A privacy-preserving homomorphic encryption scheme for the Internet of Things
Title | A privacy-preserving homomorphic encryption scheme for the Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Zouari, J., Hamdi, M., Kim, T. H. |
Conference Name | 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) |
Keywords | Additives, ambient environment, context-aware decision mechanisms, cryptography, data analysis module, data concealment, disruptive paradigm, elliptic curve, Elliptic curves, Encryption, end-to-end encryption, fully additive encryption, fully additive secret sharing, heterogeneous smart things, homomorphic encryption, hop-by-hop encryption, human factors, Internet of Things, IoT, Logic gates, Metrics, privacy homomorphism, pubcrawl, Resiliency, resource constrained devices, Scalability, secret sharing, secure cooperation, Sensors, smart things |
Abstract | The Internet of Things is a disruptive paradigm based on the cooperation of a plethora of heterogeneous smart things to collect, transmit, and analyze data from the ambient environment. To this end, many monitored variables are combined by a data analysis module in order to implement efficient context-aware decision mechanisms. To ensure resource efficiency, aggregation is a long established solution, however it is applicable only in the case of one sensed variable. We extend the use of aggregation to the complex context of IoT by proposing a novel approach for secure cooperation of smart things while granting confidentiality and integrity. Traditional solutions for data concealment in resource constrained devices rely on hop-by-hop or end-to-end encryption, which are shown to be inefficient in our context. We use a more sophisticated scheme relying on homomorphic encryption which is not compromise resilient. We combine fully additive encryption with fully additive secret sharing to fulfill the required properties. Thorough security analysis and performance evaluation show a viable tradeoff between security and efficiency for our scheme. |
DOI | 10.1109/IWCMC.2017.7986580 |
Citation Key | zouari_privacy-preserving_2017 |
- hop-by-hop encryption
- smart things
- sensors
- secure cooperation
- secret sharing
- Scalability
- resource constrained devices
- Resiliency
- pubcrawl
- privacy homomorphism
- Metrics
- Logic gates
- IoT
- Internet of Things
- Human Factors
- Additives
- Homomorphic encryption
- heterogeneous smart things
- fully additive secret sharing
- fully additive encryption
- end-to-end encryption
- encryption
- Elliptic curves
- elliptic curve
- disruptive paradigm
- data concealment
- data analysis module
- Cryptography
- context-aware decision mechanisms
- ambient environment