Abstract

A semi-outsourcing privacy-preserving scheme is proposed in this paper for the IoT data collection named semi-outsourcing privacy-preserving (SOPP), which supports delegated identity authentication for the IoT devices without revealing the transmitted data. Compared with other schemes that implement the authentication based upon using trusted cloud services, the design of our scheme SOPP can achieve the delegated authentication on untrusted public clouds while providing privacy-preserving data transmission. Meanwhile, the implemented one-way authentication can reduce the communication cost for the IoT devices (especially for the low-resource ones) to prolong their battery life. The performance of the SOPP scheme is demonstrated for its use in the resource-constrained IoT devices and compared with a benchmark trusted cloud scheme including one based upon certificates and an interactive (two-way) authentication scheme.

Highlights

  • Cloud computing has been widely applied as an access infrastructure to serve IoT devices for uploading and processing their collected data [1]

  • Since the cost of leasing public clouds is much less than the expense of building trusted private clouds, our scheme can ensure data privacy for IoT data transmission at a lower cost for the infrastructure construction. Compared with another general model ‘‘data center IoT devices’’, our model does not require us to deploy a large-scale data center to process data and satisfy security demands since the untrusted public clouds are strong enough to assume a part of security work, i.e. cyber-attacks prevention and the authentication work can be delegated to untrusted public clouds

  • 5) INTEGRITY After decrypting the encrypted data C received from the untrusted public clouds, the data center can check the integrity of the decrypted data M to avoid invalid data manipulation by the attackers in the transmission from the untrusted public clouds to the data center

Read more

Summary

INTRODUCTION

Cloud computing has been widely applied as an access infrastructure to serve IoT devices for uploading and processing their collected data [1]. Since the cost of leasing public clouds is much less than the expense of building trusted private clouds, our scheme can ensure data privacy for IoT data transmission at a lower cost for the infrastructure construction Compared with another general model ‘‘data center IoT devices’’, our model does not require us to deploy a large-scale data center to process data and satisfy security demands (e.g. authentication, validation, and cyber-attacks defense) since the untrusted public clouds are strong enough to assume a part of security work, i.e. cyber-attacks prevention (detection) and the authentication work can be delegated to untrusted public clouds. AdvB = Pr[c = M |c = B(pp, C, sk)] < ε, where M is plaintext data, C is encrypted data by the algorithm f that transmitted from the IoT device via the public clouds, pp and sk denote the public parameters and the known private key respectively in the phase Authentication, and ε represents a negligible probability. 5) INTEGRITY After decrypting the encrypted data C received from the untrusted public clouds, the data center can check the integrity of the decrypted data M to avoid invalid data manipulation by the attackers in the transmission from the untrusted public clouds to the data center

PROPOSED SCHEME
Select three cryptographic secure hash functions
SECURITY ANALYSIS
OW-CCA SECURITY
AUTHENTICATION
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.