2020
DOI: 10.1109/jiot.2020.2978286
|View full text |Cite
|
Sign up to set email alerts
|

LVPDA: A Lightweight and Verifiable Privacy-Preserving Data Aggregation Scheme for Edge-Enabled IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(18 citation statements)
references
References 32 publications
0
18
0
Order By: Relevance
“…The SAMA scheme uses various systems such as RSA-type and ElGamal-type for preserving the location and identity privacy of a data source as well as message authenticity and integrity. Zhang et al [116] proposed a privacy-preserving data aggregation scheme, named LVPDA, which can be applied for the edge-computingenabled smart agriculture. During the data aggregation process, the LVPDA scheme combines an online/offline signature technique and Paillier homomorphic encryption method for privacy-preserving and integrity verification.…”
Section: B Privacy-preservingmentioning
confidence: 99%
“…The SAMA scheme uses various systems such as RSA-type and ElGamal-type for preserving the location and identity privacy of a data source as well as message authenticity and integrity. Zhang et al [116] proposed a privacy-preserving data aggregation scheme, named LVPDA, which can be applied for the edge-computingenabled smart agriculture. During the data aggregation process, the LVPDA scheme combines an online/offline signature technique and Paillier homomorphic encryption method for privacy-preserving and integrity verification.…”
Section: B Privacy-preservingmentioning
confidence: 99%
“…Privacy-preserving data aggregation has attracted much attention in recent years. To protect the sensitive information of users, the homomorphic encryption technology [ 11 , 13 , 16 , 17 , 18 , 19 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 ], the differential privacy technology [ 17 , 26 , 27 , 31 ], and the pseudonym technology [ 12 , 15 , 32 , 33 ] have mainly been used in aggregation schemes [ 34 ].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, selective aggregation was achieved by computing the inner product similarity to identify the aggregation subset. Zhang et al [ 24 ] constructed a lightweight and verifiable PPDA scheme, called LVPDA, which was proved to be existentially unforgeable under the chosen message attack. LVPDA introduced the edge computing paradigm for efficient data storage and computing services.…”
Section: Related Workmentioning
confidence: 99%
“…Although the sharding technology can reduce computational overhead, it requires a relatively large communication overhead, which may cause collisions between nodes and data loss of nodes. Data aggregation based on homomorphic encryption [20] can aggregate ciphertext without decryption. But it does not support integrity verification.…”
Section: User Data Protectionmentioning
confidence: 99%