{"title":"Secure rank correlation computation for IoT applications","authors":"Kok-Seng Wong, M. Kim","doi":"10.1504/IJSTM.2017.10002702","DOIUrl":null,"url":null,"abstract":"The internet of things (IoT) is emerging as the next mega-trend technology across the business spectrum. Due to significant advances in sensor and RFID technologies, smart devices are now connected via the internet and able to communicate with each other without human intervention. Hence, the amount of data collected about individuals has increased dramatically. The ability of machines and sensor devices to collect, transmit and share data has raised privacy concerns in IoT applications. Recently, privacy concerns about data collected by IoT applications have received an increasing amount of attention. Therefore, a series of security mechanisms must be available for data privacy protection. In this paper, we propose two secure correlation computation protocols for IoT applications. We concentrate on the asymmetric setting where only one party receives the computation result. We incorporate homomorphic cryptosystem into our computation to support operations in an encrypted form. Two experimental results in this paper demonstrate the performance of both computation protocols.","PeriodicalId":171228,"journal":{"name":"Int. J. Serv. Technol. Manag.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Serv. Technol. Manag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJSTM.2017.10002702","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The internet of things (IoT) is emerging as the next mega-trend technology across the business spectrum. Due to significant advances in sensor and RFID technologies, smart devices are now connected via the internet and able to communicate with each other without human intervention. Hence, the amount of data collected about individuals has increased dramatically. The ability of machines and sensor devices to collect, transmit and share data has raised privacy concerns in IoT applications. Recently, privacy concerns about data collected by IoT applications have received an increasing amount of attention. Therefore, a series of security mechanisms must be available for data privacy protection. In this paper, we propose two secure correlation computation protocols for IoT applications. We concentrate on the asymmetric setting where only one party receives the computation result. We incorporate homomorphic cryptosystem into our computation to support operations in an encrypted form. Two experimental results in this paper demonstrate the performance of both computation protocols.