Skip to main content
Log in

EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Most current data aggregation schemes treat data collected from smart devices as one-dimensional data and only support the aggregation of homogeneous types of data, but not the aggregation of multidimensional heterogeneous types of data. To address this problem, this paper proposes an edge-assisted hierarchical privacy-preserving multidimensional data aggregation mechanism (EPMA). In this mechanism, using a hierarchical aggregation framework assisted by edge computing, we propose a multi-region multidimensional data aggregation scheme that utilizes the homomorphic Paillier algorithm and Horner’s law to achieve privacy aggregation while effectively reducing computation and communication overhead. It provides strong support for secure and efficient multidimensional data collection and communication. In particular, Horner’s law allows different fine-grained aggregation results to be parsed from the aggregated ciphertexts, providing flexibility to meet different data analysis needs. In addition, we propose an efficient signature authentication method adopting lightweight elliptic curve encryption algorithms and bulk authentication techniques to ensure data integrity and identity validity. Finally, the security analysis proves that the EPMA mechanism is secure, and the theoretical analysis and simulation experiments illustrate that the EPMA mechanism has lower computational cost compared with other mechanisms and is more suitable for practical industrial application scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Availability of data and materials

All data generated or analysed during this study are included in this published article.

Code Availability

Not applicable.

References

  1. Wu J, Sheng X, Li G et al (2022) An efficient and secure aggregation encryption scheme in edge computing. China Commun 19(3):245–257

    Article  Google Scholar 

  2. Ma R, Feng T, Li Q et al (2022) Blockchain-enabled secure distributed data aggregation and verification mechanism for IIoT. In: Proc. 2022 IEEE Global communications conference (IEEE Globecom 2022 MWN), 4-8 December 2022, Rio de Janeiro, Brazil

  3. Zhang W, Liu S, Xia Z (2022) A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control. J Inf Secur Appl 2022(5):66

    Google Scholar 

  4. Hou C, Liu G, Tian Q et al (2022) Multisignal modulation classification using sliding window detection and complex convolutional network in frequency domain. IEEE Internet of Things Journal 9(19):19438–19449

    Article  Google Scholar 

  5. Naim C, D’Oliveira R (2022) Rouayheb SE (2022) Private multi-group aggregation. IEEE Journal on Selected Areas in Communications 3:40

    Google Scholar 

  6. Fu S, Ma J, Li H et al (2016) A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities. Secur Commun Netw 9(15):2779–2788

    Article  Google Scholar 

  7. Ma R, Feng T, Fang J (2021) Edge computing assisted an efficient privacy protection layered data aggregation scheme for IIoT. Secur Commun Netw

  8. Borovska P, Gugutkov M (2021) The intersection of IoT ecosystem security and blockchain technology in the context of industry 4.0. In: Proc. Thermophysical Basis of Energy Technologies (TBET 2020) pp 10–14

  9. Xiong J, Bi R, Zhao M et al (2020) Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles. IEEE Wirel Commun 27(3):24–30. https://doi.org/10.1109/MWC.001.1900463

    Article  Google Scholar 

  10. Cui J, Shao L, Zhong H et al (2018) Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Networking and Applications 11(5):1022–1037

    Article  Google Scholar 

  11. Hu M, Ye Q, Gao W et al (2018) A novel hierarchical identity-based fully homomorphic encryption scheme from lattices. In: Proc. international conference on cloud computing and security. Springer, Cham pp 423–434

  12. Tonyali S, Akkaya K, Saputro N et al (2018) Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems. Futur Gener Comput Syst 78:547–557

  13. Deng R, Lu R, Lai C et al (2015) Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing. In: Proc. IEEE International Conference on Communications (ICC) pp 3909–3914

  14. Yang X, Zhang S, Wang B (2018) Multi-data aggregation scheme based on multiple subsets to realize user privacy protection. In: Proc. IEEE International conference on anti-counterfeiting, security, and identification (ASID), pp 61–65

  15. Jia B, Zhang X, Liu J et al (2021) Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Trans Ind Inf PP(99):1–1

  16. Bi R, Xiong J, Tian Y et al (2022) Achieving lightweight and privacy-preserving object detection for connected autonomous vehicles. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2022.3212464

  17. Sun G, Sun S, Sun J et al (2019) Security and privacy preservation in fog-based crowd sensing on the internet of vehicles. J Netw Comput Appl 134:89–99

    Article  Google Scholar 

  18. Shen X, Zhu L, Xu C et al (2020) A privacy-preserving data aggregation scheme for dynamic groups in fog computing. Inf Sci 514:118–130

    Article  Google Scholar 

  19. Lee G, Ko H, Pack S et al (2019) Fog-assisted aggregated synchronization scheme for mobile cloud storage applications. IEEE Access 7:56852–56863

    Article  Google Scholar 

  20. Liu J, Yuen T, Au M et al (2014) Improvements on an authentication scheme for vehicular sensor networks. Expert Syst Appl 41(5):2559–2564

    Article  Google Scholar 

  21. Liu Y, Wang K, Yun L et al (2019) LightChain: A lightweight blockchain system for industrial internet of things. IEEE Trans Ind Inf 15(6):3571–3581

  22. Li T, Tian Y, Xiong J, Bhuiyan M (2022) FVP-EOC: fair, verifiable and privacy-preserving edge outsourcing computing in 5G-enabled IIoT. IEEE Trans Ind Inf. https://doi.org/10.1109/TII.2022.3179531

  23. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Proc. international conference on the theory and applications of cryptographic techniques, pp 223–238

  24. Tian Y, Li T, Xiong J et al (2022) A blockchain-based machine learning framework for edge services in IIoT. IEEE Trans Ind Inf 18(3):1918–1929. https://doi.org/10.1109/TII.2021.3097131

    Article  Google Scholar 

Download references

Funding

This work is supported by the National Natural Science Foundation of China (Grant No. 62162039, 61762060).

Author information

Authors and Affiliations

Authors

Contributions

Rong Ma and Tao Feng contributed to the conception of the study and wrote the manuscript; Youliang Tian helped perform the analysis with constructive discussions; Jinbo Xiong contributed significantly to analysis and manuscript preparation.

Corresponding author

Correspondence to Rong Ma.

Ethics declarations

Ethics approval

Not applicable.

Conflicts of interest

Authors have no conflict of interest to declare.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, R., Feng, T., Tian, Y. et al. EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism. Mobile Netw Appl (2023). https://doi.org/10.1007/s11036-023-02206-7

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11036-023-02206-7

Keywords

Navigation