Privacy Protection in the Internet of Things Based on Cryptography

Article Preview

Abstract:

In this paper, we describe some privacy threats in the Internet of Things and some research works on privacy protection. We present a new scheme base on cryptosystem to protect privacy in the Internet of Things. The scheme includes location privacy protection, data privacy homomorphism mechanism and information hiding technology, and secure multi-party computation on data privacy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2462-2466

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Juels, A. RFID security and privacy: a research survey [J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.

DOI: 10.1109/jsac.2005.861395

Google Scholar

[2] To quell the RFID safety crisis: American standard Arise [N]. Printing Quality & Standardization, 2007, 7: 10-10.

Google Scholar

[3] Patrick Tague, David Slater, Jason Rogers, and Radha Poovendran. Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis [A]. The 27th IEEE Conference on Computer Communications (INFOCOM 2008) [C]. Phoniex, AZ, U.S. A, IEEE Communications Society, Apr. 13-18, 2008: 161-165.

DOI: 10.1109/infocom.2008.41

Google Scholar

[4] Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei. Mobility and Cooperation to Thwart Node Capture Attacks in MANETs [J]. EURASIP Journal on Wireless Communications and Networking, Volume 2009 (2009).

DOI: 10.1155/2009/945943

Google Scholar

[5] R. L. Rivest, L. M. Adleman, and M. L. Dertouzos. On databanks and privacy homomorphisms [J]. Foundations of Secure Computation, 1978: 169-180.

Google Scholar

[6] S. Goldwasser and S. Micali. Probabilistic encryption [J]. Journal of Computer and System Sciences, 1984, 28(2): 270–299.

DOI: 10.1016/0022-0000(84)90070-9

Google Scholar

[7] J. Domingo-Ferrer. A new privacy homomorphism and applications [J]. Information Processing Letters, 2006, 60(5): 277-282.

DOI: 10.1016/s0020-0190(96)00170-6

Google Scholar

[8] J. Domingo-Ferrer. A provably secure additive and multiplicative privacy homomorphism [A]. In Proceedings of the 5th International Conference on Information Security (ISC 2002) [C]. Springer-Verlag, 2002: 471-483.

DOI: 10.1007/3-540-45811-5_37

Google Scholar

[9] J. H. Cheon and H. S. Nam. A cryptanalysis of the original domingo-ferrer's algebraic privacy homomophism [R]. Cryptology ePrint Archive, Report 2003/221, (2003).

Google Scholar

[10] F. Bao. Cryptanalysis of a provable secure additive and multiplicative privacy homomorphism [A]. In Proceedings of the International Workshop on Coding and Cryptography (WCC 2005) [C]. 2005: 43-50.

Google Scholar

[11] D. Wagner. Cryptanalysis of an algebraic privacy homomorphism [A]. In Proceedings of the 5th International Conference on Information Security (ISC 2003) [C]. Springer-Verlag, 2003: 234–239.

DOI: 10.1007/10958513_18

Google Scholar

[12] N. Ahituv, Y. Lapid, and S. Neumann. Processing encrypted data [J]. Communications of the ACM, 1987, 30(9): 777–780.

DOI: 10.1145/30401.30404

Google Scholar

[13] Steven. A Novel Information Hiding Technique for Security by Using Image Steganography. Journal of Theoretical and Applied Information Technology on October 24, (2009).

Google Scholar