{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T02:11:46Z","timestamp":1773454306357,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In an Internet of Things (IoT) system based on an anything as a service (XaaS) architecture, data are uploaded from heterogeneous nodes in a nonstandardized format and aggregated on the server side. Within this data-intensive architecture, privacy preservation is one of the most important issues. In response to this concern, there are numerous privacy-protection data aggregation (PPDA) solutions available for various IoT applications. Because of the limited resources of intelligent IoT devices, traditional PPDA cannot meet practical privacy and performance needs. To tackle this challenge, we provide a more efficient and secure PPDA solution that guarantees data security and integrity through Paillier homomorphic encryption and online\/offline signing technology. Detailed security analysis shows that our system is unpredictable under a chosen message attack, and the data integrity may be guaranteed under the assumption of q-strong Diffie-Hellman (Q-SDH). We choose an M\/G\/1 priority queue model to maximize system performance. M\/G\/1 enhances queuing efficiency and accelerates channel access, thus reducing waiting time and increasing reliability. The experimental results show that our data aggregation scheme is reliable with low latency.<\/jats:p>","DOI":"10.1186\/s13677-022-00295-5","type":"journal-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T12:12:11Z","timestamp":1658837531000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture"],"prefix":"10.1186","volume":"11","author":[{"given":"Quan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Liangshun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Congshi","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,26]]},"reference":[{"key":"295_CR1","unstructured":"Bonomi F, Addepalli R (2018) Fog computing and its role in the internet of things. ACM. https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2342509.2342513"},{"key":"295_CR2","doi-asserted-by":"crossref","unstructured":"Fredj SB, Boussard M, Kofman D, Noirie L (2013) A scalable IoT service search based on clustering and aggregation. In: IEEE international conference on green computing & communications & IEEE internet of things & IEEE cyber. IEEE Computer Society.\u00a0https:\/\/ieeexplore.ieee.org\/abstract\/document\/6682100","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.86"},{"key":"295_CR3","doi-asserted-by":"crossref","unstructured":"Fan T, Chen Y (2010) A scheme of data management in the internet of things. In: IEEE international conference on network infrastructure & digital content. IEEE.\u00a0https:\/\/ieeexplore.ieee.org\/abstract\/document\/5657908","DOI":"10.1109\/ICNIDC.2010.5657908"},{"issue":"5","key":"295_CR4","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Jie C, Quan Z, Li Y, Xu L (2016) Edge computing: vision and challenges. Internet Things J IEEE 3(5):637\u2013646","journal-title":"Internet Things J IEEE"},{"key":"295_CR5","doi-asserted-by":"crossref","unstructured":"Hattab G, Cabric D (2018) Performance analysis of uplink cellular IoT using different deployments of data aggregators. In: GLOBECOM 2018 - 2018 IEEE global communications conference. IEEE.\u00a0https:\/\/ieeexplore.ieee.org\/abstract\/document\/8647923","DOI":"10.1109\/GLOCOM.2018.8647923"},{"issue":"1","key":"295_CR6","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s10586-021-03387-0","volume":"25","author":"S Darzi","year":"2022","unstructured":"Darzi S, Akhbari B, Khodaiemehr H (2022) Lpm2da: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. Clust Comput 25(1):263\u2013278","journal-title":"Clust Comput"},{"issue":"99","key":"295_CR7","first-page":"1","volume":"PP","author":"Y Yang","year":"2022","unstructured":"Yang Y, Zhang L, Zhao Y, Choo K, Zhang Y (2022) Privacy-preserving aggregation-authentication scheme for safety warning system in fog-cloud based vanet. IEEE Trans Inf Forensics Secur PP(99):1\u20131","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"295_CR8","volume-title":"Privacy-friendly flexible iot health data processing with user-centric access control","author":"K Jastaniah","year":"2022","unstructured":"Jastaniah K, Zhang N, Mustafa MA (2022) Privacy-friendly flexible iot health data processing with user-centric access control"},{"key":"295_CR9","doi-asserted-by":"crossref","unstructured":"Bohli JM, Skarmeta A, Moreno MV, Dan G, Langendorfer P (2015) SMARTIE project: secure IoT data management for smart cities. In: 2015 international conference on recent advances in internet of things (RIoT). IEEE.\u00a0https:\/\/ieeexplore.ieee.org\/abstract\/document\/7104906","DOI":"10.1109\/RIOT.2015.7104906"},{"issue":"2","key":"295_CR10","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/JIOT.2013.2296516","volume":"1","author":"J Jin","year":"2014","unstructured":"Jin J, Gubbi J, Marusic S, Palaniswami M (2014) An information framework for creating a smart city through internet of things. IEEE Internet Things J 1(2):112\u2013121","journal-title":"IEEE Internet Things J"},{"key":"295_CR11","doi-asserted-by":"crossref","unstructured":"Khodadadi F, Calheiros RN, Buyya R (2015) A data-centric framework for development and deployment of internet of things applications in clouds. In: IEEE tenth international conference on intelligent sensors. IEEE.\u00a0https:\/\/ieeexplore.ieee.org\/abstract\/document\/7106952","DOI":"10.1109\/ISSNIP.2015.7106952"},{"key":"295_CR12","doi-asserted-by":"crossref","unstructured":"Fonseca J, Ferraz C, Gama K (2016) A policy-based coordination architecture for distributed complex event processing in the internet of things: doctoral symposium. In: The 10th ACM international conference. ACM.\u00a0https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2933267.2933431","DOI":"10.1145\/2933267.2933431"},{"key":"295_CR13","unstructured":"Chen Q, Ayong YE, Zhang Q, Huang C (2022) A new edge perturbation mechanism for privacy-preserving data collection in iot. Chin J Electron 32:1\u201312.\u00a0https:\/\/cje.ejournal.org.cn\/en\/article\/doi\/10.1049\/cje.2021.00.411"},{"key":"295_CR14","doi-asserted-by":"crossref","unstructured":"Luo W, Bai G (2011) Ensuring the data integrity in cloud data storage. In: 2011 IEEE international conference on cloud computing and intelligence systems. IEEE.\u00a0https:\/\/ieeexplore.ieee.org\/abstract\/document\/6045067","DOI":"10.1109\/CCIS.2011.6045067"},{"issue":"3","key":"295_CR15","doi-asserted-by":"publisher","first-page":"13","DOI":"10.23919\/JCC.2022.03.018","volume":"19","author":"J Wu","year":"2022","unstructured":"Wu J, Sheng X, Li G, Yu K, Liu J (2022) An efficient and secure aggregation encryption scheme in edge computing. China Commun 19(3):13","journal-title":"China Commun"},{"key":"295_CR16","doi-asserted-by":"crossref","unstructured":"Chen L, Fu S, Lin L (2022) Privacy-preserving swarm learning based on homomorphic encryption. In: International conference on algorithms and architectures for parallel processing. Springer, Cham.\u00a0https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-95391-1_32","DOI":"10.1007\/978-3-030-95391-1_32"},{"key":"295_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-5640-8_34","volume-title":"Ensuring privacy of data and mined results of data possessor in collaborative ARM","author":"D Dhinakaran","year":"2022","unstructured":"Dhinakaran D, Joe Prathap PM (2022) Ensuring privacy of data and mined results of data possessor in collaborative ARM"},{"key":"295_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686","volume-title":"HAIL: a high-availability and integrity layer for cloud storage","author":"KD Bowers","year":"2009","unstructured":"Bowers KD, Juels A, Oprea A (2009) HAIL: a high-availability and integrity layer for cloud storage"},{"issue":"7","key":"295_CR19","doi-asserted-by":"publisher","first-page":"4981","DOI":"10.1109\/TII.2021.3103547","volume":"18","author":"T Wang","year":"2022","unstructured":"Wang T, Yang Q, Shen X, Gadekallu TR, Wang W, Dev K (2022) A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Trans Industr Inform 18(7):4981\u20134989","journal-title":"IEEE Trans Industr Inform"},{"key":"295_CR20","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1504\/IJITST.2021.117414","volume":"11","author":"M Vashishtha","year":"2021","unstructured":"Vashishtha