Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities

被引:70
|
作者
Ren, Hao [1 ]
Li, Hongwei [1 ,3 ]
Dai, Yuanshun [2 ]
Yang, Kan [4 ,5 ]
Lin, Xiaodong [6 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Cybersecur, Chengdu, Sichuan, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu, Sichuan, Peoples R China
[4] Univ Memphis, Dept CS, Memphis, TN 38152 USA
[5] Univ Memphis, Ctr Informat Assurance CfIA, Memphis, TN 38152 USA
[6] Wilfrid Laurier Univ, Comp Sci, Dept Phys & Comp Sci, Waterloo, ON, Canada
来源
IEEE NETWORK | 2018年 / 32卷 / 06期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
RANGE QUERIES; SECURE;
D O I
10.1109/MNET.2018.1700374
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IoT is envisioned as the next stage of the information revolution, enabling various daily applications and providing better service by conducting a deep fusion with cloud and fog computing. As the key mission of most IoT applications, data management, especially the fundamental function-data query, has long been plagued by severe security and privacy problems. Most query service providers, including the big ones (e.g., Google, Facebook, Amazon, and so on) are suffering from intensive attacks launched by insiders or outsiders. As a consequence, processing various queries in IoT without compromising the data and query privacy is an urgent and challenging issue. In this article, we propose a thing-fog-cloud architecture for secure query processing based on well studied classical paradigms. Following with a description of crucial technical challenges in terms of functionality, privacy and efficiency assurance, we survey the latest milestone-like approaches, and provide an insight into the advantages and limitations of each scheme. Based on the recent advances, we also discuss future research opportunities to motivate efforts to develop practical private query protocols in IoT.
引用
收藏
页码:144 / 151
页数:8
相关论文
共 50 条
  • [31] Deep Visual Privacy Preserving for Internet of Robotic Things
    Abbasi, Milad Haji
    Majidi, Babak
    Eshghi, Moahmmad
    Abbasi, Ebrahim Haji
    2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 292 - 296
  • [32] ESOT: a new privacy model for preserving location privacy in Internet of Things
    Ikram Ullah
    Munam Ali Shah
    Abdul Wahid
    Amjad Mehmood
    Houbing Song
    Telecommunication Systems, 2018, 67 : 553 - 575
  • [33] ESOT: a new privacy model for preserving location privacy in Internet of Things
    Ullah, Ikram
    Shah, Munam Ali
    Wahid, Abdul
    Mehmood, Amjad
    Song, Houbing
    TELECOMMUNICATION SYSTEMS, 2018, 67 (04) : 553 - 575
  • [34] Towards Privacy Preserving Data Provenance for the Internet of Things
    Canovas Sanchez, Jose Luis
    Bernal Bernabe, Jorge
    Skarmeta, Antonio F.
    2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2018, : 41 - 46
  • [35] A Novel Model for Preserving Location Privacy in Internet of Things
    Ullah, Ikram
    Shah, Munam Ali
    2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 543 - 548
  • [36] An Overview of Privacy Preserving Schemes for Industrial Internet of Things
    Yan Huo
    Chun Meng
    Ruinian Li
    Tao Jing
    中国通信, 2020, 17 (10) : 1 - 18
  • [37] Security and Privacy Challenges in Industrial Internet of Things
    Sadeghi, Ahmad-Reza
    Wachsmann, Christian
    Waidner, Michael
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [38] Security and privacy in the Internet of Things: threats and challenges
    Badr, Youakim
    Zhu, Xiaoyang
    Alraja, Mansour Naser
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2021, 15 (04) : 257 - 271
  • [39] Editorial: Security and Privacy Challenges in Internet of Things
    Wang, Ding
    Meng, Weizhi
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (01): : 343 - 345
  • [40] Editorial: Security and Privacy Challenges in Internet of Things
    Ding Wang
    Weizhi Meng
    Mobile Networks and Applications, 2022, 27 : 343 - 345