scholarly journals Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing

Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2659 ◽  
Author(s):  
Yinghui Zhang ◽  
Jiangfan Zhao ◽  
Dong Zheng ◽  
Kaixin Deng ◽  
Fangyuan Ren ◽  
...  

As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices’ privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient.

Privacy has become an imperative term in the recent technology developments. Lots of data are being collected through every digital activity of users. The expeditious development of IoT applications have raised the concern about the privacy of the IoT systems. The data collected via IoT sensors can reveal the daily behavior of the users, location, and other sensitive information. Hence, it is necessary to preserve the privacy of data collected by IoT devices. A large number of techniques and approaches have been implemented and used in different IoT based applications such as cloud computing based IoT, fog computing based IoT, blockchain based IoT and trajectory applications. In this paper, we present a detailed investigation of the existing approaches to preserve the privacy of data in IoT applications. The techniques like k-anonymity, secure multiparty computation, attribute based encryption and homomorphic encryption are analyzed. Finally, a comparative analysis of privacy preserving techniques with its applications are presented.


Internet-of-Things (IoT) has been considered as a fundamental part of our day by day existence with billions of IoT devices gathering information remotely and can interoperate within the current Internet framework. Fog computing is nothing but cloud computing to the extreme of network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in the Internet of Things (IoT). Fog computing allows the data storing and processing any nearby network devices or nearby cloud endpoint continuum. Using fog computing, the designer can reduce the computation architecture of the IoT devices. Unfortunitily, this new paradigm IoT-Fog faces numerous new privacy and security issues, like authentication and authorization, secure communication, information confidentiality. Despite the fact that the customary cloud-based platform can even utilize heavyweight cryptosystem to upgrade security, it can't be performed on fog devices drectly due to reseource constraints. Additionally, a huge number of smart fog devices are fiercely disseminated and situated in various zones, which expands the danger of being undermined by some pernicious gatherings. Trait Based Encryption (ABE) is an open key encryption conspire that enables clients to scramble and unscramble messages dependent on client qualities, which ensures information classification and hearty information get to control. Be that as it may, its computational expense for encryption and unscrambling stage is straightforwardly corresponding to the multifaceted nature of the arrangements utilized. The points is to assess the planning, CPU burden, and memory burden, and system estimations all through each phase of the cloud-to-things continuum amid an analysis for deciding highlights from a finger tapping exercise for Parkinson's Disease patients. It will be appeared there are confinements to the proposed testbeds when endeavoring to deal with upwards of 35 customers at the same time. These discoveries lead us to a proper conveyance of handling the leaves the Intel NUC as the most suitable fog gadget. While the Intel Edison and Raspberry Pi locate a superior balance at in the edge layer, crossing over correspondence conventions and keeping up a self-mending network topology for "thing" devices in the individual territory organize.


2021 ◽  
Author(s):  
Faris. A. Almalki ◽  
Ben othman Soufiene

Abstract Internet of Things (IoT) connects various kinds of intelligent objects and devices using the internet to collect and exchange data. Nowadays, The IoT is used in diverse application domains, including the healthcare. In the healthcare domain, the IoT devices can collects patient data, and its forwards the data to the healthcare professionals can view it. The IoT devices are usually resource-constrained in terms of energy consumption, storage capacity, computational capability, and communication range, data aggregation techniques are used to reduce the communication overhead. However, in healthcare system using IoT, the heterogeneity of technologies, the large number of devices and systems, and the different types of users and roles create important challenges in terms of security. For that, the security and privacy aggregation of health data are very important aspects. In this paper, we propose a novel secure data aggregation scheme based on homomorphic primitives in IoT based healthcare systems, called “An Efficient and Privacy-Preserving Data Aggregation Scheme with authentication for IoT-Based Healthcare applications” (EPPDA). EPPDA is based the Verification and Authorization phase to verifying the legitimacy of the nodes wants to join the process of aggregation. EPPDA uses additive homomorphic encryption to protect data privacy and combines it with homomorphic MAC to check the data integrity. The security analysis and experimental results show that our proposed scheme guarantees data privacy, messages authenticity, and integrity, with lightweight communication overhead and computation.


