$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing 원문보기

Sensors, v.18 no.8, 2018년, pp.2659 -   

Zhang, Yinghui (National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China) ,  Zhao, Jiangfan (zjf291495791@163.com (J.Z.)) ,  Zheng, Dong (dkx523121943@163.com (K.D.)) ,  Deng, Kaixin (rfyren@163.com (F.R.)) ,  Ren, Fangyuan (National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China) ,  Zheng, Xiaokun (zjf291495791@163.com (J.Z.)) ,  Shu, Jiangang (dkx523121943@163.com (K.D.))

Abstract AI-Helper 아이콘AI-Helper

As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog node...

주제어

참고문헌 (53)

  1. 1. Wang Q. Wang C. Ren K. Lou W. Li J. Enabling public auditability and data dynamics for storage security in cloud computing IEEE Trans. Parallel Distrib. Syst. 2011 22 847 859 10.1109/TPDS.2010.183 

  2. 2. Armbrust M. Fox A. Griffith R. Joseph A.D. Katz R. Konwinski A. Lee G. Patterson D. Rabkin A. Stoica I. A view of cloud computing Commun. ACM 2010 53 50 58 10.1145/1721654.1721672 

  3. 3. Zhang Y. Zheng D. Li Q. Li J. Li H. Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing Secur. Commun. Netw. 2016 9 3688 3702 10.1002/sec.1574 

  4. 4. Yang L. Han Z. Huang Z. Ma J. A remotely keyed file encryption scheme under mobile cloud computing J. Netw. Comput. Appl. 2018 106 90 99 10.1016/j.jnca.2017.12.017 

  5. 5. Li J. Zhang Y. Chen X. Xiang Y. Secure attribute-based data sharing for resource-limited users in cloud computing Comput. Secur. 2018 72 1 12 10.1016/j.cose.2017.08.007 

  6. 6. Zhang Y. Yang M. Zheng D. Lang P. Wu A. Chen C. Efficient and secure big data storage system with leakage resilience in cloud computing Soft Comput. 2018 10.1007/s00500-018-3435-z 

  7. 7. Hosseinian-Far A. Ramachandran M. Slack C.L. Emerging Trends in Cloud Computing, Big Data, Fog Computing, IoT and Smart Living Springer Cham, Switzerland 2018 29 40 

  8. 8. Stergiou C. Psannis K.E. Kim B.G. Gupta B. Secure integration of IoT and cloud computing Future Gener. Comput. Syst. 2018 78 964 975 10.1016/j.future.2016.11.031 

  9. 9. Zhang Y. Zheng D. Guo R. Zhao Q. Fine-grained access control systems suitable for resource-constrained users in cloud computing Comput. Inf. 2018 37 327 348 10.4149/cai_2018_2_327 

  10. 10. Lu R. Heung K. Lashkari A.H. Ghorbani A.A. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT IEEE Access 2017 5 3302 3312 10.1109/ACCESS.2017.2677520 

  11. 11. Yannuzzi M. Milito R. Serral-Gracià R. Montero D. Nemirovsky M. Key ingredients in an IoT recipe: Fog computing, cloud computing, and more fog computing Proceedings of the IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) Athens, Greece 1–3 December 2014 325 329 

  12. 12. Bonomi F. Milito R. Zhu J. Addepalli S. Fog computing and its role in the Internet of Things Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing New York, NY, USA 17 August 2012 13 16 10.1145/2342509.2342513 

  13. 13. Shen J. Wang C. Li T. Chen X. Huang X. Zhan Z.H. Secure data uploading scheme for a smart home system Inf. Sci. 2018 453 186 197 10.1016/j.ins.2018.04.048 

  14. 14. Zhang Y. Zheng D. Deng R.H. Security and privacy in smart health: Efficient policy-hiding attribute-based access control IEEE Internet Things J. 2018 5 2130 2145 10.1109/JIOT.2018.2825289 

  15. 15. Shen J. Gui Z. Ji S. Shen J. Tan H. Tang Y. Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks J. Netw. Comput. Appl. 2018 106 117 123 10.1016/j.jnca.2018.01.003 

  16. 16. Zhang Y. Chen X. Li J. Li H. Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks Comput. Netw. 2014 75 192 211 10.1016/j.comnet.2014.10.009 

