Skip to main content
Log in

Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The fast development of Internet of Things (IoT) has shown that it becomes one of the most popular techniques. In the IoT paradigm, ubiquitous sensors and smart devices can be interconnected to collect various status data and share with others. When deployed in an environment status monitoring system, distributed sensors may be requested to periodically report real-time data. The large-scale data would make the system controller unable to process in time. In this case, a third-party server can be engaged to conduct most of monitoring work, where sensors direct report to the server to generate intermediate monitoring results for the system controller. However, the server may be curious about the contents of outsourced system standing queries, data vectors of sensors, and monitoring results. In addition, due to the limited computing resources of distributed sensors, existing cryptographic solutions are not applicable to such monitoring scenario. To address these issues, this paper proposes a lightweight server-aided data monitoring scheme (SIM). Thorough efficiency and privacy analysis confirm the practicality of the proposed SIM scheme. Moreover, this paper extends Lu et al.’s privacy-preserving cosine similarity computing protocol in the two-party setting in big data environment to support computing on any dimensional data, without incurring expensive calculations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Lv, Z., Bin, H., & Lv, H. (2020). Infrastructure monitoring and operation for smart cities based on iot system. IEEE Transactions on Industrial Informatics, 16(3), 1957–1962.

    Article  Google Scholar 

  2. Ding, X., Pang, H., & Lai, J. (2013). Verifiable and private top-k monitoring. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS’13 (pp. 553–558). New York, NY, USA: ACM.

  3. Wang, Y., Pang, H. H., Yang, Y., & Ding, X. (2017). Secure server-aided top-k monitoring. Information Sciences, 420, 345–363.

    Article  Google Scholar 

  4. Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficient and privacy-preserving computing in big data era. IEEE Network, 28(4), 46–50.

    Article  Google Scholar 

  5. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279.

    Article  Google Scholar 

  6. Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10–28.

    Article  Google Scholar 

  7. Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for internet of things. Journal of Network and Computer Applications, 42, 120–134.

    Article  Google Scholar 

  8. Jaloudi, S. (2019). Communication protocols of an industrial internet of things environment: A comparative study. Future Internet, 11(3), 66.

    Article  Google Scholar 

  9. Hernández-Ramos, J. L., Pawlowski, M. P., Jara, A. J., Skarmeta, A. F., & Ladid, L. (2015). Toward a lightweight authentication and authorization framework for smart objects. IEEE Journal on Selected Areas in Communications, 33(4), 690–702.

    Article  Google Scholar 

  10. Hernández-Ramos, J. L., Bernabe, J. B., Moreno, M. V., & Skarmeta, A. F. (2015). Preserving smart objects privacy through anonymous and accountable access control for a m2m-enabled internet of things. Sensors, 15(7), 15611–15639.

    Article  Google Scholar 

  11. Tonyali, S., Akkaya, K., Saputro, N., Uluagac, A. S., & Nojoumian, M. (2018). Privacy-preserving protocols for secure and reliable data aggregation in iot-enabled smart metering systems. Future Generation Computer Systems, 78, 547–557.

    Article  Google Scholar 

  12. Jiang, H., Shen, F., Chen, S., Li, K.-C., & Jeong, Y.-S. (2015). A secure and scalable storage system for aggregate data in iot. Future Generation Computer Systems, 49, 133–141.

    Article  Google Scholar 

  13. González-Manzano, L., de Fuentes, J. M., Pastrana, S., Peris-Lopez, P., & Hernández-Encinas, L. (2016). PAgIoT–Privacy-preserving Aggregation protocol for Internet of Things. Journal of Network and Computer Applications, 71, 59–71.

    Article  Google Scholar 

  14. Yang, M., Zhu, T., Liu, B., Xiang, Y., & Zhou, W. (2018). Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access, 6, 17119–17129.

