Cargando…

Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing

As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog node...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Yinghui, Zhao, Jiangfan, Zheng, Dong, Deng, Kaixin, Ren, Fangyuan, Zheng, Xiaokun, Shu, Jiangang
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6111540/
https://www.ncbi.nlm.nih.gov/pubmed/30104516
http://dx.doi.org/10.3390/s18082659
_version_ 1783350673217159168
author Zhang, Yinghui
Zhao, Jiangfan
Zheng, Dong
Deng, Kaixin
Ren, Fangyuan
Zheng, Xiaokun
Shu, Jiangang
author_facet Zhang, Yinghui
Zhao, Jiangfan
Zheng, Dong
Deng, Kaixin
Ren, Fangyuan
Zheng, Xiaokun
Shu, Jiangang
author_sort Zhang, Yinghui
collection PubMed
description As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices’ privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient.
format Online
Article
Text
id pubmed-6111540
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-61115402018-08-30 Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing Zhang, Yinghui Zhao, Jiangfan Zheng, Dong Deng, Kaixin Ren, Fangyuan Zheng, Xiaokun Shu, Jiangang Sensors (Basel) Article As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices’ privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient. MDPI 2018-08-13 /pmc/articles/PMC6111540/ /pubmed/30104516 http://dx.doi.org/10.3390/s18082659 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zhang, Yinghui
Zhao, Jiangfan
Zheng, Dong
Deng, Kaixin
Ren, Fangyuan
Zheng, Xiaokun
Shu, Jiangang
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing
title Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing
title_full Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing
title_fullStr Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing
title_full_unstemmed Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing
title_short Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing
title_sort privacy-preserving data aggregation against false data injection attacks in fog computing
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6111540/
https://www.ncbi.nlm.nih.gov/pubmed/30104516
http://dx.doi.org/10.3390/s18082659
work_keys_str_mv AT zhangyinghui privacypreservingdataaggregationagainstfalsedatainjectionattacksinfogcomputing
AT zhaojiangfan privacypreservingdataaggregationagainstfalsedatainjectionattacksinfogcomputing
AT zhengdong privacypreservingdataaggregationagainstfalsedatainjectionattacksinfogcomputing
AT dengkaixin privacypreservingdataaggregationagainstfalsedatainjectionattacksinfogcomputing
AT renfangyuan privacypreservingdataaggregationagainstfalsedatainjectionattacksinfogcomputing
AT zhengxiaokun privacypreservingdataaggregationagainstfalsedatainjectionattacksinfogcomputing
AT shujiangang privacypreservingdataaggregationagainstfalsedatainjectionattacksinfogcomputing