About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Collaborative Computing: Networking, Applications and Worksharing. 19th EAI International Conference, CollaborateCom 2023, Corfu Island, Greece, October 4-6, 2023, Proceedings, Part II

Research Article

Protect Applications and Data in Use in IoT Environment Using Collaborative Computing

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-54528-3_15,
        author={Xincai Peng and Li Shan Cang and Shuai Zhang and Muddesar Iqbal},
        title={Protect Applications and Data in Use in IoT Environment Using Collaborative Computing},
        proceedings={Collaborative Computing: Networking, Applications and Worksharing. 19th EAI International Conference, CollaborateCom 2023, Corfu Island, Greece, October 4-6, 2023, Proceedings, Part II},
        proceedings_a={COLLABORATECOM PART 2},
        year={2024},
        month={2},
        keywords={Collaborative computing IoT Data Privacy Data Security},
        doi={10.1007/978-3-031-54528-3_15}
    }
    
  • Xincai Peng
    Li Shan Cang
    Shuai Zhang
    Muddesar Iqbal
    Year: 2024
    Protect Applications and Data in Use in IoT Environment Using Collaborative Computing
    COLLABORATECOM PART 2
    Springer
    DOI: 10.1007/978-3-031-54528-3_15
Xincai Peng, Li Shan Cang,*, Shuai Zhang, Muddesar Iqbal1
  • 1: College of Engineering
*Contact email: shancang.li@outlook.com

Abstract

In IoT systems, traditional encryption can be used to protect IoT applications and data at rest or in transit that transforms data in to ciphertext making it unreadable. However, it is very challenging to protect IoT systems against attacks targeting data and applications in use. Using homomorphic encryption, this work proposed a lightweight collaborative computing scheme to protect both applications and data in IoT environment that includes IoT devices, mobile apps, and cloud server. A novel key management system scheme proposed as a trusted third party to collaboratively generate and distribute keys by cloud servers and IoT devices, in which data is only visible to the data owner but keep encrypted to other parties. A SEAL-CKKS scheme and a K-means clustering algorithms were validated, and the experimental results demonstrated the effectiveness of proposed schemes, in which the K-means clustering algorithm in the plaintext state, the proposed scheme still maintains an accuracy up to 84.1%.

Keywords
Collaborative computing, IoT, Data Privacy, Data Security
Published
2024-02-23
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-54528-3_15
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL