Abstract
Most current data aggregation schemes treat data collected from smart devices as one-dimensional data and only support the aggregation of homogeneous types of data, but not the aggregation of multidimensional heterogeneous types of data. To address this problem, this paper proposes an edge-assisted hierarchical privacy-preserving multidimensional data aggregation mechanism (EPMA). In this mechanism, using a hierarchical aggregation framework assisted by edge computing, we propose a multi-region multidimensional data aggregation scheme that utilizes the homomorphic Paillier algorithm and Horner’s law to achieve privacy aggregation while effectively reducing computation and communication overhead. It provides strong support for secure and efficient multidimensional data collection and communication. In particular, Horner’s law allows different fine-grained aggregation results to be parsed from the aggregated ciphertexts, providing flexibility to meet different data analysis needs. In addition, we propose an efficient signature authentication method adopting lightweight elliptic curve encryption algorithms and bulk authentication techniques to ensure data integrity and identity validity. Finally, the security analysis proves that the EPMA mechanism is secure, and the theoretical analysis and simulation experiments illustrate that the EPMA mechanism has lower computational cost compared with other mechanisms and is more suitable for practical industrial application scenarios.
Similar content being viewed by others
Availability of data and materials
All data generated or analysed during this study are included in this published article.
Code Availability
Not applicable.
References
Wu J, Sheng X, Li G et al (2022) An efficient and secure aggregation encryption scheme in edge computing. China Commun 19(3):245–257
Ma R, Feng T, Li Q et al (2022) Blockchain-enabled secure distributed data aggregation and verification mechanism for IIoT. In: Proc. 2022 IEEE Global communications conference (IEEE Globecom 2022 MWN), 4-8 December 2022, Rio de Janeiro, Brazil
Zhang W, Liu S, Xia Z (2022) A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control. J Inf Secur Appl 2022(5):66
Hou C, Liu G, Tian Q et al (2022) Multisignal modulation classification using sliding window detection and complex convolutional network in frequency domain. IEEE Internet of Things Journal 9(19):19438–19449
Naim C, D’Oliveira R (2022) Rouayheb SE (2022) Private multi-group aggregation. IEEE Journal on Selected Areas in Communications 3:40
Fu S, Ma J, Li H et al (2016) A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities. Secur Commun Netw 9(15):2779–2788
Ma R, Feng T, Fang J (2021) Edge computing assisted an efficient privacy protection layered data aggregation scheme for IIoT. Secur Commun Netw
Borovska P, Gugutkov M (2021) The intersection of IoT ecosystem security and blockchain technology in the context of industry 4.0. In: Proc. Thermophysical Basis of Energy Technologies (TBET 2020) pp 10–14
Xiong J, Bi R, Zhao M et al (2020) Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles. IEEE Wirel Commun 27(3):24–30. https://doi.org/10.1109/MWC.001.1900463
Cui J, Shao L, Zhong H et al (2018) Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications 11(5):1022–1037
Hu M, Ye Q, Gao W et al (2018) A novel hierarchical identity-based fully homomorphic encryption scheme from lattices. In: Proc. international conference on cloud computing and security. Springer, Cham pp 423–434
Tonyali S, Akkaya K, Saputro N et al (2018) Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems. Futur Gener Comput Syst 78:547–557
Deng R, Lu R, Lai C et al (2015) Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing. In: Proc. IEEE International Conference on Communications (ICC) pp 3909–3914
Yang X, Zhang S, Wang B (2018) Multi-data aggregation scheme based on multiple subsets to realize user privacy protection. In: Proc. IEEE International conference on anti-counterfeiting, security, and identification (ASID), pp 61–65
Jia B, Zhang X, Liu J et al (2021) Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Trans Ind Inf PP(99):1–1
Bi R, Xiong J, Tian Y et al (2022) Achieving lightweight and privacy-preserving object detection for connected autonomous vehicles. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2022.3212464
Sun G, Sun S, Sun J et al (2019) Security and privacy preservation in fog-based crowd sensing on the internet of vehicles. J Netw Comput Appl 134:89–99
Shen X, Zhu L, Xu C et al (2020) A privacy-preserving data aggregation scheme for dynamic groups in fog computing. Inf Sci 514:118–130
Lee G, Ko H, Pack S et al (2019) Fog-assisted aggregated synchronization scheme for mobile cloud storage applications. IEEE Access 7:56852–56863
Liu J, Yuen T, Au M et al (2014) Improvements on an authentication scheme for vehicular sensor networks. Expert Syst Appl 41(5):2559–2564
Liu Y, Wang K, Yun L et al (2019) LightChain: A lightweight blockchain system for industrial internet of things. IEEE Trans Ind Inf 15(6):3571–3581
Li T, Tian Y, Xiong J, Bhuiyan M (2022) FVP-EOC: fair, verifiable and privacy-preserving edge outsourcing computing in 5G-enabled IIoT. IEEE Trans Ind Inf. https://doi.org/10.1109/TII.2022.3179531
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Proc. international conference on the theory and applications of cryptographic techniques, pp 223–238
Tian Y, Li T, Xiong J et al (2022) A blockchain-based machine learning framework for edge services in IIoT. IEEE Trans Ind Inf 18(3):1918–1929. https://doi.org/10.1109/TII.2021.3097131
Funding
This work is supported by the National Natural Science Foundation of China (Grant No. 62162039, 61762060).
Author information
Authors and Affiliations
Contributions
Rong Ma and Tao Feng contributed to the conception of the study and wrote the manuscript; Youliang Tian helped perform the analysis with constructive discussions; Jinbo Xiong contributed significantly to analysis and manuscript preparation.
Corresponding author
Ethics declarations
Ethics approval
Not applicable.
Conflicts of interest
Authors have no conflict of interest to declare.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ma, R., Feng, T., Tian, Y. et al. EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism. Mobile Netw Appl (2023). https://doi.org/10.1007/s11036-023-02206-7
Accepted:
Published:
DOI: https://doi.org/10.1007/s11036-023-02206-7