4.8 Article

Achieving O(log3n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 7, 期 6, 页码 5220-5232

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2977253

关键词

Communication efficiency; fog-based Internet of Things (IoT); privacy preserving; range query

资金

  1. NSERC [RGPIN 04009]
  2. Natural Science Foundation of Zhejiang Province [LZ18F020003]
  3. National Natural Science Foundation of China [U1709217]

向作者/读者索取更多资源

The advance of Internet-of-Things (IoT) techniques has promoted an increasing number of organizations to explore more mission-critical solutions. However, the response latency, bandwidth usage, and reliability are still challenging issues in the traditional IoT. To tackle these challenges, the fog-based IoT has become popular and the range query is one of the most frequently used operations in fog-based IoT, where given a range query, a fog node will return the aggregated data from IoT devices to the query user. Because the fog nodes are not fully trusted, there is a desire to design a privacy-preserving range query scheme in the fog-based IoT. However, most of existing privacy-preserving range query schemes are not efficient in terms of communication overhead, especially for a large-size range. Therefore, it is still a challenging issue to design a communication-efficient range query in fog-based IoT. Aiming at this challenge, in this article, we propose a new privacy-preserving range query scheme in the fog-based IoT. Specifically, we first devise an efficient homomorphic encryption scheme for maintaining data privacy and security in a range query. Then, we present a novel range decomposition technique to compile the range query, which can transform a given range query [L, U], where 0 <= L <= U <= n - 1, into a semi-triangular structure, and enable our proposed scheme to achieve O(log(3)n) communication efficiency. The detailed security analysis shows that our proposed scheme is really privacy preserving, and the extensive performance evaluation demonstrates that our proposed scheme is efficient in terms of low communication overhead and the computational cost.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Theory & Methods

Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare

Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Hui Zhu

Summary: This paper proposes an efficient access pattern privacy-preserving similarity range query scheme with access control in the context of eHealthcare, where healthcare data are outsourced in an encrypted form and need to be accessed in a privacy-preserving way. The proposed scheme utilizes a novel tree structure and symmetric homomorphic encryption to achieve privacy protection and efficient querying of healthcare data.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Theory & Methods

SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud

Yandong Zheng, Rongxing Lu, Hui Zhu, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Li

Summary: The advance of cloud computing has led to outsourcing large-scale data and data-driven services to public clouds. However, there is a lack of research on privacy-preserving set reverse k nearest neighbors (RkNN) query. In this paper, an efficient and privacy-preserving scheme for set RkNN query over encrypted data is proposed, with sublinear query efficiency.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT

Yang Ming, Pengfei Yang, Hassan Mahdikhani, Rongxing Lu

Summary: The Industrial Internet of Things (IIoT) is changing production methods by allowing users to access data directly from smart devices through the network. However, the transmission of data from these devices is usually insecure, leading to security concerns. This article proposes a secure one-to-many authentication and key agreement scheme for IIoT, using smart cards, passwords, and biometrics to authenticate users. The scheme utilizes elliptic curve cryptography and the Chinese remainder theorem to agree upon different session keys between a user and multiple smart devices in a single request.

IEEE SYSTEMS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud

Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao

Summary: Skyline queries are promising and practical techniques in multi-criteria decision making applications. However, privacy concerns have led to the need for privacy-preserving skyline queries over encrypted data. Existing solutions lack support for user-defined query criteria and require multi-round communications between two servers. In this article, we propose a privacy-preserving user-defined skyline query scheme in a single-server model, eliminating the need for extra communications. The scheme is shown to be selectively secure and outperforms alternative schemes in terms of computational costs.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Hardware & Architecture

Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data

Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao

Summary: This paper proposes an efficient and privacy-preserving interval skyline query scheme using symmetric homomorphic encryption. The scheme includes secure protocols for sorting the encrypted dataset and determining dominance relations of time series data, as well as a lookup table for quick query response. Security analysis demonstrates that the proposed scheme protects outsourced data, query results, and single-dimensional privacy while hiding access patterns. Evaluation results show that the proposed scheme outperforms existing solutions in computational and communication costs by orders of magnitude.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Information Systems

Efficient Learned Spatial Index With Interpolation Function Based Learned Model

Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng

Summary: Researchers have recently demonstrated that learned indexes can improve query performance and reduce storage overhead, offering an opportunity to address the challenges of spatial query processing caused by location-based services. However, existing approaches to process spatial data using learned indexes do not fully leverage the spatial distribution information of the original data. In this paper, the limitations of a previous spatial learned model are addressed with a new model that incorporates the characteristics of spatial interpolation functions and a dynamic encoding technique.

