An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems
Abstract
:1. Introduction
- low-speed data acquisition speed
- low data recognition rate
- effective utilization of resources
- delays in data queries using traditional methods
Paper Organization
2. Related Work
3. Secure Encryption Algorithm for SPI
3.1. SPI Analysis
- Public data resourcesPublic data resources refer to users’ information stored on servers not under their direct control, which can be accessed by other users through open channels and can be understood without users having strong professional knowledge. The cost of public data acquisition is relatively low, and it is a relatively low level of privacy security category [12]. Some common data and Web data information belong to public data, including personal credit information, e-mail addresses, browsing traffic, job categories and other similar information. This kind of data resources is mainly used by users themselves and others, and will not usually threaten users’ privacy. Users do not need to worry about the source of resources and data security, but only pay attention to the satisfaction of information and the utilization of attached resources.
- Private data resourcesPrivate data resources exist in the users’ own storage system, mainly for information that cannot be publicly obtained, involving SPI and potentially some relatively important business data and other non-public private data, which can be divided into personal account login account and password, user identity card information, electronic financial information, and individuals/business data, among others [13]. Private data need a high level of privacy and security. They cannot be acquired and utilized by people other than public administration departments. At the same time, external organizations cannot access this part of any resources.
- Mixed data resourcesMixed data resources are the collection of public data resources and private data resources. Through the network, data security can be balanced between public data resources and private data resources [14]. User’s private data resources are linked with public data resources to form a user’s mixed data resources. Specifically, it includes the personal account login account and password, user ID card information and personal credit information, mailbox address and other information in public information.
3.2. SPI Collection
3.3. Security Encryption Method of UPI
Algorithm 1: Encryption algorithm. |
Algorithm 2: Key expansion function. |
4. Experimental Results and Analysis
4.1. Experimental Setup
4.2. Analysis of Experimental Results
5. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Zhang, C.; Wang, B.; Li, W.; Huang, S.; Kong, L.; Li, Z.; Li, L. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption. Nat. Commun. 2017, 8, 1138. [Google Scholar] [CrossRef] [PubMed]
- Wang, X.; Li, W.; Li, W.; Gu, C.; Zheng, H.; Wang, Y.; Zhang, S.X.A. An RGB color-tunable turn-on electrofluorochromic device and its potential for information encryption. Chem. Commun. 2017, 53, 11209–11212. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Xiao, D.; Li, X.; Liu, S.J.; Wang, Q.H. Encryption and display of multiple-image information using computer-generated holography with modified GS iterative algorithm. Opt. Commun. 2018, 410, 488–495. [Google Scholar] [CrossRef]
- Lu, Y.; Zhu, M. Privacy preserving distributed optimization using homomorphic encryption. Automatica 2018, 96, 314–325. [Google Scholar] [CrossRef] [Green Version]
- Poh, G.S.; Chin, J.J.; Yau, W.C.; Choo, K.K.R.; Mohamad, M.S. Searchable symmetric encryption: Designs and challenges. ACM Comput. Surv. (CSUR) 2017, 50, 40. [Google Scholar] [CrossRef]
- Zhang, C.L.; Xiong, L.; Lu, L.C. Simulation of Double-Encrypted Reversible Concealment Algorithm for Real-time Network Information. Comput. Simul. 2018, 35, 201–204+268. (In Chinese) [Google Scholar]
- Solomon, M.; Elias, E.P. Privacy Protection for Wireless Medical Sensor Data. Int. J. Sci. Res. Sci. Technol. 2018, 4, 1439–1440. [Google Scholar]
- Zhang, K.; Douros, K.; Li, H.; Li, H.; Wei, Y. Systems and Methods for Pressure-Based Authentication of an Input on a Touch Screen. U.S. Patent 8,988,191, 24 March 2015. [Google Scholar]
- Qian, J.; Qiu, F.; Wu, F. Privacy-Preserving Selective Aggregation of Online User Behavior Data. IEEE Trans. Comput. 2016, 66, 326–338. [Google Scholar] [CrossRef]
- Zhang, H.T.; Zhu, Y.H.; Huo, X.Y. User privacy protection method based on dynamic hiding of sensitive items. Appl. Res. Comput. 2017, 34, 3740–3744. [Google Scholar]
- Zhu, L.N. Research on Encryption Simulation of Private Information Acquisition Process over Mobile Internet. Comput. Simul. 2018, 8, 156–159. [Google Scholar]
