Proceedings of International Conference on Applied Innovation in IT
2025/07/26, Volume 13, Issue 3, pp.115-122

Secure and Privacy-Enhanced Data Aggregation for IoT Using Fog Computing


Andi Bahrun, La Oge, Ahmed Zeyad Almhanna and Mohammed Abdul Jaleel Maktoof


Abstract: As the Internet of Things (IoT) expands rapidly, securing sensitive data has become increasingly complex, especially in environments with limited resources and strict latency requirements. By facilitating data processing at the network edge, fog computing minimizes delays and reduces bandwidth consumption. In this paper, we present APPA, which is a method for anonymizing and aggregating Fog-enabled IoT data in a privacy-preserving manner. The APPA provides IoT devices with the ability to choose between privacy-preserving and standard encryption methods based on their privacy preferences and eliminates the need to rely on trusted third parties. As a result of utilizing the Paillier and Bilinear Elagamal’s homomorphic encryption algorithms, the scheme is able to aggregate secure subsets, enable fault-tolerant decryption, and allow dynamic device enrolment and revocation. According to performance evaluations, APPA is significantly more efficient and has a lower communication overhead than existing solutions, thus making it a good choice for scalable and privacy-conscious IoT applications.

Keywords: Privacy-Preserving Data Aggregation, Fog Computing, IoT Security, Homomorphic Encryption, Subset Aggregation.

DOI: Under Indexing

Download: PDF

References:

