Multi-Party Computation in IoT for Privacy-Preservation

06/04/2022
by   Himanshu Goyal, et al.
0

Preservation of privacy has been a serious concern with the increasing use of IoT-assisted smart systems and their ubiquitous smart sensors. To solve the issue, the smart systems are being trained to depend more on aggregated data instead of directly using raw data. However, most of the existing strategies for privacy-preserving data aggregation, either depend on computation-intensive Homomorphic Encryption based operations or communication-intensive collaborative mechanisms. Unfortunately, none of the approaches are directly suitable for a resource-constrained IoT system. In this work, we leverage the concurrent-transmission-based communication technology to efficiently realize a Multi-Party Computation (MPC) based strategy, the well-known Shamir's Secret Sharing (SSS), and optimize the same to make it suitable for real-world IoT systems.

READ FULL TEXT

page 1

page 2

research
07/25/2022

LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT

In the modern digital world, a user of a smart system remains surrounded...
research
06/15/2021

Coded Privacy-Preserving Computation at Edge Networks

Multi-party computation (MPC) is promising for privacy-preserving machin...
research
03/22/2022

SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT

Recently collaborative learning is widely applied to model sensitive dat...
research
12/11/2018

Privacy-preserving data aggregation in resource-constrained sensor nodes in Internet of Things: A review

Privacy problems are lethal and getting more attention than any other is...
research
05/25/2020

Two-Phase Multi-Party Computation Enabled Privacy-Preserving Federated Learning

Countries across the globe have been pushing strict regulations on the p...
research
02/13/2019

On Lightweight Privacy-Preserving Collaborative Learning for IoT Objects

The Internet of Things (IoT) will be a main data generation infrastructu...
research
08/17/2023

Privacy-Preserving Detection Method for Transmission Line Based on Edge Collaboration

Unmanned aerial vehicles (UAVs) are commonly used for edge collaborative...

Please sign up or login with your details

Forgot password? Click here to reset