ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks

作者: Moreno Ambrosin , Paolo Braca , Mauro Conti , Riccardo Lazzeretti

DOI: 10.1145/3137573

关键词:

摘要: The large spread of sensors and smart devices in urban infrastructures are motivating research the area Internet Things (IoT) to develop new services improve citizens’ quality life. Sensors generate amounts measurement data from sensing environment, which is used enable such as control power consumption or traffic density. To deal with a amount information provide accurate measurements, service providers can adopt fusion, given decentralized nature deployments be performed by means consensus algorithms. These algorithms allow distributed agents (iteratively) compute linear functions on exchanged data, take decisions based outcome, without need for support central entity. However, use raises several security concerns, especially when private critical involved computation.In this article we propose ODIN, novel algorithm allowing fusion over encrypted data. ODIN privacy-preserving extension popular gossip algorithm, prevents having direct access while they iteratively reach consensus; cannot even final value but only retrieve partial (e.g., binary decision). uses efficient additive obfuscation proxy re-encryption during update steps garbled circuits make obfuscated consensus. We discuss our proposal show its practicability efficiency real-world resource-constrained devices, developing prototype implementation Raspberry Pi devices.

参考文章(76)
Yevgeniy Dodis, Anca-Andreea Ivan, Proxy cryptography revisted network and distributed system security symposium. ,(2003)
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft, None, Privacy-Preserving Face Recognition privacy enhancing technologies. pp. 235- 253 ,(2009) , 10.1007/978-3-642-03168-7_14
Mauro Barni, Giulia Droandi, Riccardo Lazzeretti, Privacy Protection in Biometric-Based Recognition Systems: A marriage between cryptography and signal processing IEEE Signal Processing Magazine. ,vol. 32, pp. 66- 76 ,(2015) , 10.1109/MSP.2015.2438131
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider, A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design Journal of Computer Security. ,vol. 21, pp. 283- 315 ,(2013) , 10.3233/JCS-130464
Donald Beaver, Precomputing Oblivious Transfer international cryptology conference. pp. 97- 109 ,(1995) , 10.1007/3-540-44750-4_8
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger, Key-Private Proxy Re-encryption the cryptographers track at the rsa conference. pp. 279- 294 ,(2009) , 10.1007/978-3-642-00862-7_19
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Nicolaos E. Manitara, Christoforos N. Hadjicostis, Privacy-preserving asymptotic average consensus european control conference. pp. 760- 765 ,(2013) , 10.23919/ECC.2013.6669251
Himanshu Khurana, Jin Heo, Meenal Pant, From proxy encryption primitives to a deployable secure-mailing-list solution international conference on information and communication security. pp. 260- 281 ,(2006) , 10.1007/11935308_19
Matthew Roughan, Jon Arnold, Multiple target localisation in sensor networks with location privacy security of ad hoc and sensor networks. pp. 116- 128 ,(2007) , 10.1007/978-3-540-73275-4_9