IEEE TRANSACTIONS ON BIG DATA (2023)

Article Computer Science, Artificial Intelligence

Visible and Infrared Image Fusion Using Deep Learning

Xingchen Zhang, Yiannis Demiris

Summary: Visible and infrared image fusion (VIF) has gained considerable attention for its applications in various tasks, and there has been an increasing number of deep learning-based VIF methods proposed in recent years. This paper presents a comprehensive review of these methods, discussing motivation, taxonomy, recent developments, datasets, evaluation methods, and future prospects in detail. It serves as a valuable reference for VIF researchers and those interested in this rapidly developing field.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2023)

Article Computer Science, Information Systems

Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query

Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu

Summary: In this work, an efficient and privacy-preserving spatial-feature-based RkNN scheme is proposed. The scheme supports spatial data with many features and utilizes a modified intersection and union R tree (MIUR-tree) for indexing. A private filter protocol and a private refinement protocol are designed based on a symmetric homomorphic encryption (SHE) scheme, enabling the privacy-preserving RkNN query.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Artificial Intelligence

CapsRule: Explainable Deep Learning for Classifying Network Attacks

Samaneh Mahdavifar, Ali A. A. Ghorbani

Summary: In this article, a rule extraction method called CapsRule is proposed for classifying network attacks. It extracts high-fidelity rules from the feed-forward capsule network that explain how an input sample is classified. The evaluation shows that CapsRule generates accurate, high-fidelity, and comprehensible rules, and helps identify errors and noise in the data.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Computer Science, Theory & Methods

PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud

Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li

Summary: The prevalence of cloud computing has led to the popularity of outsourced query services. Graph similarity query, which measures the similarity between two graphs using graph edit distance (GED), is an important type of query. Existing schemes for GED computation/graph similarity query do not consider data privacy and are not suitable for cloud computing. In this paper, we propose a privacy-preserving graph similarity query scheme called PGSim, which applies a filter and verification framework. Our scheme efficiently retrieves candidate graphs using a pivot R-tree based filter algorithm and verifies them using a GED query verification algorithm. To ensure privacy, we employ symmetric homomorphic encryption and design a PRFilter scheme along with a PGQVerify algorithm. Security analysis shows that our scheme is selectively secure and performance evaluation demonstrates its high efficiency.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Cybernetics

Multimodal Fake News Analysis Based on Image-Text Similarity

Xichen Zhang, Sajjad Dadkhah, Alexander Gerald Weismann, Mohammad Amin Kanaani, Ali A. Ghorbani

Summary: With the rapid development of computer vision techniques, multimodal analyses are widely used in online fake news detection. This article proposes and evaluates four image-text similarities to understand the role of image-text relationship in fake news detection. The findings show that fake news image-text similarity is higher than real news image-text similarity in most cases, supporting the significance of visual information in fake news detection.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Information Systems

PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data

Yaxi Yang, Yao Tong, Jian Weng, Yufeng Yi, Yandong Zheng, Leo Yu Zhang, Rongxing Lu

Summary: This article presents a query scheme for privacy-preserving on genomic data, which allows secure querying of specific ranges of genomic data in a database.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2023)

Article Computer Science, Information Systems

A Survey on IoT Profiling, Fingerprinting, and Identification

Miraqa Safi, Sajjad Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, Ali A. Ghorbani

Summary: This article provides a comprehensive review of various IoT device profiling methods and offers a clear taxonomy for IoT profiling techniques based on different security perspectives. It investigates current IoT device profiling techniques and applications, analyzes device vulnerabilities, and discusses machine learning and deep learning algorithms used for IoT device profiling. The article concludes with a discussion of challenges and future research possibilities in this domain.

ACM TRANSACTIONS ON INTERNET OF THINGS (2022)

Article Computer Science, Theory & Methods

Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security

Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao

Summary: This paper proposes a privacy-preserving aggregate reverse skyline query (PPARS) scheme on a single server model while ensuring full query privacy. The scheme transforms the problem of ARS query into a combination of set membership test and logical expressions, and utilizes encryption, encoding, and homomorphic encryption techniques to obtain encrypted aggregate values without leaking query privacy. The communication efficiency is improved by an interpolation-based packing technique.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Information Systems

Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud

Yandong Zheng, Rongxing Lu, Jun Shao, Fan Yin, Hui Zhu

Summary: Dynamic symmetric searchable encryption (SSE) enables secure search and dynamic update of encrypted documents in a semi-trusted cloud server. Existing SSE schemes have privacy leaks, and none of them can preserve search pattern privacy or enhance backward privacy. In this article, a practical SSE scheme is proposed, which supports search pattern privacy and enhances backward privacy through an obfuscating technique, pseudorandom function, and pseudorandom generator. Security analysis and performance evaluations demonstrate the effectiveness and efficiency of the proposed scheme.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

暂无数据