Abstract
Enabling privacy preserving outsourced data aggregation is regarded as an important issue for multi-domain wireless networks. In this paper, we present a novel hybrid cloud based privacy preserving outsourced data aggregation framework. To achieve this, we introduce a hybrid storage cloud and aggregator cloud architecture, in which both of the storage clouds and aggregator cloud are assumed to be untrusted but they cannot collude with each other. Based on this security assumption, we propose two novel protocols, including the pro-active privacy preserving data aggregation and passive privacy preserving data aggregation schemes, which are based on the idea of secret sharing. The pro-active scheme allows the user to pro-actively split their data to multiple storage clouds to avoid data leaking while the passive scheme allows the users to store their encrypted data in storage cloud and aggregator to finish the data aggregation based on the encrypted data. The detailed performance simulations are given to demonstrate the security, effectiveness and efficiency of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cristofaro, E.D., Soriente, C.: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure. In: Proc. of WiSec 2011 (2011)
Shi, J., Zhang, R., Liu, Y., Zhang, Y.: PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: Proc. of IEEE INFOCOM 2010, San Diego. IEEE (2010)
Zhang, F., He, L., He, W., Liu, X.: Data Perturbation with State-Dependent Noise for Participatory Sensing. In: Proc. of INFOCOM 2012, Orlando, FL (2012)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proc. of IEEE INFOCOM 2010 (2010)
Popa, R.A., Zeldovich, N., Balakrishnan, H.: CryptDB: A practical encrypted relational DBMS, Technical Report MIT-CSAIL-TR-2011-005. MIT (2011)
Shi, E., Chan, T., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Proc. NDSS 2011 (2011)
Singh, S., Fleischmann, K., Ponton, T., Bellamy, S.: Alleviating Privacy and Security Concerns in Financial Aggregation Programs. Communications Policy & Research Forum 2009 (2009)
Duan, Y., Canny, J., Zhan, J.: P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. In: Proc. of USENIX Security 2010 (2010)
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xiao, C., Jia, W., Zhu, H., Du, S., Cao, Z. (2012). Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2012. Lecture Notes in Computer Science, vol 7405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31869-6_65
Download citation
DOI: https://doi.org/10.1007/978-3-642-31869-6_65
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31868-9
Online ISBN: 978-3-642-31869-6
eBook Packages: Computer ScienceComputer Science (R0)