skip to main content
10.1145/3055031.3055079acmotherconferencesArticle/Chapter ViewAbstractPublication PagescpsweekConference Proceedingsconference-collections
research-article

Kryptein: a compressive-sensing-based encryption scheme for the internet of things

Published:18 April 2017Publication History

ABSTRACT

Internet of Things (IoT) is flourishing and has penetrated deeply into people's daily life. With the seamless connection to the physical world, IoT provides tremendous opportunities to a wide range of applications. However, potential risks exist when the IoT system collects sensor data and uploads it to the cloud. The leakage of private data can be severe with curious database administrator or malicious hackers who compromise the cloud. In this work, we propose Kryptein, a compressive-sensing-based encryption scheme for cloud-enabled IoT systems to secure the interaction between the IoT devices and the cloud. Kryptein supports random compressed encryption, statistical decryption, and accurate raw data decryption. According to our evaluation based on two real datasets, Kryptein provides strong protection to the data. It is 250 times faster than other state-of-the-art systems and incurs 120 times less energy consumption. The performance of Kryptein is also measured on off-the-shelf IoT devices, and the result shows Kryptein can run efficiently on IoT devices.

References

  1. Shweta Agrawal and Sriram Vishwanath. 2011. Secrecy using compressive sensing. In Information Theory Workshop (ITW), 2011 IEEE. IEEE, 563--567.Google ScholarGoogle ScholarCross RefCross Ref
  2. Sumit Bajaj and Radu Sion. 2014. TrustedDB: A trusted hardware-based database with privacy and data confidentiality. Knowledge and Data Engineering, IEEE Transactions on 26, 3 (2014), 752--765. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Richard Baraniuk, Mark Davenport, Ronald DeVore, and Michael Wakin. 2007. The Johnson-Lindenstrauss lemma meets compressed sensing. Constructive Approximation (2007).Google ScholarGoogle Scholar
  4. Sheng-Yuan Chiu, Hoang Hai Nguyen, Rui Tan, David KY Yau, and Deokwoo Jung. 2015. Jice: Joint data compression and encryption for wireless energy auditing networks. In Sensing, Communication, and Networking (SECON), 2015 12th Annual IEEE International Conference on. IEEE, 453--461.Google ScholarGoogle Scholar
  5. Michael Chui, Markus Löffler, and Roger Roberts. 2010. The internet of things. McKinsey Quarterly 2, 2010 (2010), 1--9.Google ScholarGoogle Scholar
  6. David L Donoho. 2006. Compressed sensing. Information Theory, IEEE Transactions on 52, 4 (2006), 1289--1306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Adam Dunkels, Bjorn Gronvall, and Thiemo Voigt. 2004. Contiki-a lightweight and flexible operating system for tiny networked sensors. In Proc. of LCN. IEEE, 455--462. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Bradley Efron, Trevor Hastie, Iain Johnstone, Robert Tibshirani, and others. 2004. Least angle regression. The Annals of statistics 32, 2 (2004), 407--499.Google ScholarGoogle ScholarCross RefCross Ref
  9. Michael Elad. 2007. Optimized projections for compressed sensing. Signal Processing, IEEE Transactions on 55, 12 (2007), 5695--5702. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sébastien Gambs, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez. 2010. Show me how you move and I will tell you who you are. In Proc. of SPRINGL.ACM, 34--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Zhengli Huang, Wenliang Du, and Biao Chen. 2005. Deriving private information from randomized data. In Proc. of SIGMOD. ACM, 37--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Fitbit Inc. 2016. Fitbit. (2016). https://www.fitbit.com/auGoogle ScholarGoogle Scholar
  13. Microsoft Inc. 2016. Microsoft Band. (2016). http://www.microsoft.com/Microsoft-Band/Google ScholarGoogle Scholar
  14. Qualcomm Technologies Inc. 2016. Tren Power Profiler. (2016). https://developer.qualcomm.com/software/trepn-power-profilerGoogle ScholarGoogle Scholar
