Advertisement

Query Privacy in Sensing-as-a-Service Platforms

  • Ruben Rios
  • David Nuñez
  • Javier Lopez
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 502)

Abstract

The Internet of Things (IoT) promises to revolutionize the way we interact with the physical world. Even though this paradigm is still far from being completely realized, there already exist Sensing-as-a-Service (S\(^2\)aaS) platforms that allow users to query for IoT data. While this model offers tremendous benefits, it also entails increasingly challenging privacy issues. In this paper, we concentrate on the protection of user privacy when querying sensing devices through a semi-trusted S\(^2\)aaS platform. In particular, we build on techniques inspired by proxy re-encryption and k-anonymity to tackle two intertwined problems, namely query privacy and query confidentiality. The feasibility of our solution is validated both analytically and empirically.

Notes

Acknowledgements

This paper has been partially supported by the Junta de Andalucía through the project FISICCO (P11-TIC-07223) and the Spanish Ministry of Economy and Competitiveness through the PERSIST (TIN2013-41739-R) and SMOG (TIN2016-79095-C2-1-R) projects.

References

  1. 1.
    Amazon Web Services: How the AWS IoT Platform Works. https://aws.amazon.com/iot/how-it-works/. Accessed Nov 2016
  2. 2.
    Milagro, A.: Apache Milagro Crypto Library. https://milagro.apache.org/
  3. 3.
    Aranha, D.F., Barreto, P.S.L.M., Longa, P., Ricardini, J.E.: The realm of the pairings. In: Lange, T., Lauter, K., Lisoněk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 3–25. Springer, Heidelberg (2014). doi: 10.1007/978-3-662-43414-7_1 CrossRefGoogle Scholar
  4. 4.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inform. Syst. Secur. 9(1), 1–30 (2006)CrossRefzbMATHGoogle Scholar
  5. 5.
    Ateniese, G., Camenisch, J., De Medeiros, B.: Untraceable RFID tags via insubvertible encryption. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 92–101. ACM (2005)Google Scholar
  6. 6.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). doi: 10.1007/BFb0054122 CrossRefGoogle Scholar
  7. 7.
    Carbunar, B., Yang, Y., Shi, W., Pearce, M., Vasudevan, V.: Query privacy in wireless sensor networks. ACM Trans. Sen. Netw. 6(2), 14:1–14:34 (2010)Google Scholar
  8. 8.
    Chen, F., Liu, A.X.: Privacy- and integrity-preserving range queries in sensor networks. IEEE/ACM Trans. Networking 20(6), 1774–1787 (2012)CrossRefGoogle Scholar
  9. 9.
    Cocchia, A.: Smart and digital city: a systematic literature review. In: Dameri, R.P., Rosenthal-Sabroux, C. (eds.) Smart City, pp. 13–43. Springer, Cham (2014). doi: 10.1007/978-3-319-06160-3_2 Google Scholar
  10. 10.
    Costello, C., Stebila, D.: Fixed Argument Pairings. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 92–108. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14712-8_6 CrossRefGoogle Scholar
  11. 11.
    De Cristofaro, E., Di Pietro, R.: Adversaries and countermeasures in privacy-enhanced urban sensing systems. IEEE Syst. J. 7(2), 311–322 (2013)CrossRefGoogle Scholar
  12. 12.
    De Cristofaro, E., Ding, X., Tsudik, G.: Privacy-preserving querying in sensor networks. In: 18th International Conference on Computer Communications and Networks, ICCCN 2009, San Francisco, CA, 3–6 August 2009, pp. 1–6. IEEE Computer Society, Washington, DC (2009)Google Scholar
  13. 13.
    Di Pietro, R., Viejo, A.: Location privacy and resilience in wireless sensor networks querying. Comput. Commun. 34(3), 515–523 (2011)CrossRefGoogle Scholar
  14. 14.
    Dimitriou, T., Sabouri, A.: Privacy preservation schemes for querying wireless sensor networks. In: IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 178–183 (2011)Google Scholar
  15. 15.
    Galbraith, S.D., Paterson, K.G., Smart, N.P.: Pairings for cryptographers. Discrete Appl. Math. 156(16), 3113–3121 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  16. 16.
    Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRefGoogle Scholar
  17. 17.
    Kiraz, M.S., Uzunkol, O.: Still wrong use of pairings in cryptography. Cryptology ePrint Archive, Report 2016/223 (2016). http://eprint.iacr.org/
  18. 18.
    Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007, pp. 106–115, April 2007Google Scholar
  19. 19.
    Liao, X., Li, J.: Privacy-preserving and secure top-k query in two-tier wireless sensor network. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 335–341, December 2012Google Scholar
  20. 20.
    Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefzbMATHGoogle Scholar
  21. 21.
    Schaffer, P., Farkas, K., Horváth, Á., Holczer, T., Buttyán, L.: Secure and reliable clustering in wireless sensor networks: a critical survey. Comput. Netw. 56(11), 2726–2741 (2012)CrossRefGoogle Scholar
  22. 22.
    Sheng, X., Tang, J., Xiao, X., Xue, G.: Sensing as a service: challenges, solutions and future directions. IEEE Sens. J. 13(10), 3733–3741 (2013)CrossRefGoogle Scholar
  23. 23.
    Willard, T.: Sensors as a Service on the Internet of Things. White paper, ARM Ltd., January 2014Google Scholar
  24. 24.
    Zhang, X., Dong, L., Peng, H., Chen, H., Li, D., Li, C.: Achieving efficient and secure range query in two-tiered wireless sensor networks. In: 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), pp. 380–388, May 2014Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2017

Authors and Affiliations

  1. 1.Network, Information and Computer Security (NICS) Lab, Computer Science DepartmentUniversity of MálagaMálagaSpain

Personalised recommendations