  17. 17. Han Q. Zhang Y. Chen X. Li H. Quan J. Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks Springer Berlin/Heidelberg, Germany 2012 180 191 

  18. 18. Zhang Y. Chen X. Li H. Cao J. Identity-based construction for secure and efficient handoff authentication schemes in wireless networks Secur. Commun. Netw. 2012 5 1121 1130 10.1002/sec.421 

  19. 19. Wang C. Shen J. Liu Q. Ren Y. Li T. A novel security scheme based on instant encrypted transmission for Internet of Things Secur. Commun. Netw. 2018 2018 3680851 10.1155/2018/3680851 

  20. 20. Jhaveri R.H. Patel N.M. Zhong Y. Sangaiah A.K. Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT IEEE Access 2018 6 20085 20103 10.1109/ACCESS.2018.2822945 

  21. 21. Zhang Y. Li J. Chen X. Li H. Anonymous attribute-based proxy re-encryption for access control in cloud computing Secur. Commun. Netw. 2016 9 2397 2411 10.1002/sec.1509 

  22. 22. Bhuiyan M.Z.A. Wu J. Wang G. Cao J. Sensing and decision making in cyber-Physical systems: The case of structural event monitoring IEEE Trans. Ind. Inf. 2016 12 2103 2114 10.1109/TII.2016.2518642 

  23. 23. Shu J. Jia X. Yang K. Wang H. Privacy-preserving task recommendation services for crowdsourcing IEEE Trans. Serv. Comput. 2018 10.1109/TSC.2018.2791601 

  24. 24. Shu J. Liu X. Jia X. Yang K. Deng R.H. Anonymous privacy-preserving task matching in crowdsourcing IEEE Internet Things J. 2018 5 3068 3078 10.1109/JIOT.2018.2830784 

  25. 25. He D. Kumar N. Zeadally S. Vinel A. Yang L.T. Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries IEEE Trans. Smart Grid 2017 8 2411 2419 10.1109/TSG.2017.2720159 

  26. 26. Zhang Y. Zhao J. Zheng D. Efficient and privacy-aware power injection over AMI and smart grid slice in future 5G networks Mob. Inf. Syst. 2017 2017 3680671 10.1155/2017/3680671 

  27. 27. Zhang Y. Li J. Zheng D. Li P. Tian Y. Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice J. Netw. Comput. Appl. 2018 10.1016/j.jnca.2018.07.017 

  28. 28. Jia W. Zhu H. Cao Z. Dong X. Xiao C. Human-factor-aware privacy-preserving aggregation in smart grid IEEE Syst. J. 2014 8 598 607 10.1109/JSYST.2013.2260937 

  29. 29. Stojmenovic I. Fog computing: A cloud to the ground support for smart things and machine-to-machine networks Proceedings of the Australasian Telecommunication Networks and Applications Conference (ATNAC) Southbank, VIC, Australia 26–28 November 2014 117 122 

  30. 30. Mahmoud M. Saputro N. Akula P. Akkaya K. Privacy-preserving power injection over a hybrid AMI/LTE smart grid network IEEE Internet Things J. 2016 4 870 880 10.1109/JIOT.2016.2593453 

  31. 31. Mukherjee M. Matam R. Shu L. Maglaras L. Ferrag M.A. Choudhury N. Kumar V. Security and privacy in fog computing: challenges IEEE Access 2017 5 19293 19304 10.1109/ACCESS.2017.2749422 

  32. 32. Zhang Y. Chen X. Li J. Wong D.S. Li H. You I. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Inf. Sci. 2017 379 42 61 10.1016/j.ins.2016.04.015 

  33. 33. Zhang Y. Wu A. Zheng D. Efficient and privacy-aware attribute-based data sharing in mobile cloud computing J. Ambient Intell. Hum. Comput. 2018 9 1039 1048 10.1007/s12652-017-0509-1 

  34. 34. Paillier P. Public-key cryptosystems based on composite degree residuosity classes Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic 2–6 May 1999 223 238 

  35. 35. Xu J. Wei L. Zhang Y. Wang A. Zhou F. Gao C.Z. Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures J. Netw. Comput. Appl. 2018 107 113 124 10.1016/j.jnca.2018.01.014 

