Cargando…

Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection

In Internet of Things (IoT) systems in which a large number of IoT devices are connected to each other and to third-party servers, it is crucial to verify whether each device operates appropriately. Although anomaly detection can help with this verification, individual devices cannot afford this pro...

Descripción completa

Detalles Bibliográficos
Autores principales: Ryu, Dong-Hyeon, Jeon, Seong-Yun, Hong, Junho, Lee, Mun-Kyu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10143019/
https://www.ncbi.nlm.nih.gov/pubmed/37112508
http://dx.doi.org/10.3390/s23084169
_version_ 1785033751537909760
author Ryu, Dong-Hyeon
Jeon, Seong-Yun
Hong, Junho
Lee, Mun-Kyu
author_facet Ryu, Dong-Hyeon
Jeon, Seong-Yun
Hong, Junho
Lee, Mun-Kyu
author_sort Ryu, Dong-Hyeon
collection PubMed
description In Internet of Things (IoT) systems in which a large number of IoT devices are connected to each other and to third-party servers, it is crucial to verify whether each device operates appropriately. Although anomaly detection can help with this verification, individual devices cannot afford this process because of resource constraints. Therefore, it is reasonable to outsource anomaly detection to servers; however, sharing device state information with outside servers may raise privacy concerns. In this paper, we propose a method to compute the [Formula: see text] distance privately for even [Formula: see text] using inner product functional encryption and we use this method to compute an advanced metric, namely p-powered error, for anomaly detection in a privacy-preserving manner. We demonstrate implementations on both a desktop computer and Raspberry Pi device to confirm the feasibility of our method. The experimental results demonstrate that the proposed method is sufficiently efficient for use in real-world IoT devices. Finally, we suggest two possible applications of the proposed computation method for [Formula: see text] distance for privacy-preserving anomaly detection, namely smart building management and remote device diagnosis.
format Online
Article
Text
id pubmed-10143019
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101430192023-04-29 Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection Ryu, Dong-Hyeon Jeon, Seong-Yun Hong, Junho Lee, Mun-Kyu Sensors (Basel) Communication In Internet of Things (IoT) systems in which a large number of IoT devices are connected to each other and to third-party servers, it is crucial to verify whether each device operates appropriately. Although anomaly detection can help with this verification, individual devices cannot afford this process because of resource constraints. Therefore, it is reasonable to outsource anomaly detection to servers; however, sharing device state information with outside servers may raise privacy concerns. In this paper, we propose a method to compute the [Formula: see text] distance privately for even [Formula: see text] using inner product functional encryption and we use this method to compute an advanced metric, namely p-powered error, for anomaly detection in a privacy-preserving manner. We demonstrate implementations on both a desktop computer and Raspberry Pi device to confirm the feasibility of our method. The experimental results demonstrate that the proposed method is sufficiently efficient for use in real-world IoT devices. Finally, we suggest two possible applications of the proposed computation method for [Formula: see text] distance for privacy-preserving anomaly detection, namely smart building management and remote device diagnosis. MDPI 2023-04-21 /pmc/articles/PMC10143019/ /pubmed/37112508 http://dx.doi.org/10.3390/s23084169 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Communication
Ryu, Dong-Hyeon
Jeon, Seong-Yun
Hong, Junho
Lee, Mun-Kyu
Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection
title Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection
title_full Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection
title_fullStr Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection
title_full_unstemmed Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection
title_short Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection
title_sort efficient l(p) distance computation using function-hiding inner product encryption for privacy-preserving anomaly detection
topic Communication
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10143019/
https://www.ncbi.nlm.nih.gov/pubmed/37112508
http://dx.doi.org/10.3390/s23084169
work_keys_str_mv AT ryudonghyeon efficientlpdistancecomputationusingfunctionhidinginnerproductencryptionforprivacypreservinganomalydetection
AT jeonseongyun efficientlpdistancecomputationusingfunctionhidinginnerproductencryptionforprivacypreservinganomalydetection
AT hongjunho efficientlpdistancecomputationusingfunctionhidinginnerproductencryptionforprivacypreservinganomalydetection
AT leemunkyu efficientlpdistancecomputationusingfunctionhidinginnerproductencryptionforprivacypreservinganomalydetection