Cargando…
Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection
In Internet of Things (IoT) systems in which a large number of IoT devices are connected to each other and to third-party servers, it is crucial to verify whether each device operates appropriately. Although anomaly detection can help with this verification, individual devices cannot afford this pro...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10143019/ https://www.ncbi.nlm.nih.gov/pubmed/37112508 http://dx.doi.org/10.3390/s23084169 |
_version_ | 1785033751537909760 |
---|---|
author | Ryu, Dong-Hyeon Jeon, Seong-Yun Hong, Junho Lee, Mun-Kyu |
author_facet | Ryu, Dong-Hyeon Jeon, Seong-Yun Hong, Junho Lee, Mun-Kyu |
author_sort | Ryu, Dong-Hyeon |
collection | PubMed |
description | In Internet of Things (IoT) systems in which a large number of IoT devices are connected to each other and to third-party servers, it is crucial to verify whether each device operates appropriately. Although anomaly detection can help with this verification, individual devices cannot afford this process because of resource constraints. Therefore, it is reasonable to outsource anomaly detection to servers; however, sharing device state information with outside servers may raise privacy concerns. In this paper, we propose a method to compute the [Formula: see text] distance privately for even [Formula: see text] using inner product functional encryption and we use this method to compute an advanced metric, namely p-powered error, for anomaly detection in a privacy-preserving manner. We demonstrate implementations on both a desktop computer and Raspberry Pi device to confirm the feasibility of our method. The experimental results demonstrate that the proposed method is sufficiently efficient for use in real-world IoT devices. Finally, we suggest two possible applications of the proposed computation method for [Formula: see text] distance for privacy-preserving anomaly detection, namely smart building management and remote device diagnosis. |
format | Online Article Text |
id | pubmed-10143019 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-101430192023-04-29 Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection Ryu, Dong-Hyeon Jeon, Seong-Yun Hong, Junho Lee, Mun-Kyu Sensors (Basel) Communication In Internet of Things (IoT) systems in which a large number of IoT devices are connected to each other and to third-party servers, it is crucial to verify whether each device operates appropriately. Although anomaly detection can help with this verification, individual devices cannot afford this process because of resource constraints. Therefore, it is reasonable to outsource anomaly detection to servers; however, sharing device state information with outside servers may raise privacy concerns. In this paper, we propose a method to compute the [Formula: see text] distance privately for even [Formula: see text] using inner product functional encryption and we use this method to compute an advanced metric, namely p-powered error, for anomaly detection in a privacy-preserving manner. We demonstrate implementations on both a desktop computer and Raspberry Pi device to confirm the feasibility of our method. The experimental results demonstrate that the proposed method is sufficiently efficient for use in real-world IoT devices. Finally, we suggest two possible applications of the proposed computation method for [Formula: see text] distance for privacy-preserving anomaly detection, namely smart building management and remote device diagnosis. MDPI 2023-04-21 /pmc/articles/PMC10143019/ /pubmed/37112508 http://dx.doi.org/10.3390/s23084169 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Communication Ryu, Dong-Hyeon Jeon, Seong-Yun Hong, Junho Lee, Mun-Kyu Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection |
title | Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection |
title_full | Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection |
title_fullStr | Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection |
title_full_unstemmed | Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection |
title_short | Efficient L(p) Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection |
title_sort | efficient l(p) distance computation using function-hiding inner product encryption for privacy-preserving anomaly detection |
topic | Communication |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10143019/ https://www.ncbi.nlm.nih.gov/pubmed/37112508 http://dx.doi.org/10.3390/s23084169 |
work_keys_str_mv | AT ryudonghyeon efficientlpdistancecomputationusingfunctionhidinginnerproductencryptionforprivacypreservinganomalydetection AT jeonseongyun efficientlpdistancecomputationusingfunctionhidinginnerproductencryptionforprivacypreservinganomalydetection AT hongjunho efficientlpdistancecomputationusingfunctionhidinginnerproductencryptionforprivacypreservinganomalydetection AT leemunkyu efficientlpdistancecomputationusingfunctionhidinginnerproductencryptionforprivacypreservinganomalydetection |