Skip to main content
Log in

Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In recent years, the area of fog computing is receiving maximum focus due to the potential improvements in the cloud computing field. Fog computing is capable of resolving issues that includes location awareness, inadequate mobility support and high latency in the cloud computing environment. The internet of things (IoT) comprises of a collection of IoT equipments connected to fog nodes in order to aid the cloud service center for storing and processed a portion of data in prior. This process of storing and processing greatly minimizes the pressure in data processing with enhanced service and real time quality. However, data modification attacks and false data injection attacks introduce significant challenges over the fog nodes during the event of data processing. In this paper, Hybrid GSW (Gentry, Sahai, and Waters) and DM (Ducas and Micciancio) based fully homomorphic encryption (HGSW–DM–FHE) scheme was proposed for handling false data injection attacks under privacy preserving data aggregation in fog computing. This proposed HGSW–DM–FHE scheme is highly fault tolerant, since the process of data aggregation from other devices is not influenced even when the fog devices fails in operation. In addition, the proposed HGSW–DM–FHE scheme is determined to be efficient and secure by preventing the data injected from legal IoT devices are unaltered and protected immaterial to the honesty and maliciousness of the cloud control center and fog nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. Proc First Ed MCC Workshop Mob Cloud Comput MCC 12:12–23

    Google Scholar 

  • Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546–556

    Article  Google Scholar 

  • Chen W, Lei H, Qi K (2016) Lattice-based linearly homomorphic signatures in the standard model. Theoret Comput Sci 634(1):47–54

    Article  MathSciNet  MATH  Google Scholar 

  • Dang TD, Hoang D (2017) A data protection model for fog computing. Second Int Conf Fog Mob Edge Comput (FMEC) 1:24–32

    Google Scholar 

  • He D, Kumar N, Zeadally S, Vinel A, Yang LT (2017) Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans Smart Grid 8(5):2411–2419

    Article  Google Scholar 

  • Knirsch F, Eibl G, Engel D (2018) Error-resilient masking approaches for privacy preserving data aggregation. IEEE Trans Smart Grid 9(4):3351–3361

    Article  Google Scholar 

  • Li J, Zhang Y, Chen X, Xiang Y (2018a) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72(1):1–12

    Article  Google Scholar 

  • Li M, Zhu L, Lin X (2018b) Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet Things J 1(1):1–1

    Article  Google Scholar 

  • Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6(1):20632–20640

    Article  Google Scholar 

  • Lu R (2016) Privacy-preserving multidimensional data aggregation. Wireless Netw 1(2):41–60

    Article  Google Scholar 

  • Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312

    Article  Google Scholar 

  • Mahmoud MM, Saputro N, Akula PK, Akkaya K (2017) Privacy-preserving power injection over a hybrid AMI/LTE smart grid network. IEEE Int Things J 4(4):870–880

    Article  Google Scholar 

  • Ming Y, Zhang X, Shen X (2019) Efficient privacy-preserving multi-dimensional data aggregation scheme in smart grid. IEEE Access 1(1):1–1

    Google Scholar 

  • Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304

    Article  Google Scholar 

  • Tiwari D, Gangadharan GR (2017) SecCloudSharing: secure data sharing in public cloud using ciphertext policy attribute-based proxy re-encryption with revocation. Int J Commun Syst 31(5):3494–3494

    Article  Google Scholar 

  • Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859

    Article  Google Scholar 

  • Wang X, Wang L, Li Y, Gai K (2018) Privacy-aware efficient fine- grained data access control in internet of medical things based fog computing. IEEE Access 6(1):47657–47665

    Article  Google Scholar 

  • Wei J, Wang X, Li N, Yang G, Mu Y (2018) A privacy-preserving fog computing framework for vehicular crowdsensing networks. IEEE Access 6(1):43776–43784

    Article  Google Scholar 

  • Xu J, Wei L, Wu W, Wang A, Zhang Y, Zhou F (2018a) Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. Future Gener Comput Syst 1(1):78–86

    Google Scholar 

  • Xu J, Wei L, Zhang Y, Wang A, Zhou F, Gao C (2018b) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107(1):113–124

    Article  Google Scholar 

  • Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: IEEE 19th international workshop on computer aided modeling and design of communication links and networks (CA- MAD), vol 1, pp 45–54

  • Yao Y, Chang X, Misc J, Misc VB, Li L (2019) BLA: blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J 1(1):1–1

    Article  Google Scholar 

  • Zhang Y, Yang M, Zheng D, Lang P, Wu A, Chen C (2018a) Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput 22(23):7763–7772

    Article  MATH  Google Scholar 

  • Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X (2018b) Privacy-aware data collection and aggregation in iot enabled fog computing. In: International conference on algorithms and architectures for parallel processing. Springer, Cham, pp 581–590

  • Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X, Shu J (2018c) Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors 18(8):2659–2659

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Sendhil.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Amuthan, A., Sendhil, R. Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing. J Ambient Intell Human Comput 11, 5217–5231 (2020). https://doi.org/10.1007/s12652-020-01849-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01849-8

Keywords

Navigation