On the Privacy of Concealed Data Aggregation
نویسندگان
چکیده
A formal treatment to the privacy of concealed data aggregation (CDA) is given. While there exist a handful of constructions, rigorous security models and analyses for CDA are still lacking. Standard security notions for public key encryption schemes, including semantic security and indistinguishability against chosen ciphertext attacks, are refined to cover the multi-sender nature and aggregation functionality of CDA in the security model. A generic CDA construction based on public key homomorphic encryption is given, along with a proof of its security in the proposed model. The security of two existing schemes is also analyzed in the proposed model.
منابع مشابه
Concealed data aggregation in wireless sensor networks: A comprehensive survey
The objectives of concealed data aggregation are to provide end-to-end privacy and en route aggregation of reverse multicast traffic in wireless sensor networks. Privacy homomorphism has been used for realizing these objectives together. Although privacy homomorphism achieves the conflicting objectives, such as privacy and data aggregation, it negatively affects other security objectives such a...
متن کاملHierarchical Concealed Data Aggregation for Wireless Sensor Networks
In wireless sensor networks, performing data aggregation while preserving data confidentiality is a challenging task. Recently, privacy homomorphism based secure data aggregation schemes have been proposed to achieve seamless integration of data confidentiality and aggregation. If sensor data are encrypted with different keys, however, these schemes do not allow hierarchical data aggregation, t...
متن کاملAsymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey
The wireless communication nature of remotely deployed sensor nodes make the attacks more easily to be happened in wireless sensor networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data aggregation schemes are necessary in resource constrained W...
متن کاملPRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks
In wireless sensor networks, data aggregation protocols are used to prolong the network lifetime. However, the problem of how to perform data aggregation while preserving data privacy is challenging. This paper presents a polynomial regressionbased data aggregation protocol that preserves the privacy of sensor data. In the proposed protocol, sensor nodes represent their data as polynomial funct...
متن کاملSymmetric-Key Based Homomorphic Primitives for End-to-End Secure Data Aggregation in Wireless Sensor Networks
In wireless sensor networks, secure data aggregation protocols target the two major objectives, namely, security and en route aggregation. Although en route aggregation of reverse multi-cast traffic improves energy efficiency, it becomes a hindrance to end-to-end security. Concealed data aggregation protocols aim to preserve the end-to-end privacy of sensor readings while performing en route ag...
متن کامل