Home > Research > Publications & Outputs > Privacy-preserving and verifiable multi-task da...

Associated organisational unit

Electronic data

  • JISAS-D-24-00498_R1

    Accepted author manuscript, 8.34 MB, PDF document

    Available under license: CC BY: Creative Commons Attribution 4.0 International License

Links

Text available via DOI:

View graph of relations

Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published
  • Xinzhe Zhang
  • Lei Wu
  • Lijuan Xu
  • Zhien Liu
  • Ye Su
  • Hao Wang
  • Weizhi Meng
Close
Article number103977
<mark>Journal publication date</mark>31/03/2025
<mark>Journal</mark>Journal of Information Security and Applications
Volume89
Publication StatusPublished
Early online date26/01/25
<mark>Original language</mark>English

Abstract

The combination of mobile crowdsensing (MCS) and IoT-based healthcare introduces innovative solutions for collecting health data. The considerable accumulation of health data through MCS expedites advancements in medical research and disease prediction, giving rise to privacy considerations. Data aggregation emerges as a salient solution that facilitates the provision of aggregated statistics while obfuscating raw personal data. However, prevailing aggregation schemes primarily pivot around single-task or multi-dimensional data aggregation, rarely contemplating the multi-task aggregation scenarios. Furthermore, in some schemes that implement multi-tasking, protection of task contents and verifiability of aggregation results are not achieved. Therefore, we propose a specialized data aggregation scheme for multi-task scenarios on fog computing. Initially, we employ a symmetric cryptographic algorithm to encrypt task contents and distribute the corresponding symmetric keys through a key management scheme based on the Chinese Remainder Theorem (CRT). Subsequently, we utilize blinding techniques to encrypt the raw data of users, ensuring efficient data aggregation. To enhance resilience against adversarial tampering with aggregated data, we employ the Pedersen commitment scheme to achieve the verifiability of task aggregation results. Finally, theoretical analyses and experimental evaluations collectively demonstrate the security and effectiveness of our proposed scheme.