TY - GEN
T1 - Leveraging cloud computing for privacy preserving aggregation in multi-domain wireless networks
AU - Xiao, Chengxin
AU - Jia, Weiwei
AU - Zhu, Haojin
AU - Du, Suguo
AU - Cao, Zhenfu
PY - 2012
Y1 - 2012
N2 - Enabling privacy preserving outsourced data aggregation is regarded as an important issue for multi-domain wireless networks. In this paper, we present a novel hybrid cloud based privacy preserving outsourced data aggregation framework. To achieve this, we introduce a hybrid storage cloud and aggregator cloud architecture, in which both of the storage clouds and aggregator cloud are assumed to be untrusted but they cannot collude with each other. Based on this security assumption, we propose two novel protocols, including the pro-active privacy preserving data aggregation and passive privacy preserving data aggregation schemes, which are based on the idea of secret sharing. The pro-active scheme allows the user to pro-actively split their data to multiple storage clouds to avoid data leaking while the passive scheme allows the users to store their encrypted data in storage cloud and aggregator to finish the data aggregation based on the encrypted data. The detailed performance simulations are given to demonstrate the security, effectiveness and efficiency of the proposed scheme.
AB - Enabling privacy preserving outsourced data aggregation is regarded as an important issue for multi-domain wireless networks. In this paper, we present a novel hybrid cloud based privacy preserving outsourced data aggregation framework. To achieve this, we introduce a hybrid storage cloud and aggregator cloud architecture, in which both of the storage clouds and aggregator cloud are assumed to be untrusted but they cannot collude with each other. Based on this security assumption, we propose two novel protocols, including the pro-active privacy preserving data aggregation and passive privacy preserving data aggregation schemes, which are based on the idea of secret sharing. The pro-active scheme allows the user to pro-actively split their data to multiple storage clouds to avoid data leaking while the passive scheme allows the users to store their encrypted data in storage cloud and aggregator to finish the data aggregation based on the encrypted data. The detailed performance simulations are given to demonstrate the security, effectiveness and efficiency of the proposed scheme.
KW - Cloud Computing
KW - Participatory Sensing
KW - Privacy Aggregation
UR - https://www.scopus.com/pages/publications/84865572140
U2 - 10.1007/978-3-642-31869-6_65
DO - 10.1007/978-3-642-31869-6_65
M3 - 会议稿件
AN - SCOPUS:84865572140
SN - 9783642318689
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 733
EP - 744
BT - Wireless Algorithms, Systems, and Applications - 7th International Conference, WASA 2012, Proceedings
T2 - 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2012
Y2 - 8 August 2012 through 10 August 2012
ER -