ABSTRACT
Internet of Things (IoT) is flourishing and has penetrated deeply into people's daily life. With the seamless connection to the physical world, IoT provides tremendous opportunities to a wide range of applications. However, potential risks exist when the IoT system collects sensor data and uploads it to the cloud. The leakage of private data can be severe with curious database administrator or malicious hackers who compromise the cloud. In this work, we propose Kryptein, a compressive-sensing-based encryption scheme for cloud-enabled IoT systems to secure the interaction between the IoT devices and the cloud. Kryptein supports random compressed encryption, statistical decryption, and accurate raw data decryption. According to our evaluation based on two real datasets, Kryptein provides strong protection to the data. It is 250 times faster than other state-of-the-art systems and incurs 120 times less energy consumption. The performance of Kryptein is also measured on off-the-shelf IoT devices, and the result shows Kryptein can run efficiently on IoT devices.
- Shweta Agrawal and Sriram Vishwanath. 2011. Secrecy using compressive sensing. In Information Theory Workshop (ITW), 2011 IEEE. IEEE, 563--567.Google ScholarCross Ref
- Sumit Bajaj and Radu Sion. 2014. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. Knowledge and Data Engineering, IEEE Transactions on 26, 3 (2014), 752--765. Google ScholarDigital Library
- Richard Baraniuk, Mark Davenport, Ronald DeVore, and Michael Wakin. 2007. The Johnson-Lindenstrauss lemma meets compressed sensing. Constructive Approximation (2007).Google Scholar
- Sheng-Yuan Chiu, Hoang Hai Nguyen, Rui Tan, David KY Yau, and Deokwoo Jung. 2015. Jice: Joint data compression and encryption for wireless energy auditing networks. In Sensing, Communication, and Networking (SECON), 2015 12th Annual IEEE International Conference on. IEEE, 453--461.Google Scholar
- Michael Chui, Markus Löffler, and Roger Roberts. 2010. The internet of things. McKinsey Quarterly 2, 2010 (2010), 1--9.Google Scholar
- David L Donoho. 2006. Compressed sensing. Information Theory, IEEE Transactions on 52, 4 (2006), 1289--1306. Google ScholarDigital Library
- Adam Dunkels, Bjorn Gronvall, and Thiemo Voigt. 2004. Contiki-a lightweight and flexible operating system for tiny networked sensors. In Proc. of LCN. IEEE, 455--462. Google ScholarDigital Library
- Bradley Efron, Trevor Hastie, Iain Johnstone, Robert Tibshirani, and others. 2004. Least angle regression. The Annals of statistics 32, 2 (2004), 407--499.Google ScholarCross Ref
- Michael Elad. 2007. Optimized projections for compressed sensing. Signal Processing, IEEE Transactions on 55, 12 (2007), 5695--5702. Google ScholarDigital Library
- Sébastien Gambs, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez. 2010. Show me how you move and I will tell you who you are. In Proc. of SPRINGL.ACM, 34--41. Google ScholarDigital Library
- Zhengli Huang, Wenliang Du, and Biao Chen. 2005. Deriving private information from randomized data. In Proc. of SIGMOD. ACM, 37--48. Google ScholarDigital Library
- Fitbit Inc. 2016. Fitbit. (2016). https://www.fitbit.com/auGoogle Scholar
- Microsoft Inc. 2016. Microsoft Band. (2016). http://www.microsoft.com/Microsoft-Band/Google Scholar
- Qualcomm Technologies Inc. 2016. Tren Power Profiler. (2016). https://developer.qualcomm.com/software/trepn-power-profilerGoogle Scholar
- Shih-Yung Juan, Yi-Fan Chung, Chung-Ta King, and Cheng-Hsin Hsu. 2013. CEGF: corner extraction by GPS filtering for power-efficient location uploading. In Proc. of MobiSys. ACM, 537--538. Google ScholarDigital Library
- Hillol Kargupta, Souptik Datta, Qi Wang, and Krishnamoorthy Sivakumar. 2003. On the privacy preserving properties of random data perturbation techniques. In Proc. of ICDM. IEEE, 99--106. Google ScholarDigital Library
- Feifei Li, Jimeng Sun, Spiros Papadimitriou, George A Mihaila, and Ioana Stanoi. 2007. Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking. In Proc. of ICDE. IEEE, 686--695.Google ScholarCross Ref
