2019
DOI: 10.1109/access.2019.2916345
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic Consortium Blockchain for Smart Home System Sensitive Data Privacy Preserving

Abstract: The relative low level of smart home system (SHS) device information security may threaten the privacy of users. In this paper, we propose a homomorphic consortium blockchain for SHS sensitive data privacy preserving (HCB-SDPP), which is based on the traditional smart home system. We add verification services, which are composed of verification nodes, to our model to verify working nodes and transactions in SHS. In order to record the SHS device information transaction, we propose a new block data structure ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(50 citation statements)
references
References 26 publications
0
50
0
Order By: Relevance
“…managing the selection of energy-efficient service providers, of the proposed model. In [50], the authors have designed a smart home system based on consortium blockchain that is specific to data privacy. The performance of the model was evaluated by simulation; however, the architecture does not explained the energy consumption and activity processing time.…”
Section: Consortium Blockchain Systems For Smart Homesmentioning
confidence: 99%
“…managing the selection of energy-efficient service providers, of the proposed model. In [50], the authors have designed a smart home system based on consortium blockchain that is specific to data privacy. The performance of the model was evaluated by simulation; however, the architecture does not explained the energy consumption and activity processing time.…”
Section: Consortium Blockchain Systems For Smart Homesmentioning
confidence: 99%
“…Homomorphic cryptosystem comprises of three algorithms, such as key generation KeyGen, encryption Encry and decryption Decry. 46 A public-key cryptosystem is used to derive the pair of keys (sk, pk), where sk is used for decryption and pk is used for encryption. Homomorphic encryption (HE) enables certain algebraic operations on the plaintext to be applied directly on the ciphertext, such as a secure addition and secure multiplication.…”
Section: Homomorphic Cryptosystemmentioning
confidence: 99%
“…HE is used efficiently in data aggregation while protecting the privacy of users, and in this paper, paillier cryptosystem is used. 46 In paillier cryptosystem, E(.) is denoted as HE and m ∈ Z N are the messages.…”
Section: Homomorphic Cryptosystemmentioning
confidence: 99%
See 1 more Smart Citation
“…However, false data sent by sensors frequently can increase the energy consumption of sensors and reduce the life span of sensors. Feng [18] used AES-128 encryption algorithm to encrypt smart home sensors data; In [19], WEI SHE et al integrated homomorphic encryption with blockchain to realize the privacy protection of smart home. The above encryption algorithms can realize privacy protection of smart home to a certain extent, but they cost a lot of calculation, because of the complex algorithm and the large amount of information.…”
Section: Relative Workmentioning
confidence: 99%