2019 ◽  
Vol 8 (2) ◽  
pp. 6117-6122

From hairbrushes to scales, all devices have sensors embedded in them to collect and communicate data. Smart Healthcare is proving to be an exciting and dynamic area with lots of room for new innovations and the increasing consumer demand for proactive health monitoring devices. Having India poised to spend a lot on healthcare, recent innovations using IoT devices and big data analytics can propel the healthcare industry into the future. Smart healthcare providers are leveraging cloud computing with fog computing to optimize their healthcare services. These smart healthcare applications depend mainly on the raw sensor data collected, aggregated, and analyzed by the smart sensors. Smart sensors these days generate myriad amount of data like text, image, audio, and video that require real-time or batch processing. Aggregating these diverse data from various types of resources remains a dispute till date. To resolve this issue, we have proposed a softwarized infrastructure that integrates cloud computing and fog computing, message brokers, and Tor for supple, safe, viable, and a concealed IoT exploitation for smart healthcare applications and services. Our proposed platform employs machine-to-machine (M2M) messaging, data fusion and decision fusion, and uses rule-based beacons for seamless data management. Our proposed flexBeacon system provides an IoT infrastructure that is nimble, secure, flexible, private, and reasonable. We have also proposed an M2M transceiver and microcontroller for flawless data incorporation of smart healthcare applications and services. Based on the IoT devices’ technical capabilities and resource availability, some systems are capable of making use of homomorphic encryption and zero knowledge proofs. The proposed flexBeacon platform offers seamless management and data aggregation without loss of accuracy. The cost of implementing a softwarized IoT for smart healthcare is also greatly reduced.


Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2452
Author(s):  
Faiza Loukil ◽  
Chirine Ghedira-Guegan ◽  
Khouloud Boukadi ◽  
Aïcha-Nabila Benharkat

Data analytics based on the produced data from the Internet of Things (IoT) devices is expected to improve the individuals’ quality of life. However, ensuring security and privacy in the IoT data aggregation process is a non-trivial task. Generally, the IoT data aggregation process is based on centralized servers. Yet, in the case of distributed approaches, it is difficult to coordinate several untrustworthy parties. Fortunately, the blockchain may provide decentralization while overcoming the trust problem. Consequently, blockchain-based IoT data aggregation may become a reasonable choice for the design of a privacy-preserving system. To this end, we propose PrivDA, a Privacy-preserving IoT Data Aggregation scheme based on the blockchain and homomorphic encryption technologies. In the proposed system, each data consumer can create a smart contract and publish both terms of service and requested IoT data. Thus, the smart contract puts together into one group potential data producers that can answer the consumer’s request and chooses one aggregator, the role of which is to compute the group requested result using homomorphic computations. Therefore, group-level aggregation obfuscates IoT data, which complicates sensitive information inference from a single IoT device. Finally, we deploy the proposal on a private Ethereum blockchain and give the performance evaluation.


2020 ◽  
Vol 17 (3) ◽  
pp. 306-315
Author(s):  
Dhiah el Diehn Abou-Tair ◽  
Simon Büchsenstein ◽  
Ala’ Khalifeh

Privacy is becoming an indispensable component in the emerging Internet of Things (IoT) context. However, the IoT based devices and tools are exposed to several security and privacy threats, especially that these devices are mainly used to gather data about users’ habits, vital signs, surround environment, etc., which makes them a lucrative target to intruders. Up to date, conventional security and privacy mechanisms are not well optimized for IoT devices due to their limited energy, storage capacity, communication functionality and computing power, which influenced researchers to propose new solutions and algorithms to handle these limitations. Fog and cloud computing have been recently integrated in IoT environment to solve their resources’ limitations, thus facilitating new life scenarios-oriented applications. In this paper, a security and privacy preserving framework is proposed, which utilizes Fog and cloud computing in conjunction with IoT devices that aims at securing the users’ data and protecting their privacy. The framework has been implemented and tested using available technologies. Furthermore, a security analysis has been verified by simulating several hypothetical attack scenarios, which showed the effectiveness of the proposed framework and its capability of protecting the users’ information.


2018 ◽  
Vol 10 (3) ◽  
pp. 61-83 ◽  
Author(s):  
Deepali Chaudhary ◽  
Kriti Bhushan ◽  
B.B. Gupta

This article describes how cloud computing has emerged as a strong competitor against traditional IT platforms by offering low-cost and “pay-as-you-go” computing potential and on-demand provisioning of services. Governments, as well as organizations, have migrated their entire or most of the IT infrastructure to the cloud. With the emergence of IoT devices and big data, the amount of data forwarded to the cloud has increased to a huge extent. Therefore, the paradigm of cloud computing is no longer sufficient. Furthermore, with the growth of demand for IoT solutions in organizations, it has become essential to process data quickly, substantially and on-site. Hence, Fog computing is introduced to overcome these drawbacks of cloud computing by bringing intelligence to the edge of the network using smart devices. One major security issue related to the cloud is the DDoS attack. This article discusses in detail about the DDoS attack, cloud computing, fog computing, how DDoS affect cloud environment and how fog computing can be used in a cloud environment to solve a variety of problems.


Sign in / Sign up

Export Citation Format

Share Document