Abstract
Data is generated over time by each device in the Internet of Things (IoT) ecosphere. Recent years have seen a resurgence in interest in the IoT due to its positive impact on society. However, due to the automatic management of IoT devices, the possibility of disclosing sensitive information without user consent is high. A situation in which information should not be unintentionally disclosed to outside parties we do not trust, i.e., privacy-preservation. Additionally, IoT devices should share their data with others to perform data aggregation and provide high-level services. There is a trade-off between the amount of data utility and the amount of disclosure of data. This trade-off has been causing a big challenge in this field. To improve the efficiency of this trade-off rather than current studies, in this study, we propose a Privacy-Preserving Data Aggregation architecture, PPDMIT, that leverages Homomorphic Paillier Encryption (HPE), K-means, a One-way hash chain, and the Chinese Remainder Theorem (CRT). We have found that the proposed privacy-preserving architecture achieves more efficient data aggregation than current studies and improves privacy preservation by utilizing extensive simulations. Moreover, we found that our proposed architecture is highly applicable to IoT environments while preventing unauthorized data disclosure. Specifically, our solution depicted an 8.096% improvement over LPDA and 6.508% over PPIOT.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Aïvodji UM, Gambs S, Martin A (2019) IOTFLA : AA secured and privacy-preserving smart home architecture implementing federated learning. In: Proc. - 2019 IEEE Symp. Secur. Priv. Work. SPW 2019, pp. 175–180
Aldeen YAAS, Salleh M, Razzaque MA (2015) A comprehensive review on privacy preserving data mining. Springerplus 4(1):694
Badra M, Zeadally S (2017) Lightweight and efficient privacy-preserving data aggregation approach for the smart grid. Ad Hoc Netw 64:32–40
Beecham (2021) IoT security threat map,Online Report Beecham research. online Rep. http://www.beechamresearch.com/download.aspx?id=43, 2021.
Ding X, Yu Q, Li J, Liu J, Jin H (2013) Distributed anonymization for multiple data providers in a cloud system. In: International Conference on Database Systems for Advanced Applications, pp. 346–360.
Erdos P, Schönheim J (1969) On the set of non pairwise coprime divisors of a number. In: Combinatorial theory and its applications, I (Proc. Colloq., Balatonfüred, 1969), pp. 369–376.
Gheisari M, Wang G, Chen S, Seyfollahi A (2018) A method for privacy-preserving in IoT-SDN integration environment. In: 2018 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Ubiquitous Computing and Communications, Big Data and Cloud Computing, Social Computing and Networking, Sustainable Computing and Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), pp. 895–902.
Gheisari M, Wang G, Chen S (2020) An edge computing-enhanced internet of things framework for privacy-preserving in smart city. Comput Electr Eng 81:106504
Gheisari M et al (2021) OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Fut Gen Comput Syst 123:1–13
Guan Z et al (2019) APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J Netw Comput Appl 125:82–92
Javadpour A (2019a) Providing a way to create balance between reliability and delays in SDN networks by using the appropriate placement of controllers. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-06773-5
Javadpour A (2019b) Improving resources management in network virtualization by utilizing a software-based network. Wirel Pers Commun 106(2):505–519
Javadpour A, Wang G (2021) cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. J Supercomput. https://doi.org/10.1007/s11227-021-03871-9
Javadpour A, Wang G, Rezaei S, Chend S (2018) Power curtailment in cloud environment utilising load balancing machine allocation. In: 2018 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 1364–1370.
Javadpour A, Wang G, Rezaei S (2020a) Resource management in a peer to peer cloud network for IoT. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07691-7
Javadpour A, Wang G, Rezaei S, Li K-C (2020b) Detecting straggler MapReduce tasks in big data processing infrastructure by neural network. J Supercomput. https://doi.org/10.1007/s11227-019-03136-6
Jayaraman PP, Yang X, Yavari A, Georgakopoulos D, Yi X (2017) Privacy preserving internet of things: from privacy techniques to a blueprint architecture and efficient implementation. Fut Gen Comput Syst 76:540–549
Jho N-S, Hwang JY, Cheon JH, Kim M-H, Lee DH, Yoo ES (2005) One-way chain based broadcast encryption schemes. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 559–574.
Kamakshi P, Babu AV (2012) Automatic detection of sensitive attribute in PPDM. IEEE Int Conf Comput Intell Comput Res 2012:1–5
Khan BUI, Olanrewaju RF, Anwar F, Mir RN, Najeeb AR (2019) A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem. Int J Inf Comput Secur 11(4–5):332–354
Lai J, Li Y, Deng RH, Weng J, Guan C, Yan Q (2014) Towards semantically secure outsourcing of association rule mining on categorical data. Inf Sci (NY) 267:267–286
Liu Q, Wang G, Li F, Yang S, Wu J (2016) Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans Parallel Distrib Syst 28(5):1417–1429
Lu R, Heung K, Lashkari AH, Ghorbani AA (2017) A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 5:3302–3312
Martonosi M (2016) Keynotes: internet of things: history and hype, technology and policy. In: 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), 2016, pp. 1–2.
Melchor CA, Gaborit P (2008) A fast private information retrieval protocol. IEEE Int Symp Inform Theory 2008:1848–1852
Mendel F, Rechberger C, Schläffer M (2009) MD5 is weaker than weak: attacks on concatenated combiners. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 144–161
Mirmohseni SM, Tang C, Javadpour A (2020) Using markov learning utilization model for resource allocation in cloud of thing network. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07591-w
Mukkamala R, Ashok VG (2011) Fuzzy-based methods for privacy-preserving data mining. Eighth Int Conf Inform Technol New Gen 2011:348–353
Rachels J (2017) Why privacy is important. In: Privacy, Routledge, pp. 11–21.
Raju R, Komalavalli R, Kesavakumar V (2009) Privacy maintenance collaborative data mining-a practical approach. Second Int Conf Emerg Trends Eng Technol 2009:307–311
Ruj S, Nayak A (2013) A decentralized security framework for data aggregation and access control in smart grids. IEEE Trans Smart Grid 4(1):196–205
Tassa T (2013) Secure mining of association rules in horizontally distributed databases. IEEE Trans Knowl Data Eng 26(4):970–983
Wang Q, Mu H (2021) Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT. Sensors 21(16):5369
Wang J, Wu L, Zeadally S, Khan MK, He D (2021) Privacy-preserving data aggregation against malicious data mining attack for iot-enabled smart grid. ACM Trans Sen Netw. https://doi.org/10.1145/3440249
Zhang X, Liu C, Nepal S, Yang C, Dou W, Chen J (2013) Combining top-down and bottom-up: scalable sub-tree anonymization over big data using MapReduce on cloud. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 501–508.
Zhang J, Zhao Y, Wu J, Chen B (2020) LVPDA: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Internet Things J 7(5):4016–4027
Zheng P, Huang J (2013) An efficient image homomorphic encryption scheme with small ciphertext expansion. In: Proceedings of the 21st ACM international conference on Multimedia, pp. 803–812.
Zhu H, Meng X, Kollios G (2014) Privacy preserving similarity evaluation of time series data. EDBT 2014:499–510
Acknowledgements
Special thanks to Islamic Azad Unviersity, Iran. Moreover, this work is supported by Shenzhen Stable Supporting Program (General Project) (No. GXWD20201230155427003-20200821160539001) and Shenzhen Basic Research (General Project) (No. JCYJ20190806142601687).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gheisari, M., Javadpour, A., Gao, J. et al. PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things. J Ambient Intell Human Comput 14, 5211–5223 (2023). https://doi.org/10.1007/s12652-022-03866-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-03866-1