  15. Shih-Yung Juan, Yi-Fan Chung, Chung-Ta King, and Cheng-Hsin Hsu. 2013. CEGF: corner extraction by GPS filtering for power-efficient location uploading. In Proc. of MobiSys. ACM, 537--538. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hillol Kargupta, Souptik Datta, Qi Wang, and Krishnamoorthy Sivakumar. 2003. On the privacy preserving properties of random data perturbation techniques. In Proc. of ICDM. IEEE, 99--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Feifei Li, Jimeng Sun, Spiros Papadimitriou, George A Mihaila, and Ioana Stanoi. 2007. Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking. In Proc. of ICDE. IEEE, 686--695.Google ScholarGoogle ScholarCross RefCross Ref
  18. Jie Liu, Bodhi Priyantha, Ted Hart, Heitor S Ramos, Antonio AF Loureiro, and Qiang Wang. 2012. Energy efficient GPS sensing with cloud offloading. In Proc. of SenSys. ACM, 85--98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Julien Mairal, Francis Bach, Jean Ponce, and Guillermo Sapiro. 2009. Online dictionary learning for sparse coding. In Proc. of ICML. ACM, 689--696. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Mahmoud Ramezani Mayiami, Babak Seyfe, and Hamid G Bafghi. 2010. Perfect secrecy using compressed sensing. arXiv preprint arXiv:1011.3985 (2010).Google ScholarGoogle Scholar
  21. M. R. Osborne, Brett Presnell, and B.A. Turlach. 1999. A New Approach to Variable Selection in Least Squares Problems. (1999).Google ScholarGoogle Scholar
  22. Spiros Papadimitriou, Feifei Li, George Kollios, and Philip S Yu. 2007. Time series compressibility and privacy. In Proc. of VLDB. VLDB Endowment, 459--470. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Raluca Ada Popa, Catherine Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2011. CryptDB: protecting confidentiality with encrypted query processing. In Proc. of SOSP. ACM, 85--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Yaron Rachlin and Dror Baron. 2008. The secrecy of compressed sensing measurements. In Communication, Control, and Computing, 2008 46th Annual Allerton Conference on. IEEE, 813--817.Google ScholarGoogle ScholarCross RefCross Ref
  25. Rakesh Rana, Mingrui Yang, Tim Wark, Chun Tung Chou, and Wen Hu. 2015. SimpleTrack: Adaptive Trajectory Compression with Deterministic Projection Matrix for Mobile Sensor Networks. Sensors Journal, IEEE 15, 1 (2015), 365--373.Google ScholarGoogle Scholar
  26. Hossein Shafagh, Anwar Hithnawi, Andreas Dröscher, Simon Duquennoy, and Wen Hu. 2015. Talos: Encrypted Query Processing for the Internet of Things. In Proc. of SenSys. ACM, 197--210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Claude E Shannon. 1949. Communication theory of secrecy systems*. Bell system technical journal 28, 4 (1949), 656--715.Google ScholarGoogle Scholar
  28. Stephen Tu, M Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. 2013. Processing analytical queries over encrypted data. In Proc. of the VLDB Endowment, Vol. 6. VLDB Endowment, 289--300. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Cong Wang, Bingsheng Zhang, Kui Ren, and Janet M Roveda. 2013. Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Transactions on Emerging Topics in Computing 1, 1 (2013), 166--177.Google ScholarGoogle ScholarCross RefCross Ref
  30. Yu Zheng, Lizhu Zhang, Xing Xie, and Wei-Ying Ma. 2009. Mining interesting locations and travel sequences from GPS trajectories. In Proc. of WWW. ACM, 791--800. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Mingyuan Zhou, Haojun Chen, J. Paisley, Lu Ren, Lingbo Li, Zhengming Xing, D. Dunson, G. Sapiro, and L. Carin. 2012. Nonparametric Bayesian Dictionary Learning for Analysis of Noisy and Incomplete Images. Image Processing, IEEE Transactions on 21, 1 (jan. 2012), 130 --144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. zip. 2014. Zip4j:Java library to handle Zip files. http://www.lingala.net/zip4j/Google ScholarGoogle Scholar

Index Terms

  1. Kryptein: a compressive-sensing-based encryption scheme for the internet of things

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IPSN '17: Proceedings of the 16th ACM/IEEE International Conference on Information Processing in Sensor Networks
      April 2017
      333 pages
      ISBN:9781450348904
      DOI:10.1145/3055031

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 April 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate143of593submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader