• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

雾计算中针对虚假数据注入攻击的隐私保护数据聚合。

Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.

机构信息

National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an 710121, China.

Westone Cryptologic Research Center, Beijing 100070, China.

出版信息

Sensors (Basel). 2018 Aug 13;18(8):2659. doi: 10.3390/s18082659.

DOI:10.3390/s18082659
PMID:30104516
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6111540/
Abstract

As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processing at fog nodes suffers from many challenging issues, such as false data injection attacks, data modification attacks, and IoT devices' privacy violation. In this paper, based on the Paillier homomorphic encryption scheme, we use blinding factors to design a privacy-preserving data aggregation scheme in fog computing. No matter whether the fog node and the cloud control center are honest or not, the proposed scheme ensures that the injection data is from legal IoT devices and is not modified and leaked. The proposed scheme also has fault tolerance, which means that the collection of data from other devices will not be affected even if certain fog devices fail to work. In addition, security analysis and performance evaluation indicate the proposed scheme is secure and efficient.

摘要

作为云计算的扩展,雾计算近年来受到了更多的关注。它可以解决云计算中存在的高延迟、缺乏对移动性和位置感知的支持等问题。在物联网(IoT)中,可以将一系列物联网设备连接到雾节点,这些雾节点辅助云服务中心提前存储和处理一部分数据。这不仅可以减轻数据处理的压力,还可以提高实时性和服务质量。然而,雾节点的数据处理存在许多挑战性问题,例如虚假数据注入攻击、数据篡改攻击和物联网设备的隐私侵犯。在本文中,我们基于 Paillier 同态加密方案,使用盲因子设计了雾计算中的隐私保护数据聚合方案。无论雾节点和云控制中心是否诚实,所提出的方案都能确保注入的数据来自合法的物联网设备,并且不会被修改和泄露。该方案还具有容错性,即使某些雾设备出现故障,也不会影响其他设备的数据采集。此外,安全性分析和性能评估表明,所提出的方案是安全有效的。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/9e9fbdfd5d1e/sensors-18-02659-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/f6451ed39776/sensors-18-02659-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/7ea9226befda/sensors-18-02659-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/12eca17d5bf3/sensors-18-02659-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/9e9fbdfd5d1e/sensors-18-02659-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/f6451ed39776/sensors-18-02659-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/7ea9226befda/sensors-18-02659-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/12eca17d5bf3/sensors-18-02659-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cda3/6111540/9e9fbdfd5d1e/sensors-18-02659-g004.jpg

相似文献

1
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.雾计算中针对虚假数据注入攻击的隐私保护数据聚合。
Sensors (Basel). 2018 Aug 13;18(8):2659. doi: 10.3390/s18082659.
2
Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT.面向边缘计算增强型物联网的隐私保护、轻量级容错选择性聚合
Sensors (Basel). 2021 Aug 9;21(16):5369. doi: 10.3390/s21165369.
3
A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.一种雾计算-云计算环境下的安全可验证外包访问控制方案
Sensors (Basel). 2017 Jul 24;17(7):1695. doi: 10.3390/s17071695.
4
A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.用于物联网雾计算应用的高安全性节能网关的实际评估
Sensors (Basel). 2017 Aug 29;17(9):1978. doi: 10.3390/s17091978.
5
Device-Based Security to Improve User Privacy in the Internet of Things .基于设备的安全性提高物联网中的用户隐私。
Sensors (Basel). 2018 Aug 14;18(8):2664. doi: 10.3390/s18082664.
6
Fog Computing and Edge Computing Architectures for Processing Data From Diabetes Devices Connected to the Medical Internet of Things.用于处理来自连接到医疗物联网的糖尿病设备数据的雾计算和边缘计算架构。
J Diabetes Sci Technol. 2017 Jul;11(4):647-652. doi: 10.1177/1932296817717007.
7
Privacy-Preserving Distributed Analytics in Fog-Enabled IoT Systems.雾计算环境下物联网系统中的隐私保护分布式分析。
Sensors (Basel). 2020 Oct 29;20(21):6153. doi: 10.3390/s20216153.
8
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.一种用于雾计算环境中细粒度搜索和访问授权的混合方案。
Sensors (Basel). 2017 Jun 17;17(6):1423. doi: 10.3390/s17061423.
9
A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices.基于 RSA 和 ECC 的密码套件在物联网高安全性节能雾和霾计算设备中的实用评估。
Sensors (Basel). 2018 Nov 10;18(11):3868. doi: 10.3390/s18113868.
10
Online Workload Allocation via Fog-Fog-Cloud Cooperation to Reduce IoT Task Service Delay.通过雾-雾-云协作进行在线工作负载分配以减少物联网任务服务延迟
Sensors (Basel). 2019 Sep 4;19(18):3830. doi: 10.3390/s19183830.

本文引用的文献

1
The Internet of things.物联网
Sci Am. 2004 Oct;291(4):76-81. doi: 10.1038/scientificamerican1004-76.