Logo image
Toward secure data computation and outsource for Multi-User Cloud-Based IoT
Journal article   Peer reviewed

Toward secure data computation and outsource for Multi-User Cloud-Based IoT

F. Rezaeibagha, Y. Mu, K. Huang, L. Chen and L. Zhang
IEEE Transactions on Cloud Computing, Vol.11(1), pp.217-228
2023
url
Link to Published Version *Subscription may be requiredView

Abstract

IoT cloud computing homomorphic encryption data security
Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based IoT systems prone to internal or external attacks. To protect IoT data against potential malicious users and adversaries, some cryptographic schemes have been applied to ensure confidentiality and integrity of IoT data. It is however a challenging task to perform any arithmetical computations once data items are encrypted. Fully-homomorphic encryption which is based on lattices can, in principle, provide a solution, but it is unfortunately inefficient in computation and hence cannot be applied to IoT. Fully-homomorphic encryption is feasible when we allow an involvement of semi-trusted server. However, it is challenging to provide such a system in the situation of distributed environments for shared IoT data. We solve this problem and provide a fully-homomorphic encryption scheme for cloud-based IoT applications. We introduce a new method with the aid of semi-trusted server who can help in the computation of the homomorphic multiplications without gaining any useful information of the encrypted data.

Details

Metrics

InCites Highlights

These are selected metrics from InCites Benchmarking & Analytics tool, related to this output

Collaboration types
Domestic collaboration
International collaboration
Citation topics
4 Electrical Engineering, Electronics & Computer Science
4.187 Security Systems
4.187.160 Cryptographic Protocols
Web Of Science research areas
Computer Science, Information Systems
Computer Science, Software Engineering
Computer Science, Theory & Methods
ESI research areas
Computer Science
Logo image