Articles producció científica> Enginyeria Informàtica i Matemàtiques

Anonymous and secure aggregation scheme in fog-based public cloud computing

  • Identification data

    Identifier: imarina:3668972
    Authors:
    Wang, HuaqunWang, ZhiweiDomingo-Ferrer, Josep
    Abstract:
    By using fog computing, cloud computing can be extended to the edge of the network. Generally, in the public cloud, fog computing comprises three components: terminal device, fog node and public cloud server (PCS). In this paper, we propose the concept of anonymous and secure aggregation scheme (ASAS) in fog-based public cloud computing. In the ASAS model, a fog node aggregates the data from terminal nodes and forwards the aggregated data to the public cloud server. By using the ASAS scheme, the fog node can help terminal devices upload their data to PCS. By using the data aggregation technique, our ASAS scheme can save bandwidth between the fog node and PCS. At the same time, our ASAS scheme not only protects the identities of terminal devices by using pseudonyms but it also guarantees data secrecy via a homomorphic encryption technique. In this paper, we design the first concrete ASAS scheme. We also examine the security and the performance of our proposal, which we show to be provably secure and efficient.
  • Others:

    Author, as appears in the article.: Wang, Huaqun; Wang, Zhiwei; Domingo-Ferrer, Josep
    Department: Enginyeria Informàtica i Matemàtiques
    URV's Author/s: Domingo Ferrer, Josep
    Keywords: Terminal device Homomorphic encryption Fog computing Cloud computing Anonymity
    Abstract: By using fog computing, cloud computing can be extended to the edge of the network. Generally, in the public cloud, fog computing comprises three components: terminal device, fog node and public cloud server (PCS). In this paper, we propose the concept of anonymous and secure aggregation scheme (ASAS) in fog-based public cloud computing. In the ASAS model, a fog node aggregates the data from terminal nodes and forwards the aggregated data to the public cloud server. By using the ASAS scheme, the fog node can help terminal devices upload their data to PCS. By using the data aggregation technique, our ASAS scheme can save bandwidth between the fog node and PCS. At the same time, our ASAS scheme not only protects the identities of terminal devices by using pseudonyms but it also guarantees data secrecy via a homomorphic encryption technique. In this paper, we design the first concrete ASAS scheme. We also examine the security and the performance of our proposal, which we show to be provably secure and efficient.
    ISSN: 0167-739X
    Author's mail: josep.domingo@urv.cat
    Author identifier: 0000-0001-7213-4962
    Last page: 719
    Record's date: 2024-10-19
    Journal volume: 78
    Papper version: info:eu-repo/semantics/submittedVersion
    Licence document URL: https://repositori.urv.cat/ca/proteccio-de-dades/
    Papper original source: Future Generation Computer Systems. 78 (2): 712-719
    APA: Wang, Huaqun; Wang, Zhiwei; Domingo-Ferrer, Josep (2018). Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Generation Computer Systems, 78(2), 712-719. DOI: 10.1016/j.future.2017.02.032
    Entity: Universitat Rovira i Virgili
    Journal publication year: 2018
    First page: 712
    Publication Type: Journal Publications
  • Keywords:

    Terminal device
    Homomorphic encryption
    Fog computing
    Cloud computing
    Anonymity
  • Documents:

  • Cerca a google

    Search to google scholar