Authors:
Jan Hajny
1
;
Petr Dzurenda
1
;
Lukas Malina
1
and
Sara Ricci
2
Affiliations:
1
Department of Telecommunications, Brno University of Technology, Technicka 12, Brno and Czech Republic
;
2
Department of Mathematics and Computer Science, Universitat Rovira i Virgili, Avda. Paisos Catalans 26, Tarragona and Spain
Keyword(s):
Group Signatures, Anonymity, Privacy, Revocation, Identification, Efficiency.
Related
Ontology
Subjects/Areas/Topics:
Applied Cryptography
;
Cryptographic Techniques and Key Management
;
Data and Application Security and Privacy
;
Data Engineering
;
Data Integrity
;
Data Protection
;
Databases and Data Security
;
Information and Systems Security
;
Privacy
;
Privacy Enhancing Technologies
;
Security in Distributed Systems
;
Security Protocols
Abstract:
Data collection schemes are used for secure and reliable data transfer from multiple remote nodes to a central unit. With the increasing importance of smart meters in energy distribution, smart house installations and various sensor networks, the need for secure data collection schemes becomes very urgent. Such schemes must provide standard security features, such as confidentiality and authenticity of transferred data, as well as novel features, such as the strong protection of user’s privacy and identification of malicious users. In this paper, we provide the full cryptographic specification of a novel scheme for secure privacy-friendly data collection that is designed for computationally restricted user devices and supports all the security, privacy-protection and inspection features. Using the scheme, data can be anonymously collected from almost all types of devices, including simple sensors and smart meters. On the other side, malicious users can be efficiently identified and r
evoked. Furthermore, we provide the practical results of our implementation of the scheme on embedded devices, smart phones, smart cards, smart watches, computers and servers so that the efficiency can be thoroughly evaluated on various platforms.
(More)