2018
DOI: 10.3390/s18082659
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing

Abstract: As an extension of cloud computing, fog computing has received more attention in recent years. It can solve problems such as high latency, lack of support for mobility and location awareness in cloud computing. In the Internet of Things (IoT), a series of IoT devices can be connected to the fog nodes that assist a cloud service center to store and process a part of data in advance. Not only can it reduce the pressure of processing data, but also improve the real-time and service quality. However, data processi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(32 citation statements)
references
References 51 publications
0
32
0
Order By: Relevance
“…Let G 1 , G 2 be a cyclic addition group on elliptic curve and a cyclic multiplication with same order q, where q is a large prime and P 0 is a generator of G 1 .ê : G 1 ×G 1 → G 2 satisfies the following properties (see also [17]):…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Let G 1 , G 2 be a cyclic addition group on elliptic curve and a cyclic multiplication with same order q, where q is a large prime and P 0 is a generator of G 1 .ê : G 1 ×G 1 → G 2 satisfies the following properties (see also [17]):…”
Section: Preliminariesmentioning
confidence: 99%
“…The virtual aggregation domain was proposed in 3PDA [16], which allows users to join the data aggregation dynamically. In [17], false data injection attack resistance is achieved using the blinding factor. However, it is vulnerable to collusion attacks from control centers and fog devices, and cannot support users dynamic join and exit.…”
Section: Introductionmentioning
confidence: 99%
“…However, data can be overexposed and revealed to the outside world because of this additional fog layer. The data generated by IoT devices will be computed by the nearest fog nodes, and false data injection attacks can occur when data are outsourced to the fog nodes [57]. Since fog nodes are close to IoT devices, location privacy is another issue.…”
Section: E Privacy Preserving In Fog Nodesmentioning
confidence: 99%
“…These applications can be used to generate big data to provide new services to citizens, businesses, and public administrations to make smart decisions [3]. More in-depth understanding of IoT with its applications, challenges, and open research issues is discussed in [1][2][3][4][5][6][7]. Many benefits are provided by IoT technologies to the healthcare field, and the resulting applications can be grouped mainly in the tracking of objects and people (staff and patients); identification and authentication of persons; automatic data collection and detection [8].…”
Section: Introductionmentioning
confidence: 99%