Skip to main content
Log in

PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Data is generated over time by each device in the Internet of Things (IoT) ecosphere. Recent years have seen a resurgence in interest in the IoT due to its positive impact on society. However, due to the automatic management of IoT devices, the possibility of disclosing sensitive information without user consent is high. A situation in which information should not be unintentionally disclosed to outside parties we do not trust, i.e., privacy-preservation. Additionally, IoT devices should share their data with others to perform data aggregation and provide high-level services. There is a trade-off between the amount of data utility and the amount of disclosure of data. This trade-off has been causing a big challenge in this field. To improve the efficiency of this trade-off rather than current studies, in this study, we propose a Privacy-Preserving Data Aggregation architecture, PPDMIT, that leverages Homomorphic Paillier Encryption (HPE), K-means, a One-way hash chain, and the Chinese Remainder Theorem (CRT). We have found that the proposed privacy-preserving architecture achieves more efficient data aggregation than current studies and improves privacy preservation by utilizing extensive simulations. Moreover, we found that our proposed architecture is highly applicable to IoT environments while preventing unauthorized data disclosure. Specifically, our solution depicted an 8.096% improvement over LPDA and 6.508% over PPIOT.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Aïvodji UM, Gambs S, Martin A (2019) IOTFLA : AA secured and privacy-preserving smart home architecture implementing federated learning. In: Proc. - 2019 IEEE Symp. Secur. Priv. Work. SPW 2019, pp. 175–180

  • Aldeen YAAS, Salleh M, Razzaque MA (2015) A comprehensive review on privacy preserving data mining. Springerplus 4(1):694

    Article  Google Scholar 

  • Badra M, Zeadally S (2017) Lightweight and efficient privacy-preserving data aggregation approach for the smart grid. Ad Hoc Netw 64:32–40

    Article  Google Scholar 

  • Beecham (2021) IoT security threat map,Online Report Beecham research. online Rep. http://www.beechamresearch.com/download.aspx?id=43, 2021.

  • Ding X, Yu Q, Li J, Liu J, Jin H (2013) Distributed anonymization for multiple data providers in a cloud system. In: International Conference on Database Systems for Advanced Applications, pp. 346–360.

  • Erdos P, Schönheim J (1969) On the set of non pairwise coprime divisors of a number. In: Combinatorial theory and its applications, I (Proc. Colloq., Balatonfüred, 1969), pp. 369–376.

  • Gheisari M, Wang G, Chen S, Seyfollahi A (2018) A method for privacy-preserving in IoT-SDN integration environment. In: 2018 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Ubiquitous Computing and Communications, Big Data and Cloud Computing, Social Computing and Networking, Sustainable Computing and Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), pp. 895–902.

  • Gheisari M, Wang G, Chen S (2020) An edge computing-enhanced internet of things framework for privacy-preserving in smart city. Comput Electr Eng 81:106504

    Article  Google Scholar 

  • Gheisari M et al (2021) OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Fut Gen Comput Syst 123:1–13

    Article  Google Scholar 

  • Guan Z et al (2019) APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J Netw Comput Appl 125:82–92

    Article  Google Scholar 

  • Javadpour A (2019a) Providing a way to create balance between reliability and delays in SDN networks by using the appropriate placement of controllers. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-06773-5

    Article  Google Scholar 

  • Javadpour A (2019b) Improving resources management in network virtualization by utilizing a software-based network. Wirel Pers Commun 106(2):505–519

    Article  Google Scholar 

  • Javadpour A, Wang G (2021) cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. J Supercomput. https://doi.org/10.1007/s11227-021-03871-9

    Article  Google Scholar 

  • Javadpour A, Wang G, Rezaei S, Chend S (2018) Power curtailment in cloud environment utilising load balancing machine allocation. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 1364–1370.

  • Javadpour A, Wang G, Rezaei S (2020a) Resource management in a peer to peer cloud network for IoT. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07691-7

    Article  Google Scholar 

  • Javadpour A, Wang G, Rezaei S, Li K-C (2020b) Detecting straggler MapReduce tasks in big data processing infrastructure by neural network. J Supercomput. https://doi.org/10.1007/s11227-019-03136-6

    Article  Google Scholar 

  • Jayaraman PP, Yang X, Yavari A, Georgakopoulos D, Yi X (2017) Privacy preserving internet of things: from privacy techniques to a blueprint architecture and efficient implementation. Fut Gen Comput Syst 76:540–549

    Article  Google Scholar 

  • Jho N-S, Hwang JY, Cheon JH, Kim M-H, Lee DH, Yoo ES (2005) One-way chain based broadcast encryption schemes. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 559–574.

