused by multiple accesses in a long time. The theoretical analysis demonstrates that the proposed scheme can not only ensure safety but also improve efficiency.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 545
Author(s):  
Risabh Mishra ◽  
M Safa ◽  
Aditya Anand

Recent advances in wireless communication technologies and automobile industry have triggered a significant research interest in the field of Internet of Vehicles over the past few years.The advanced period of the Internet of Things is guiding the development of conventional Vehicular Networks to the Internet of Vehicles.In the days of Internet connectivity there is need to be in safe and problem-free environment.The Internet of Vehicles (IoV) is normally a mixing of three networks: an inter-vehicleNetwork, an intra-vehicle network, and a vehicle to vehicle network.Based on  idea of three networks combining into one, we define  Internet of Vehicles as a large-scale distributed system to wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet).It is a combined   network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representation of an application of the Internet of Things (IoT) technology for intelligent transportation system (ITS).  


2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Federica Paganelli ◽  
David Parlanti

Current trends towards the Future Internet are envisaging the conception of novel services endowed with context-aware and autonomic capabilities to improve end users’ quality of life. The Internet of Things paradigm is expected to contribute towards this ambitious vision by proposing models and mechanisms enabling the creation of networks of “smart things” on a large scale. It is widely recognized that efficient mechanisms for discovering available resources and capabilities are required to realize such vision. The contribution of this work consists in a novel discovery service for the Internet of Things. The proposed solution adopts a peer-to-peer approach for guaranteeing scalability, robustness, and easy maintenance of the overall system. While most existing peer-to-peer discovery services proposed for the IoT support solely exact match queries on a single attribute (i.e., the object identifier), our solution can handle multiattribute and range queries. We defined a layered approach by distinguishing three main aspects: multiattribute indexing, range query support, peer-to-peer routing. We chose to adopt an over-DHT indexing scheme to guarantee ease of design and implementation principles. We report on the implementation of a Proof of Concept in a dangerous goods monitoring scenario, and, finally, we discuss test results for structural properties and query performance evaluation.


2018 ◽  
Vol 33 (6) ◽  
pp. 749-767 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund ◽  
Robert Wendelin

Purpose This study aims to understand their emergence and types of business models in the Internet of Things (IoT) ecosystems. Design/methodology/approach The paper builds upon a systematic literature review of IoT ecosystems and business models to construct a conceptual framework on IoT business models, and uses qualitative research methods to analyze seven industry cases. Findings The study identifies four types of IoT business models: value chain efficiency, industry collaboration, horizontal market and platform. Moreover, it discusses three evolutionary paths of new business model emergence: opening up the ecosystem for industry collaboration, replicating the solution in multiple services and return to closed ecosystem as technology matures. Research limitations/implications Identifying business models in rapidly evolving fields such as the IoT based on a small number of case studies may result in biased findings compared to large-scale surveys and globally distributed samples. However, it provides more thorough interpretations. Practical implications The study provides a framework for analyzing the types and emergence of IoT business models, and forwards the concept of “value design” as an ecosystem business model. Originality/value This paper identifies four archetypical IoT business models based on a novel framework that is independent of any specific industry, and argues that IoT business models follow an evolutionary path from closed to open, and reversely to closed ecosystems, and the value created in the networks of organizations and things will be shareable value rather than exchange value.


Sign in / Sign up

Export Citation Format

Share Document