PVF-DA: Privacy-Preserving, Verifiable and FaultTolerant Data Aggregation in MEC
PVF-DA: Privacy-Preserving, Verifiable and FaultTolerant Data Aggregation in MEC作者机构:School of Information Sciences and TechnologyNorth China University of TechnologyBeijing 100144China Guizhou UniversityGuizhou Provincial Key Laboratory of Public Big DataGuiyang 550025China Legendsec Information Technology(Beijing)Inc.Beijing 100085China
出 版 物:《China Communications》 (中国通信(英文版))
年 卷 期:2020年第17卷第8期
页 面:58-69页
核心收录:
学科分类:080904[工学-电磁场与微波技术] 0810[工学-信息与通信工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 080402[工学-测试计量技术及仪器] 0804[工学-仪器科学与技术] 081001[工学-通信与信息系统]
基 金:supported by Beijing Natural Science Foundation—Haidian Original Innovation Joint Fund Project Task Book(Key Research Topic)(Nos.L182039) Open Fund of National Engineering Laboratory for Big Data Collaborative Security Technology and the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(No.2019BDKFJJ012)
主 题:MEC data aggregation verifiability privacy-preserving fault-tolerance
摘 要:As an emergent-architecture, mobile edge computing shifts cloud service to the edge of networks. It can satisfy several desirable characteristics for Io T systems. To reduce communication pressure from Io T devices, data aggregation is a good candidate. However, data processing in MEC may suffer from many challenges, such as unverifiability of aggregated data, privacy-violation and fault-tolerance. To address these challenges, we propose PVF-DA: privacy-preserving, verifiable and fault-tolerant data aggregation in MEC based on aggregator-oblivious encryption and zero-knowledge-proof. The proposed scheme can not only provide privacy protection of the reported data, but also resist the collusion between MEC server and corrupted Io T devices. Furthermore, the proposed scheme has two outstanding features: verifiability and strong fault-tolerance. Verifiability can make Io T device to verify whether the reported sensing data is correctly aggregated. Strong fault-tolerance makes the aggregator to compute an aggregate even if one or several Io Ts fail to report their data. Finally, the detailed security proofs are shown that the proposed scheme can achieve security and privacy-preservation properties in MEC.