  • Kamakshi P, Babu AV (2012) Automatic detection of sensitive attribute in PPDM. IEEE Int Conf Comput Intell Comput Res 2012:1–5

    Google Scholar 

  • Khan BUI, Olanrewaju RF, Anwar F, Mir RN, Najeeb AR (2019) A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. Int J Inf Comput Secur 11(4–5):332–354

    Google Scholar 

  • Lai J, Li Y, Deng RH, Weng J, Guan C, Yan Q (2014) Towards semantically secure outsourcing of association rule mining on categorical data. Inf Sci (NY) 267:267–286

    Article  MathSciNet  MATH  Google Scholar 

  • Liu Q, Wang G, Li F, Yang S, Wu J (2016) Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans Parallel Distrib Syst 28(5):1417–1429

    Article  Google Scholar 

  • Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312

    Article  Google Scholar 

  • Martonosi M (2016) Keynotes: internet of things: history and hype, technology and policy. In: 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2016, pp. 1–2.

  • Melchor CA, Gaborit P (2008) A fast private information retrieval protocol. IEEE Int Symp Inform Theory 2008:1848–1852

    Google Scholar 

  • Mendel F, Rechberger C, Schläffer M (2009) MD5 is weaker than weak: attacks on concatenated combiners. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 144–161

  • Mirmohseni SM, Tang C, Javadpour A (2020) Using markov learning utilization model for resource allocation in cloud of thing network. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07591-w

    Article  Google Scholar 

  • Mukkamala R, Ashok VG (2011) Fuzzy-based methods for privacy-preserving data mining. Eighth Int Conf Inform Technol New Gen 2011:348–353

    Google Scholar 

  • Rachels J (2017) Why privacy is important. In: Privacy, Routledge, pp. 11–21.

  • Raju R, Komalavalli R, Kesavakumar V (2009) Privacy maintenance collaborative data mining-a practical approach. Second Int Conf Emerg Trends Eng Technol 2009:307–311

    Google Scholar 

  • Ruj S, Nayak A (2013) A decentralized security framework for data aggregation and access control in smart grids. IEEE Trans Smart Grid 4(1):196–205

    Article  Google Scholar 

  • Tassa T (2013) Secure mining of association rules in horizontally distributed databases. IEEE Trans Knowl Data Eng 26(4):970–983

    Article  Google Scholar 

  • Wang Q, Mu H (2021) Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT. Sensors 21(16):5369

    Article  Google Scholar 

  • Wang J, Wu L, Zeadally S, Khan MK, He D (2021) Privacy-preserving data aggregation against malicious data mining attack for iot-enabled smart grid. ACM Trans Sen Netw. https://doi.org/10.1145/3440249

    Article  Google Scholar 

  • Zhang X, Liu C, Nepal S, Yang C, Dou W, Chen J (2013) Combining top-down and bottom-up: scalable sub-tree anonymization over big data using MapReduce on cloud. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 501–508.

  • Zhang J, Zhao Y, Wu J, Chen B (2020) LVPDA: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Internet Things J 7(5):4016–4027

    Article  Google Scholar 

  • Zheng P, Huang J (2013) An efficient image homomorphic encryption scheme with small ciphertext expansion. In: Proceedings of the 21st ACM international conference on Multimedia, pp. 803–812.

  • Zhu H, Meng X, Kollios G (2014) Privacy preserving similarity evaluation of time series data. EDBT 2014:499–510

    Google Scholar 

Download references

Acknowledgements

Special thanks to Islamic Azad Unviersity, Iran. Moreover, this work is supported by Shenzhen Stable Supporting Program (General Project) (No. GXWD20201230155427003-20200821160539001) and Shenzhen Basic Research (General Project) (No. JCYJ20190806142601687).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Amir Javadpour or Jiechao Gao.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gheisari, M., Javadpour, A., Gao, J. et al. PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things. J Ambient Intell Human Comput 14, 5211–5223 (2023). https://doi.org/10.1007/s12652-022-03866-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-03866-1

Keywords

Navigation