Privacy-preserving and verifiable multi-task data aggregation for IoT-based healthcare

The combination of mobile crowdsensing (MCS) and IoT-based healthcare introduces innovative solutions for collecting health data. The considerable accumulation of health data through MCS expedites advancements in medical research and disease prediction, giving rise to privacy considerations. Data ag...

Full description

Saved in:
Bibliographic Details
Published inJournal of information security and applications Vol. 89; p. 103977
Main Authors Zhang, Xinzhe, Wu, Lei, Xu, Lijuan, Liu, Zhien, Su, Ye, Wang, Hao, Meng, Weizhi
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.03.2025
Subjects
Online AccessGet full text
ISSN2214-2126
DOI10.1016/j.jisa.2025.103977

Cover

More Information
Summary:The combination of mobile crowdsensing (MCS) and IoT-based healthcare introduces innovative solutions for collecting health data. The considerable accumulation of health data through MCS expedites advancements in medical research and disease prediction, giving rise to privacy considerations. Data aggregation emerges as a salient solution that facilitates the provision of aggregated statistics while obfuscating raw personal data. However, prevailing aggregation schemes primarily pivot around single-task or multi-dimensional data aggregation, rarely contemplating the multi-task aggregation scenarios. Furthermore, in some schemes that implement multi-tasking, protection of task contents and verifiability of aggregation results are not achieved. Therefore, we propose a specialized data aggregation scheme for multi-task scenarios on fog computing. Initially, we employ a symmetric cryptographic algorithm to encrypt task contents and distribute the corresponding symmetric keys through a key management scheme based on the Chinese Remainder Theorem (CRT). Subsequently, we utilize blinding techniques to encrypt the raw data of users, ensuring efficient data aggregation. To enhance resilience against adversarial tampering with aggregated data, we employ the Pedersen commitment scheme to achieve the verifiability of task aggregation results. Finally, theoretical analyses and experimental evaluations collectively demonstrate the security and effectiveness of our proposed scheme.
ISSN:2214-2126
DOI:10.1016/j.jisa.2025.103977