M, Chouksey P, Rajput D, Reddy S, Reddy P, Gadekallu T, Patel H (2021) Security and detection mechanism in IoT-based cloud computing using hybrid approach. Int J Internet Technol Secur Trans 11:436\u2013451","journal-title":"Int J Internet Technol Secur Trans"},{"key":"295_CR21","doi-asserted-by":"publisher","first-page":"2558","DOI":"10.1002\/spe.2797","volume":"51","author":"C Iwendi","year":"2021","unstructured":"Iwendi C, Maddikunta PKR, Gadekallu TR, Lakshmanna K, Bashir AK, Piran MJ (2021) A metaheuristic optimization approach for energy efficiency in the IoT networks. Softw Pract Exper 51:2558\u20132571","journal-title":"Softw Pract Exper"},{"key":"295_CR22","doi-asserted-by":"publisher","first-page":"28462","DOI":"10.1109\/ACCESS.2020.2968537","volume":"8","author":"C Iwendi","year":"2020","unstructured":"Iwendi C, Khan S, Anajemba JH, Bashir AK, Noor F (2020) Realizing an efficient IoMT-assisted patient diet recommendation system through machine learning model. IEEE Access 8:28462\u201328474","journal-title":"IEEE Access"},{"issue":"15","key":"295_CR23","doi-asserted-by":"publisher","first-page":"17373","DOI":"10.1109\/JSEN.2021.3080217","volume":"21","author":"S Ponnan","year":"2021","unstructured":"Ponnan S, Saravanan AK, Iwendi C, Ibeke E, Srivastava G (2021) An artificial intelligence-based quorum system for the improvement of the lifespan of sensor networks. IEEE Sensors J 21(15):17373\u201317385","journal-title":"IEEE Sensors J"},{"key":"295_CR24","doi-asserted-by":"crossref","unstructured":"Falk J, BJ\u00f6RK S (2000) Privacy and information integrity in wearable computing and ubiquitous computing. Iso\/iec Jtc1\/sc29\/wg11 Mpeg00\/n3705, La Baule, New York, p 177.\u00a0https:\/\/dl.acm.org\/doi\/abs\/10.1145\/633292.633390","DOI":"10.1145\/633292.633390"},{"issue":"9","key":"295_CR25","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/903893.903897","volume":"46","author":"RD Pietro","year":"2003","unstructured":"Pietro RD, Mancini LV (2003) Security and privacy issues of handheld and wearable wireless devices. Commun ACM 46(9):74\u201379","journal-title":"Commun ACM"},{"key":"295_CR26","doi-asserted-by":"crossref","unstructured":"Frikken KB, Joseph IV (2008) An efficient integrity-preserving scheme for hierarchical sensor aggregation. In: ACM conference on wireless network security. ACM.\u00a0https:\/\/dl.acm.org\/doi\/abs\/10.1145\/1352533.1352546","DOI":"10.1145\/1352533.1352546"},{"issue":"6","key":"295_CR27","doi-asserted-by":"publisher","first-page":"1774","DOI":"10.1109\/TNET.2012.2188540","volume":"20","author":"F Chen","year":"2012","unstructured":"Chen F, Liu AX (2012) Privacy- and integrity-preserving range queries in sensor networks. IEEE\/ACM Trans Networking 20(6):1774\u20131787","journal-title":"IEEE\/ACM Trans Networking"},{"key":"295_CR28","doi-asserted-by":"crossref","unstructured":"Yang J, He S, Lin Y, Lv Z (2015) Multimedia cloud transmission and storage system based on internet of things. Multimed Tools Appl 76:1\u201316. https:\/\/link.springer.com\/article\/10.1007\/s11042-015-2967-9","DOI":"10.1007\/s11042-015-2967-9"},{"issue":"4","key":"295_CR29","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"LD Xu","year":"2014","unstructured":"Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Industr Inform 10(4):2233\u20132243","journal-title":"IEEE Trans Industr Inform"},{"issue":"8","key":"295_CR30","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi AV, Buyya R (2016) Fog computing: helping the internet of things realize its potential. Computer 49(8):112\u2013116","journal-title":"Computer"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00295-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-022-00295-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00295-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T12:24:39Z","timestamp":1658838279000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-022-00295-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["295"],"URL":"https:\/\/doi.org\/10.1186\/s13677-022-00295-5","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,26]]},"assertion":[{"value":"13 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"20"}}