    Article  Google Scholar 

  15. Yang, J., Wang, C., Zhao, Q., Jiang, B., Lv, Z., & Sangaiah, A. K. (2018). Marine surveying and mapping system based on cloud computing and internet of things. Future Generation Computer Systems, 85, 39–50.

    Article  Google Scholar 

  16. Puliafito, A., Celesti, A., Villari, M., & Fazio, M. (2015). Towards the integration between iot and cloud computing: an approach for the secure self-configuration of embedded devices. International Journal of Distributed Sensor Networks, 11(12), 286860.

    Article  Google Scholar 

  17. Salhaoui, M., Guerrero-González, A., Arioua, M., Ortiz, F. J., El Oualkadi, A., & Torregrosa, C. L. (2019). Smart industrial iot monitoring and control system based on uav and cloud computing applied to a concrete plant. Sensors, 19(15), 3316.

    Article  Google Scholar 

  18. Qin, B., Wang, L., Wang, Y., Wu, Q., Shi, W., & Liang, B. (2016). Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks. Concurrency and Computation: Practice and Experience, 28(10), 2920–2939.

    Article  Google Scholar 

  19. Zhang, Y., Shen, Y., Wang, H., Yong, J., & Jiang, X. (2016). On secure wireless communications for iot under eavesdropper collusion. IEEE Transactions on Automation Science and Engineering, 13(3), 1281–1293.

    Article  Google Scholar 

  20. Lindner, W., & Meier, J. (2006). Towards a secure data stream management system. In Proceedings of the 31st VLDB Conference on Trends in Enterprise Application Architecture, TEAA’05 (pp. 114–128), Berlin, Heidelberg: Springer-Verlag.

  21. Aggarwal, C. C. (2007). On randomization, public information and the curse of dimensionality. In 2007 IEEE 23rd International Conference on Data Engineering (pp. 136–145).

  22. Xu, Y., Wang, K., Fu, A. W.-C., She, R., & Pei, J. (2008). Privacy-preserving data stream classification. In Aggarwal, C. C., & Yu, P. S. (Eds.), Privacy-Preserving Data Mining: Models and Algorithms (pp. 487–510). Boston, MA: Springer US.

  23. Ostrovsky , R., & Skeith, W. E. (2005). Private Searching on Streaming Data. In Shoup, V. (Ed.), Advances in Cryptology—CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings (pp. 223–240). Berlin, Heidelberg: Springer Berlin Heidelberg.

  24. Bethencourt, J., Song, D. X., & Waters, B. (2006). New Constructions and Practical Applications for Private Stream Searching. In 2006 IEEE Symposium on Security and Privacy (SP’06) (pp. 132–139).

  25. Papadopoulos, S., Cormode, G., Deligiannakis, A., & Garofalakis, M. (2013). Lightweight authentication of linear algebraic queries on data streams. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, SIGMOD ’13 (pp. 881–892). New York, NY, USA: ACM.

  26. Boneh, D., Lynn, B., & Shacham, H. (2004). Short signatures from the weil pairing. Journal of Cryptology, 17(4), 297–319.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Ding.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is supported in part by the National Key R&D Program of China through project 2017YFB1400700, the National Natural Science Foundation of China under Projects 61862012, 61772150, 61772538, 61672083, 61862011, 61962012, 61972019, 61932011 and 91646203, the Guangxi Key R&D Program under Project AB17195025, the Guangxi Natural Science Foundation under Grants 2018GXNSFDA281054, 2018GXNSFAA281232, 2019GXNSFFA245015, 2019GXNSFGA245004 and AD19245048, the Peng Cheng Laboratory Project of Guangdong Province PCL2018KP004, the National Cryptography Development Fund through project MMJJ20170106, and the foundation of Science and Technology on Information Assurance Laboratory through project 61421120305162112006.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, M., Ding, Y., Wu, Q. et al. Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments. Wireless Pers Commun 116, 1765–1783 (2021). https://doi.org/10.1007/s11277-020-07760-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-020-07760-x

Keywords

Navigation