Abstract
In recent years, the area of fog computing is receiving maximum focus due to the potential improvements in the cloud computing field. Fog computing is capable of resolving issues that includes location awareness, inadequate mobility support and high latency in the cloud computing environment. The internet of things (IoT) comprises of a collection of IoT equipments connected to fog nodes in order to aid the cloud service center for storing and processed a portion of data in prior. This process of storing and processing greatly minimizes the pressure in data processing with enhanced service and real time quality. However, data modification attacks and false data injection attacks introduce significant challenges over the fog nodes during the event of data processing. In this paper, Hybrid GSW (Gentry, Sahai, and Waters) and DM (Ducas and Micciancio) based fully homomorphic encryption (HGSW–DM–FHE) scheme was proposed for handling false data injection attacks under privacy preserving data aggregation in fog computing. This proposed HGSW–DM–FHE scheme is highly fault tolerant, since the process of data aggregation from other devices is not influenced even when the fog devices fails in operation. In addition, the proposed HGSW–DM–FHE scheme is determined to be efficient and secure by preventing the data injected from legal IoT devices are unaltered and protected immaterial to the honesty and maliciousness of the cloud control center and fog nodes.
Similar content being viewed by others
References
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. Proc First Ed MCC Workshop Mob Cloud Comput MCC 12:12–23
Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546–556
Chen W, Lei H, Qi K (2016) Lattice-based linearly homomorphic signatures in the standard model. Theoret Comput Sci 634(1):47–54
Dang TD, Hoang D (2017) A data protection model for fog computing. Second Int Conf Fog Mob Edge Comput (FMEC) 1:24–32
He D, Kumar N, Zeadally S, Vinel A, Yang LT (2017) Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Trans Smart Grid 8(5):2411–2419
Knirsch F, Eibl G, Engel D (2018) Error-resilient masking approaches for privacy preserving data aggregation. IEEE Trans Smart Grid 9(4):3351–3361
Li J, Zhang Y, Chen X, Xiang Y (2018a) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72(1):1–12
Li M, Zhu L, Lin X (2018b) Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet Things J 1(1):1–1
Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6(1):20632–20640
Lu R (2016) Privacy-preserving multidimensional data aggregation. Wireless Netw 1(2):41–60
Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312
Mahmoud MM, Saputro N, Akula PK, Akkaya K (2017) Privacy-preserving power injection over a hybrid AMI/LTE smart grid network. IEEE Int Things J 4(4):870–880
Ming Y, Zhang X, Shen X (2019) Efficient privacy-preserving multi-dimensional data aggregation scheme in smart grid. IEEE Access 1(1):1–1
Mukherjee M, Matam R, Shu L, Maglaras L, Ferrag MA, Choudhury N, Kumar V (2017) Security and privacy in fog computing: challenges. IEEE Access 5:19293–19304
Tiwari D, Gangadharan GR (2017) SecCloudSharing: secure data sharing in public cloud using ciphertext policy attribute-based proxy re-encryption with revocation. Int J Commun Syst 31(5):3494–3494
Wang Q, Wang C, Ren K, Lou W, Li J (2011) Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Trans Parallel Distrib Syst 22(5):847–859
Wang X, Wang L, Li Y, Gai K (2018) Privacy-aware efficient fine- grained data access control in internet of medical things based fog computing. IEEE Access 6(1):47657–47665
Wei J, Wang X, Li N, Yang G, Mu Y (2018) A privacy-preserving fog computing framework for vehicular crowdsensing networks. IEEE Access 6(1):43776–43784
Xu J, Wei L, Wu W, Wang A, Zhang Y, Zhou F (2018a) Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. Future Gener Comput Syst 1(1):78–86
Xu J, Wei L, Zhang Y, Wang A, Zhou F, Gao C (2018b) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107(1):113–124
Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: IEEE 19th international workshop on computer aided modeling and design of communication links and networks (CA- MAD), vol 1, pp 45–54
Yao Y, Chang X, Misc J, Misc VB, Li L (2019) BLA: blockchain-assisted lightweight anonymous authentication for distributed vehicular fog services. IEEE Internet Things J 1(1):1–1
Zhang Y, Yang M, Zheng D, Lang P, Wu A, Chen C (2018a) Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput 22(23):7763–7772
Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X (2018b) Privacy-aware data collection and aggregation in iot enabled fog computing. In: International conference on algorithms and architectures for parallel processing. Springer, Cham, pp 581–590
Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X, Shu J (2018c) Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors 18(8):2659–2659
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Amuthan, A., Sendhil, R. Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing. J Ambient Intell Human Comput 11, 5217–5231 (2020). https://doi.org/10.1007/s12652-020-01849-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-01849-8