- Jie Liu, Bodhi Priyantha, Ted Hart, Heitor S Ramos, Antonio AF Loureiro, and Qiang Wang. 2012. Energy efficient GPS sensing with cloud offloading. In Proc. of SenSys. ACM, 85--98. Google ScholarDigital Library
- Julien Mairal, Francis Bach, Jean Ponce, and Guillermo Sapiro. 2009. Online dictionary learning for sparse coding. In Proc. of ICML. ACM, 689--696. Google ScholarDigital Library
- Mahmoud Ramezani Mayiami, Babak Seyfe, and Hamid G Bafghi. 2010. Perfect secrecy using compressed sensing. arXiv preprint arXiv:1011.3985 (2010).Google Scholar
- M. R. Osborne, Brett Presnell, and B.A. Turlach. 1999. A New Approach to Variable Selection in Least Squares Problems. (1999).Google Scholar
- Spiros Papadimitriou, Feifei Li, George Kollios, and Philip S Yu. 2007. Time series compressibility and privacy. In Proc. of VLDB. VLDB Endowment, 459--470. Google ScholarDigital Library
- Raluca Ada Popa, Catherine Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2011. CryptDB: protecting confidentiality with encrypted query processing. In Proc. of SOSP. ACM, 85--100. Google ScholarDigital Library
- Yaron Rachlin and Dror Baron. 2008. The secrecy of compressed sensing measurements. In Communication, Control, and Computing, 2008 46th Annual Allerton Conference on. IEEE, 813--817.Google ScholarCross Ref
- Rakesh Rana, Mingrui Yang, Tim Wark, Chun Tung Chou, and Wen Hu. 2015. SimpleTrack: Adaptive Trajectory Compression with Deterministic Projection Matrix for Mobile Sensor Networks. Sensors Journal, IEEE 15, 1 (2015), 365--373.Google Scholar
- Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher, Simon Duquennoy, and Wen Hu. 2015. Talos: Encrypted Query Processing for the Internet of Things. In Proc. of SenSys. ACM, 197--210. Google ScholarDigital Library
- Claude E Shannon. 1949. Communication theory of secrecy systems*. Bell system technical journal 28, 4 (1949), 656--715.Google Scholar
- Stephen Tu, M Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. 2013. Processing analytical queries over encrypted data. In Proc. of the VLDB Endowment, Vol. 6. VLDB Endowment, 289--300. Google ScholarDigital Library
- Cong Wang, Bingsheng Zhang, Kui Ren, and Janet M Roveda. 2013. Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Transactions on Emerging Topics in Computing 1, 1 (2013), 166--177.Google ScholarCross Ref
- Yu Zheng, Lizhu Zhang, Xing Xie, and Wei-Ying Ma. 2009. Mining interesting locations and travel sequences from GPS trajectories. In Proc. of WWW. ACM, 791--800. Google ScholarDigital Library
- Mingyuan Zhou, Haojun Chen, J. Paisley, Lu Ren, Lingbo Li, Zhengming Xing, D. Dunson, G. Sapiro, and L. Carin. 2012. Nonparametric Bayesian Dictionary Learning for Analysis of Noisy and Incomplete Images. Image Processing, IEEE Transactions on 21, 1 (jan. 2012), 130 --144. Google ScholarDigital Library
- zip. 2014. Zip4j:Java library to handle Zip files. http://www.lingala.net/zip4j/Google Scholar
Index Terms
- Kryptein: a compressive-sensing-based encryption scheme for the internet of things
Recommendations
An efficient public key secure scheme for cloud and IoT security
AbstractAccording to the National Institute of Standard and Technology (NIST), the security level of RSA is safe when it is N-bit modulus ≥ 2048 bits. Because of this, the processing time to generate asymmetric keys also increases. Taking this ...
Modified RSA Encryption Algorithm (MREA)
ACCT '12: Proceedings of the 2012 Second International Conference on Advanced Computing & Communication TechnologiesIn asymmetric key cryptography, also called Public Key cryptography, two different keys (which forms a key pair) are used. One key is used for encryption & only the other corresponding key must be used for decryption. No other key can decrypt the ...
SecureSense
Constrained Application Protocol (CoAP) has become the de-facto web standard for the IoT. Unlike traditional wireless sensor networks, Internet-connected smart thing deployments require security. CoAP mandates the use of the Datagram TLS (DTLS) protocol ...
Comments