- Chen, Y.R.; Rezapour, A.; Tzeng, W.G. Privacy-preserving ridge regression on distributed data. Inf. Sci. 2018, 451, 34–49. [Google Scholar] [CrossRef]
- Grice, W.P.; Evans, P.G.; Lawrie, B.; Legre, M.; Lougovski, P.; Ray, W.; Williams, B.P.; Qi, B.; Smith, A.M. Two-party secret key distribution via a modified quantum secret sharing protocol. Opt. Express 2015, 23, 7300–7311. [Google Scholar] [CrossRef] [PubMed]
- Quan, L.-X. Storage Method and Implementation of Education Resource Ontology in a Relational Database. J. Langfang Teach. Univ. (Nat. Sci. Ed.) 2016, 2, 3. [Google Scholar]
- Liu, S.; Pan, Z.; Cheng, X. A Novel Fast Fractal Image Compression Method based on Distance Clustering in High Dimensional Sphere Surface. Fractals 2017, 25, 1740004. [Google Scholar] [CrossRef]
- Dou, Y.; Chan, H.C.; Au, M.H. A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud. IEEE Trans. Parallel Distrib. Syst. 2018, 30, 1208–1221. [Google Scholar] [CrossRef]
- Luo, Z.Y.; Shi, R.H.; Xu, M.; Zhang, S. A novel quantum solution to privacy-preserving nearest neighbor query in location-based services. Int. J. Theor. Phys. 2018, 57, 1049–1059. [Google Scholar] [CrossRef]
- Wang, L.; Zhang, Z.; Dong, M.; Wang, L.; Cao, Z.; Yang, Y. Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Commun. Mag. 2018, 56, 76–81. [Google Scholar] [CrossRef]
- Aminifar, A.; Eles, P.; Peng, Z. Optimization of Message Encryption for Real-Time Applications in Embedded Systems. IEEE Trans. Comput. 2017, 67, 748–754. [Google Scholar] [CrossRef] [Green Version]
- Gao, C.Z.; Cheng, Q.; He, P.; Susilo, W.; Li, J. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Inf. Sci. 2018, 444, 72–88. [Google Scholar] [CrossRef]
- Xia, Y.; Chen, W.; Liu, X.; Zhang, L.; Li, X.; Xiang, Y. Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2629–2641. [Google Scholar] [CrossRef]
- Dwivedi, A.D.; Morawiecki, P.; Srivastava, G. Differential cryptanalysis of round-reduced speck suitable for internet of things devices. IEEE Access 2019, 7, 16476–16486. [Google Scholar] [CrossRef]
- Bryce, R.; Shaw, T.; Srivastava, G. Mqtt-g: A publish/subscribe protocol with geolocation. In Proceedings of the 2018 41st International Conference on Telecommunications and Signal Processing (TSP), Athens, Greece, 4–6 July 2018; pp. 1–4. [Google Scholar]
- Dwivedi, A.D.; Dhar, S.; Srivastava, G.; Singh, R. Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM. Cryptography 2019, 3, 4. [Google Scholar] [CrossRef]
- Srivastava, G.; Fisher, A.; Bryce, R.; Crichigno, J. Green Communication Protocol with Geolocation. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–6. [Google Scholar]
- Malina, L.; Srivastava, G.; Dzurenda, P.; Hajny, J.; Fujdiak, R. A Secure Publish/Subscribe Protocol for Internet of Things. In Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, 26–29 August 2019. [Google Scholar]
- Yao, Z.; Ge, J.; Wu, Y.; Jian, L. A privacy preserved and credible network protocol. J. Parallel Distrib. Comput. 2019, 132, 150–159. [Google Scholar] [CrossRef]
- Ma, Y.; Wu, Y.; Li, J.; Ge, J. APCN: A Scalable Architecture for Balancing Accountability and Privacy in Large-scale Content-based Networks. Inf. Sci. 2019, 484, 27–43. [Google Scholar] [CrossRef]
- Zhou, R.; Zhang, X.; Wang, X.; Yang, G.; Wang, H.; Wu, Y. Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things. Inf. Sci. 2019, 491, 251–264. [Google Scholar] [CrossRef]
- Tian, Y.; Guo, J.; Wu, Y.; Lin, H. Towards Attack and Defense Views of Rational Delegation of Computation. IEEE Access 2019, 7, 44037–44049. [Google Scholar] [CrossRef]
- Google Search Datasets. Available online: https://developers.google.com/search/docs/data-types/dataset (accessed on 11 September 2019).
- Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M.; Srivastava, G. Security Aspects of Internet of Things aided Smart Grids: A Bibliometric Survey. Internet Things 2019, 100111. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhu, X.; Srivastava, G.; M. Parizi, R. An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems. Electronics 2019, 8, 1220. https://doi.org/10.3390/electronics8111220
Zhu X, Srivastava G, M. Parizi R. An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems. Electronics. 2019; 8(11):1220. https://doi.org/10.3390/electronics8111220
Chicago/Turabian StyleZhu, Xiaogang, Gautam Srivastava, and Reza M. Parizi. 2019. "An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems" Electronics 8, no. 11: 1220. https://doi.org/10.3390/electronics8111220
APA StyleZhu, X., Srivastava, G., & M. Parizi, R. (2019). An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems. Electronics, 8(11), 1220. https://doi.org/10.3390/electronics8111220