On the Privacy of Concealed Data Aggregation

نویسندگان

  • Aldar C.-F. Chan
  • Claude Castelluccia
چکیده

A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are still lacking. Standard security notions for public key encryption schemes, including semantic security and indistinguishability against chosen ciphertext attacks, are refined to cover the multi-sender nature and aggregation functionality of CDA in the security model. A generic CDA construction based on public key homomorphic encryption is given, along with a proof of its security in the proposed model. The security of two existing schemes is also analyzed in the proposed model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Concealed data aggregation in wireless sensor networks: A comprehensive survey

The objectives of concealed data aggregation are to provide end-to-end privacy and en route aggregation of reverse multicast traffic in wireless sensor networks. Privacy homomorphism has been used for realizing these objectives together. Although privacy homomorphism achieves the conflicting objectives, such as privacy and data aggregation, it negatively affects other security objectives such a...

متن کامل

Hierarchical Concealed Data Aggregation for Wireless Sensor Networks

In wireless sensor networks, performing data aggregation while preserving data confidentiality is a challenging task. Recently, privacy homomorphism based secure data aggregation schemes have been proposed to achieve seamless integration of data confidentiality and aggregation. If sensor data are encrypted with different keys, however, these schemes do not allow hierarchical data aggregation, t...

متن کامل

Asymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey

The wireless communication nature of remotely deployed sensor nodes make the attacks more easily to be happened in wireless sensor networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data aggregation schemes are necessary in resource constrained W...

متن کامل

PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks

In wireless sensor networks, data aggregation protocols are used to prolong the network lifetime. However, the problem of how to perform data aggregation while preserving data privacy is challenging. This paper presents a polynomial regressionbased data aggregation protocol that preserves the privacy of sensor data. In the proposed protocol, sensor nodes represent their data as polynomial funct...

متن کامل

Symmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks

In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route ag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007