  1. A. Singh et al., "Blockchain-Based Lightweight Authentication Protocol for Next-Generation Trustworthy Internet of Vehicles Communication," IEEE Transactions on Consumer Electronics, vol. 70, no. 2, pp. 4898-4907, May 2024, [Online]. Available: https://doi.org/10.1109/TCE.2024.3351221.
  2. B. Bhola et al., "Quality-enabled decentralized dynamic IoT platform with scalable resources integration," IET Communications, 2022.
  3. P. Rani, P. N. Singh, S. Verma, N. Ali, P. K. Shukla, and M. Alhassan, "An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment," Wireless Communications and Mobile Computing, vol. 2022, pp. 1-14, 2022.
  4. Y. A. Qadri, A. Nauman, Y. B. Zikria, A. V. Vasilakos, and S. W. Kim, "The Future of Healthcare Internet of Things: A Survey of Emerging Technologies," IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1121-1167, 2020, [Online]. Available: https://doi.org/10.1109/COMST.2020.2973314.
  5. W. Wang, H. Xu, M. Alazab, T. R. Gadekallu, Z. Han, and C. Su, "Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices," IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7059-7067, Oct. 2022, [Online]. Available: https://doi.org/10.1109/TII.2021.3084753.
  6. L. Zhang, M. Peng, W. Wang, Z. Jin, Y. Su, and H. Chen, "Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing," Transactions on Emerging Telecommunications Technologies, vol. 32, no. 10, p. e4315, Oct. 2021, [Online]. Available: https://doi.org/10.1002/ett.4315.
  7. P. Rani et al., "Federated Learning-Based Misbehavior Detection for the 5G-Enabled Internet of Vehicles," IEEE Transactions on Consumer Electronics, vol. 70, no. 2, pp. 4656-4664, May 2024, [Online]. Available: https://doi.org/10.1109/TCE.2023.3328020.
  8. L. Zhou, C. Ge, S. Hu, and C. Su, "Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 3948-3957, May 2020, [Online]. Available: https://doi.org/10.1109/JIOT.2019.2959094.
  9. C.-I. Fan, S.-Y. Huang, and Y.-L. Lai, "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid," IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 666-675, Feb. 2014, [Online]. Available: https://doi.org/10.1109/TII.2013.2277938.
  10. N. Hussain and P. Rani, "Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security," in Distributed Artificial Intelligence, CRC Press, 2020, pp. 217-236.
  11. Y.-N. Liu, Y.-P. Wang, X.-F. Wang, Z. Xia, and J.-F. Xu, "Privacy-preserving raw data collection without a trusted authority for IoT," Computer Networks, vol. 148, pp. 340-348, Jan. 2019, [Online]. Available: https://doi.org/10.1016/j.comnet.2018.11.028.
  12. N. Kumar Agrawal et al., "TFL-IHOA: Three-Layer Federated Learning-Based Intelligent Hybrid Optimization Algorithm for Internet of Vehicle," IEEE Transactions on Consumer Electronics, vol. 70, no. 3, pp. 5818-5828, Aug. 2024, [Online]. Available: https://doi.org/10.1109/TCE.2023.3344129.
  13. J. Song, Y. Liu, J. Shao, and C. Tang, "A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid," IEEE Systems Journal, vol. 14, no. 1, pp. 900-908, Mar. 2020, [Online]. Available: https://doi.org/10.1109/JSYST.2019.2912415.
  14. A. Da Veiga and J. Ophoff, "Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa," in Human Aspects of Information Security and Assurance, N. Clarke and S. Furnell, Eds., IFIP Advances in Information and Communication Technology, vol. 593, Cham: Springer International Publishing, 2020, pp. 16-29, [Online]. Available: https://doi.org/10.1007/978-3-030-57404-8_2.
  15. P. Rani, S. P. Yadav, P. N. Singh, and M. Almusawi, "Real-World Case Studies: Transforming Mental Healthcare With Natural Language Processing," in Demystifying the Role of Natural Language Processing (NLP) in Mental Health, A. Mishra, S. P. Yadav, M. Kumar, S. M. Biju, and G. C. Deka, Eds., IGI Global, 2025, pp. 303-324, [Online]. Available: https://doi.org/10.4018/979-8-3693-4203-9.ch016.
  16. L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, Oct. 2002, [Online]. Available: https://doi.org/10.1142/S0218488502001648.
  17. N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity," in 2007 IEEE 23rd International Conference on Data Engineering, Istanbul: IEEE, Apr. 2007, pp. 106-115, [Online]. Available: https://doi.org/10.1109/ICDE.2007.367856.
  18. A. Singh et al., "Resilient Wireless Sensor Networks in Industrial Contexts via Energy-Efficient Optimization and Trust-Based Secure Routing," Peer-to-Peer Networking and Applications, vol. 18, no. 3, p. 132, Jun. 2025, [Online]. Available: https://doi.org/10.1007/s12083-025-01946-5.
  19. P. Rani and M. H. Falaah, "Real-Time Congestion Control and Load Optimization in Cloud-MANETs Using Predictive Algorithms," NJF Intelligent Engineering Journal, vol. 1, no. 1, pp. 66-76, 2024.
  20. R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT," IEEE Access, vol. 5, pp. 3302-3312, 2017, [Online]. Available: https://doi.org/10.1109/ACCESS.2017.2677520.
  21. H. Mahdikhani, S. Mahdavifar, R. Lu, H. Zhu, and A. A. Ghorbani, "Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT," IEEE Access, vol. 7, pp. 184438-184447, 2019, [Online]. Available: https://doi.org/10.1109/ACCESS.2019.2961270.
  22. J. K. Singh and A. K. Goel, "Study on fog computing: security & privacy challenges in terms of IoT," Journal of Physics: Conference Series, vol. 2007, no. 1, p. 012039, Aug. 2021, [Online]. Available: https://doi.org/10.1088/1742-6596/2007/1/012039.
  23. A. Saleem et al., "FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network," IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6132-6142, Jul. 2020, [Online]. Available: https://doi.org/10.1109/JIOT.2019.2957314.
  24. M. Manicka Raja and S. Manoj Kumar, "Aggregated PSO for Secure Data Transmission in WSN Using Fog Server," Intelligent Automation & Soft Computing, vol. 34, no. 2, pp. 1017-1032, 2022, [Online]. Available: https://doi.org/10.32604/iasc.2022.025665.
  25. I. Abunadi, A. Rehman, K. Haseeb, L. Parra, and J. Lloret, "Traffic-Aware Secured Cooperative Framework for IoT-Based Smart Monitoring in Precision Agriculture," Sensors, vol. 22, no. 17, p. 6676, Sep. 2022, [Online]. Available: https://doi.org/10.3390/s22176676.
  26. R. Lu, K. Alharbi, X. Lin, and C. Huang, "A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications," in 2015 IEEE Global Communications Conference (GLOBECOM), IEEE, 2015, pp. 1-6, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7417029/.
  27. P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Advances in Cryptology — EUROCRYPT ’99, J. Stern, Ed., Lecture Notes in Computer Science, vol. 1592, Berlin, Heidelberg: Springer, 1999, pp. 223-238, [Online]. Available: https://doi.org/10.1007/3-540-48910-X_16.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - Paper Submission to Conference
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 3 (ICAIIT 2025)
       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.