Secret sharing-based IoT text data outsourcing: a secure and efficient scheme

Article


Tang, Zhaohui. 2021. "Secret sharing-based IoT text data outsourcing: a secure and efficient scheme." IEEE Access. 9, pp. 76908 -76920. https://doi.org/10.1109/ACCESS.2021.3075282
Article Title

Secret sharing-based IoT text data outsourcing: a secure and efficient scheme

ERA Journal ID210567
Article CategoryArticle
Authors
AuthorTang, Zhaohui
Journal TitleIEEE Access
Journal Citation9, pp. 76908 -76920
Article Number9411867
Number of Pages13
Year2021
PublisherIEEE (Institute of Electrical and Electronics Engineers)
Place of PublicationUnited States
ISSN2169-3536
Digital Object Identifier (DOI)https://doi.org/10.1109/ACCESS.2021.3075282
Web Address (URL)https://ieeexplore.ieee.org/document/9411867
Abstract

Secret Sharing has been recently used as an alternative approach to solve privacy-preserving issues in cloud-based data outsourcing, for overcoming the challenges faced when encryption-based methods are adopted. In this work we revisit secret sharing-based text data outsourcing schemes and focus on their applications into an Internet-of-Things (IoT) system with resource constrained IoT devices as clients. We propose a new method which is secure against common attacks to secret sharing-based text data outsourcing schemes. Compared with the existing works under the same assumption that the cloud servers are possibly colluded, our scheme is more efficient and supports multiplication based operations.

Keywordsdata outsourcing, privacy-preserving, secret sharing, Internet-of-Things (IoT)
Contains Sensitive ContentDoes not contain sensitive content
ANZSRC Field of Research 2020460403. Data security and protection
460401. Cryptography
Byline AffiliationsSchool of Sciences
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q6z15/secret-sharing-based-iot-text-data-outsourcing-a-secure-and-efficient-scheme

Download files

  • 74
    total views
  • 87
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

Lightweight federated learning for STIs/HIV prediction
Nguyen, Thi Phuoc Van, Yang, Wencheng, Tang, Zhaohui, Xia, Xiaoyu, Mullens, Amy B., Dean, Judith A. and Li, Yan. 2024. "Lightweight federated learning for STIs/HIV prediction." Scientific Reports. 14 (1). https://doi.org/10.1038/s41598-024-56115-0
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Yang, Wencheng, Wang, Song, Cui, Hui, Tang, Zhaohui and Li, Yan. 2023. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors. 23 (7). https://doi.org/10.3390/s23073566
Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning
Tang, Zhaohui. 2022. "Efficient Beaver Triple Generation for Privacy-preserving Collaborative Machine Learning." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.
Federated Learning with Real-world Datasets: Compliance with the Privacy Act
Tang, Zhaohui and Keoh, Sye Loong. 2022. "Federated Learning with Real-world Datasets: Compliance with the Privacy Act." Cho, Seongsoo (ed.) 9th International Conference on Advanced Engineering and ICT-Convergence (ICAEIC-2022). Jeju Island, Korea 13 - 15 Jul 2022 Seoul, Korea.
An Efficient Scheme to Secure Data Provenance in Home Area Networks
Tang, Zhaohui and Keoh, Sye Loong. 2020. "An Efficient Scheme to Secure Data Provenance in Home Area Networks." IEEE 3rd 5G World Forum (5GWF 2020). Bangalore, India 10 - 12 Sep 2020 United States. https://doi.org/10.1109/5GWF49715.2020.9221402
Privacy Preserving Computation in Home Loans Using the FRESCO Framework
Chan, Fook Mun, Xu, Quanqing, Seah, Hao Jian, Keoh, Sye Loong, Tang, Zhaohui and Aung, Khin Mi Mi. 2019. "Privacy Preserving Computation in Home Loans Using the FRESCO Framework." Kacprzyk, Janusz (ed.) 2018 Future of Information and Communication Conference (FICC 2018). Singapore 05 - 06 Apr 2018 Switzerland. https://doi.org/10.1007/978-3-030-03405-4_7
Authentication and Integrity Protection for Real-time Cyber-Physical Systems
Keoh, Sye Loong, Tan, Heng Chuan and Tang, Zhaohui. 2020. "Authentication and Integrity Protection for Real-time Cyber-Physical Systems." Tian, Yu-Chu and Levy, David Charles (ed.) Handbook of Real-Time Computing. Singapore. Springer. pp. 1-22