ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2015, Vol. 52 ›› Issue (10): 2341-2352.doi: 10.7544/issn1000-1239.2015.20150764

所属专题: 2015网络安全与隐私保护研究进展

• 信息安全 • 上一篇    下一篇



  1. (华东师范大学上海市高可信计算重点实验室 上海 200062) (
  • 出版日期: 2015-10-01
  • 基金资助: 

Advances of Privacy Preservation in Internet of Things

Dong Xiaolei   

  1. (Shanghai Key Laboratory for Trustworthy Computing, East China Normal University, Shanghai 200062)
  • Online: 2015-10-01

摘要: 物联网被越来越广泛地应用于各种不同的新型网络环境中.在物联网密文数据访问控制方面,要求对授权方实现细粒度的密文访问控制策略.然而,传统的信道安全无法满足“一对多”、“多对多”环境下抵抗密钥共享攻击等基于应用的安全与隐私保护需求.物联网隐私保护外包计算可在加密域上,保护单个数据隐私及外包计算结果隐私的前提下实现对数据的聚合和信号处理等运算,并验证其正确性.但现有工作多基于(全)同态加密技术来实现,效率低下,且不符合混合加密的基本原则.针对上述2方面问题,介绍了国际上近年来利用密码学技术的具体的解决方案,特别是阐述了该团队提出的同时满足可追踪与可撤销性的多机构属性基加密方法和在不得不使用公钥加密进行数据隐私保护的前提下,仅使用一次公钥加密来高效实现对n个数据轻量级隐私保护外包聚合的新方法.同时,对当前热门的智能电网、无线体域网和无线车载网等中的隐私保护研究进展进行了综述,给出了国内外在该领域的最新研究进展和对该领域具有挑战性的公开问题的研究情况.

关键词: 物联网, 隐私保护, 密文数据访问控制, 安全外包计算, 可追踪, 可撤销, 轻量化

Abstract: Internet of things (IoT) has been increasingly applied to kinds of new network environments. In the ciphertext access control of IoT, it is required to achieve fine-grained access control policy on the authorized entities. Unfortunately, the traditional communication channel security cannot well satisfy the security and privacy requirements from the “one-to-many” and “many-to-many” scenarios such as resisting the secret key sharing attack. Privacy preserving outsourced computation in IoT can realize secure data aggregation and signal processing in the encrypted domain, protect the individual data privacy and the aggregation result privacy, and verify the correctness of computation. However, most of the existing work exploited (fully) homomorphic encryption directly on data themselves, incurring inefficiency and significantly deviating from the principle of hybrid encryption. To address the issues outlined above, in this paper, we introduce recent concrete solutions exploiting cryptographic techniques, especially presenting the following two results proposed by our research team: a new mechanism of traceable and revocable attribute-based encryption and a new method of lightweight privacy preserving aggregating n data by executing the public key encryption only once. On the meanwhile, we also give a survey on the privacy preserving techniques in popular network services such as smart grid, wireless body area network and wireless vehicular ad hoc network, and suggest the recent advances and results with respect to the challenging open problems in this research field all over the world.

Key words: Internet of things (IoT), privacy preserving, ciphertext access control, secure outsource computation, traceable, revocable, lightweight