  36. 36. Gao C.z. Cheng Q. He P. Susilo W. Li J. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack Inf. Sci. 2018 444 72 88 10.1016/j.ins.2018.02.058 

  37. 37. Shen H. Zhang M.W. A Privacy-preserving multilevel users’ electricity consumption aggregation and control scheme in smart grids J. Cryptol. Res. 2016 3 171 191 

  38. 38. Zhang Y. Shu J. Liu X. Li J. Zheng D. Security analysis of a large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing IEEE Internet Things J. 2018 10.1109/JIOT.2018.2862381 

  39. 39. Lai X. Zou W. Xie D. Li X. Fan L. DF relaying networks with randomly distributed interferers IEEE Access 2017 5 18909 18917 10.1109/ACCESS.2017.2751105 

  40. 40. Zhang Y. Lang P. Zheng D. Yang M. Guo R. A secure and privacy-aware smart health system with secret key leakage resilience Secur. Commun. Netw. 2018 2018 7202598 10.1155/2018/7202598 

  41. 41. Fan L. Lei X. Yang N. Duong T.Q. Karagiannidis G.K. Secrecy cooperative networks with outdated relay selection over correlated fading channels IEEE Trans. Veh. Technol. 2017 66 7599 7603 10.1109/TVT.2017.2669240 

  42. 42. Fan L. Lei X. Yang N. Duong T.Q. Karagiannidis G.K. Secure multiple amplify-and-forward relaying with cochannel interference IEEE J. Sel. Top. Signal Process. 2016 10 1494 1505 10.1109/JSTSP.2016.2607692 

  43. 43. Tan W. Xie D. Xia J. Tan W. Fan L. Jin S. Spectral and energy efficiency of massive MIMO for hybrid architectures based on phase shifters IEEE Access 2018 6 11751 11759 10.1109/ACCESS.2018.2796571 

  44. 44. Bhuiyan M.Z.A. Wu J. Wang G. Chen Z. Chen J. Wang T. Quality-guaranteed event-sensitive data collection and monitoring in vibration sensor networks IEEE Trans. Ind. Inf. 2017 13 572 583 10.1109/TII.2017.2665463 

  45. 45. Gershenfeld N. Krikorian R. Cohen D. The Internet of Things Sci. Am. 2004 291 76 81 10.1038/scientificamerican1004-76 15487673 

  46. 46. Zhou H. Chen J. Zhang Y.Y. Dang L.J. A multidimensional data aggregation scheme in multilevel network in smart grid J. Cryptol. Res. 2017 4 114 132 

  47. 47. Zhang Y. Deng R.H. Liu X. Zheng D. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing Inf. Sci. 2018 462 262 277 10.1016/j.ins.2018.06.018 

  48. 48. Zhang Y. Deng R.H. Shu J. Yang K. Zheng D. TKSE: trustworthy keyword search over encrypted data with two-side verifiability via blockchain IEEE Access 2018 6 31077 31087 10.1109/ACCESS.2018.2844400 

  49. 49. Zhang Y. Deng R.H. Liu X. Zheng D. Outsourcing service fair payment based on blockchain and its application in cloud computing IEEE Trans. Serv. Comput. 2018 10.1109/TSC.2018.2864191 

  50. 50. Chen X. Li J. Weng J. Ma J. Lou W. Verifiable computation over large database with incremental updates IEEE Trans. Comput. 2016 65 3184 3195 10.1109/TC.2015.2512870 

  51. 51. Chen W. Lei H. Qi K. Lattice-based linearly homomorphic signatures in the standard model Theor. Comput. Sci. 2016 634 47 54 10.1016/j.tcs.2016.04.009 

  52. 52. Lin Q. Yan H. Huang Z. Chen W. Shen J. Tang Y. An ID-based linearly homomorphic signature scheme and its application in blockchain IEEE Access 2018 6 20632 20640 10.1109/ACCESS.2018.2809426 

  53. 53. Chen X. Li J. Huang X. Ma J. Lou W. New publicly verifiable databases with efficient updates IEEE Trans. Dependable Secure Comput. 2015 12 546 556 10.1109/TDSC.2014.2366471 

관련 콘텐츠

오픈액세스(OA) 유형

GOLD

오픈액세스 학술지에 출판된 논문

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로