Secure rank correlation computation for IoT applications

Kok Seng Wong, Myung Ho Kim

Research output: Contribution to journalArticle

Abstract

The internet of things (IoT) is emerging as the next mega-trend technology across the business spectrum. Due to significant advances in sensor and RFID technologies, smart devices are now connected via the internet and able to communicate with each other without human intervention. Hence, the amount of data collected about individuals has increased dramatically. The ability of machines and sensor devices to collect, transmit and share data has raised privacy concerns in IoT applications. Recently, privacy concerns about data collected by IoT applications have received an increasing amount of attention. Therefore, a series of security mechanisms must be available for data privacy protection. In this paper, we propose two secure correlation computation protocols for IoT applications. We concentrate on the asymmetric setting where only one party receives the computation result. We incorporate homomorphic cryptosystem into our computation to support operations in an encrypted form. Two experimental results in this paper demonstrate the performance of both computation protocols.

Original languageEnglish
Pages (from-to)40-51
Number of pages12
JournalInternational Journal of Services, Technology and Management
Volume23
Issue number1-2
DOIs
Publication statusPublished - Jan 1 2017

Fingerprint

Network protocols
Data privacy
Sensors
Radio frequency identification (RFID)
Cryptography
Internet
Internet of things
Rank correlation
Industry
Privacy concerns
Sensor
Radio frequency identification
World Wide Web
Privacy

Keywords

  • Data privacy for internet of things
  • IoT
  • Privacy preserving protocols
  • Rank correlation coefficient
  • Secure two-party computation

ASJC Scopus subject areas

  • Engineering(all)
  • Computer Science Applications
  • Strategy and Management
  • Marketing

Cite this

Secure rank correlation computation for IoT applications. / Wong, Kok Seng; Kim, Myung Ho.

In: International Journal of Services, Technology and Management, Vol. 23, No. 1-2, 01.01.2017, p. 40-51.

Research output: Contribution to journalArticle

@article{162e49aa5a1a423086e9432cb041a39b,
title = "Secure rank correlation computation for IoT applications",
abstract = "The internet of things (IoT) is emerging as the next mega-trend technology across the business spectrum. Due to significant advances in sensor and RFID technologies, smart devices are now connected via the internet and able to communicate with each other without human intervention. Hence, the amount of data collected about individuals has increased dramatically. The ability of machines and sensor devices to collect, transmit and share data has raised privacy concerns in IoT applications. Recently, privacy concerns about data collected by IoT applications have received an increasing amount of attention. Therefore, a series of security mechanisms must be available for data privacy protection. In this paper, we propose two secure correlation computation protocols for IoT applications. We concentrate on the asymmetric setting where only one party receives the computation result. We incorporate homomorphic cryptosystem into our computation to support operations in an encrypted form. Two experimental results in this paper demonstrate the performance of both computation protocols.",
keywords = "Data privacy for internet of things, IoT, Privacy preserving protocols, Rank correlation coefficient, Secure two-party computation",
author = "Wong, {Kok Seng} and Kim, {Myung Ho}",
year = "2017",
month = "1",
day = "1",
doi = "10.1504/IJSTM.2017.081875",
language = "English",
volume = "23",
pages = "40--51",
journal = "International Journal of Services, Technology and Management",
issn = "1460-6720",
publisher = "Inderscience Enterprises Ltd",
number = "1-2",

}

TY - JOUR

T1 - Secure rank correlation computation for IoT applications

AU - Wong, Kok Seng

AU - Kim, Myung Ho

PY - 2017/1/1

Y1 - 2017/1/1

N2 - The internet of things (IoT) is emerging as the next mega-trend technology across the business spectrum. Due to significant advances in sensor and RFID technologies, smart devices are now connected via the internet and able to communicate with each other without human intervention. Hence, the amount of data collected about individuals has increased dramatically. The ability of machines and sensor devices to collect, transmit and share data has raised privacy concerns in IoT applications. Recently, privacy concerns about data collected by IoT applications have received an increasing amount of attention. Therefore, a series of security mechanisms must be available for data privacy protection. In this paper, we propose two secure correlation computation protocols for IoT applications. We concentrate on the asymmetric setting where only one party receives the computation result. We incorporate homomorphic cryptosystem into our computation to support operations in an encrypted form. Two experimental results in this paper demonstrate the performance of both computation protocols.

AB - The internet of things (IoT) is emerging as the next mega-trend technology across the business spectrum. Due to significant advances in sensor and RFID technologies, smart devices are now connected via the internet and able to communicate with each other without human intervention. Hence, the amount of data collected about individuals has increased dramatically. The ability of machines and sensor devices to collect, transmit and share data has raised privacy concerns in IoT applications. Recently, privacy concerns about data collected by IoT applications have received an increasing amount of attention. Therefore, a series of security mechanisms must be available for data privacy protection. In this paper, we propose two secure correlation computation protocols for IoT applications. We concentrate on the asymmetric setting where only one party receives the computation result. We incorporate homomorphic cryptosystem into our computation to support operations in an encrypted form. Two experimental results in this paper demonstrate the performance of both computation protocols.

KW - Data privacy for internet of things

KW - IoT

KW - Privacy preserving protocols

KW - Rank correlation coefficient

KW - Secure two-party computation

UR - http://www.scopus.com/inward/record.url?scp=85011266029&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85011266029&partnerID=8YFLogxK

U2 - 10.1504/IJSTM.2017.081875

DO - 10.1504/IJSTM.2017.081875

M3 - Article

VL - 23

SP - 40

EP - 51

JO - International Journal of Services, Technology and Management

JF - International Journal of Services, Technology and Management

SN - 1460-6720

IS - 1-2

ER -