Skip to main content

Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7405))

Abstract

Enabling privacy preserving outsourced data aggregation is regarded as an important issue for multi-domain wireless networks. In this paper, we present a novel hybrid cloud based privacy preserving outsourced data aggregation framework. To achieve this, we introduce a hybrid storage cloud and aggregator cloud architecture, in which both of the storage clouds and aggregator cloud are assumed to be untrusted but they cannot collude with each other. Based on this security assumption, we propose two novel protocols, including the pro-active privacy preserving data aggregation and passive privacy preserving data aggregation schemes, which are based on the idea of secret sharing. The pro-active scheme allows the user to pro-actively split their data to multiple storage clouds to avoid data leaking while the passive scheme allows the users to store their encrypted data in storage cloud and aggregator to finish the data aggregation based on the encrypted data. The detailed performance simulations are given to demonstrate the security, effectiveness and efficiency of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cristofaro, E.D., Soriente, C.: PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure. In: Proc. of WiSec 2011 (2011)

    Google Scholar 

  2. Shi, J., Zhang, R., Liu, Y., Zhang, Y.: PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: Proc. of IEEE INFOCOM 2010, San Diego. IEEE (2010)

    Google Scholar 

  3. Zhang, F., He, L., He, W., Liu, X.: Data Perturbation with State-Dependent Noise for Participatory Sensing. In: Proc. of INFOCOM 2012, Orlando, FL (2012)

    Google Scholar 

  4. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proc. of IEEE INFOCOM 2010 (2010)

    Google Scholar 

  5. Popa, R.A., Zeldovich, N., Balakrishnan, H.: CryptDB: A practical encrypted relational DBMS, Technical Report MIT-CSAIL-TR-2011-005. MIT (2011)

    Google Scholar 

  6. Shi, E., Chan, T., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Proc. NDSS 2011 (2011)

    Google Scholar 

  7. Singh, S., Fleischmann, K., Ponton, T., Bellamy, S.: Alleviating Privacy and Security Concerns in Financial Aggregation Programs. Communications Policy & Research Forum 2009 (2009)

    Google Scholar 

  8. Duan, Y., Canny, J., Zhan, J.: P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. In: Proc. of USENIX Security 2010 (2010)

    Google Scholar 

  9. Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xiao, C., Jia, W., Zhu, H., Du, S., Cao, Z. (2012). Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks. In: Wang, X., Zheng, R., Jing, T., Xing, K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2012. Lecture Notes in Computer Science, vol 7405. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31869-6_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31869-6_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31868-9

  • Online ISBN: 978-3-642-31869-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics