| 
 Proceedings of International Conference on Applied Innovation in IT
 2025/07/26, Volume 13, Issue 3, pp.115-122
 
 Secure and Privacy-Enhanced Data Aggregation for IoT Using Fog Computing
 Andi Bahrun, La Oge, Ahmed Zeyad Almhanna and Mohammed Abdul Jaleel MaktoofAbstract: As the Internet of Things (IoT) expands rapidly, securing sensitive data has become increasingly complex, especially in environments with limited resources and strict latency requirements. By facilitating data processing at the network edge, fog computing minimizes delays and reduces bandwidth consumption. In this paper, we present APPA, which is a method for anonymizing and aggregating Fog-enabled IoT data in a privacy-preserving manner. The APPA provides IoT devices with the ability to choose between privacy-preserving and standard encryption methods based on their privacy preferences and eliminates the need to rely on trusted third parties. As a result of utilizing the Paillier and Bilinear Elagamal’s homomorphic encryption algorithms, the scheme is able to aggregate secure subsets, enable fault-tolerant decryption, and allow dynamic device enrolment and revocation. According to performance evaluations, APPA is significantly more efficient and has a lower communication overhead than existing solutions, thus making it a good choice for scalable and privacy-conscious IoT applications.
 
 Keywords: Privacy-Preserving Data Aggregation, Fog Computing, IoT Security, Homomorphic Encryption, Subset Aggregation.
 
 DOI: Under Indexing
 
 Download: PDF
 
 
 References:
A. Singh et al., "Blockchain-Based Lightweight Authentication Protocol for Next-Generation Trustworthy Internet of Vehicles Communication," IEEE Transactions on Consumer Electronics, vol. 70, no. 2, pp. 4898-4907, May 2024, [Online]. Available: https://doi.org/10.1109/TCE.2024.3351221.
B. Bhola et al., "Quality-enabled decentralized dynamic IoT platform with scalable resources integration," IET Communications, 2022.
P. Rani, P. N. Singh, S. Verma, N. Ali, P. K. Shukla, and M. Alhassan, "An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment," Wireless Communications and Mobile Computing, vol. 2022, pp. 1-14, 2022.
Y. A. Qadri, A. Nauman, Y. B. Zikria, A. V. Vasilakos, and S. W. Kim, "The Future of Healthcare Internet of Things: A Survey of Emerging Technologies," IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1121-1167, 2020, [Online]. Available: https://doi.org/10.1109/COMST.2020.2973314.
W. Wang, H. Xu, M. Alazab, T. R. Gadekallu, Z. Han, and C. Su, "Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices," IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7059-7067, Oct. 2022, [Online]. Available: https://doi.org/10.1109/TII.2021.3084753.
L. Zhang, M. Peng, W. Wang, Z. Jin, Y. Su, and H. Chen, "Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing," Transactions on Emerging Telecommunications Technologies, vol. 32, no. 10, p. e4315, Oct. 2021, [Online]. Available: https://doi.org/10.1002/ett.4315.
P. Rani et al., "Federated Learning-Based Misbehavior Detection for the 5G-Enabled Internet of Vehicles," IEEE Transactions on Consumer Electronics, vol. 70, no. 2, pp. 4656-4664, May 2024, [Online]. Available: https://doi.org/10.1109/TCE.2023.3328020.
L. Zhou, C. Ge, S. Hu, and C. Su, "Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks," IEEE Internet of Things Journal, vol. 7, no. 5, pp. 3948-3957, May 2020, [Online]. Available: https://doi.org/10.1109/JIOT.2019.2959094.
C.-I. Fan, S.-Y. Huang, and Y.-L. Lai, "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid," IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 666-675, Feb. 2014, [Online]. Available: https://doi.org/10.1109/TII.2013.2277938.
N. Hussain and P. Rani, "Comparative studied based on attack resilient and efficient protocol with intrusion detection system based on deep neural network for vehicular system security," in Distributed Artificial Intelligence, CRC Press, 2020, pp. 217-236.
Y.-N. Liu, Y.-P. Wang, X.-F. Wang, Z. Xia, and J.-F. Xu, "Privacy-preserving raw data collection without a trusted authority for IoT," Computer Networks, vol. 148, pp. 340-348, Jan. 2019, [Online]. Available: https://doi.org/10.1016/j.comnet.2018.11.028.
N. Kumar Agrawal et al., "TFL-IHOA: Three-Layer Federated Learning-Based Intelligent Hybrid Optimization Algorithm for Internet of Vehicle," IEEE Transactions on Consumer Electronics, vol. 70, no. 3, pp. 5818-5828, Aug. 2024, [Online]. Available: https://doi.org/10.1109/TCE.2023.3344129.
J. Song, Y. Liu, J. Shao, and C. Tang, "A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid," IEEE Systems Journal, vol. 14, no. 1, pp. 900-908, Mar. 2020, [Online]. Available: https://doi.org/10.1109/JSYST.2019.2912415.
A. Da Veiga and J. Ophoff, "Concern for Information Privacy: A Cross-Nation Study of the United Kingdom and South Africa," in Human Aspects of Information Security and Assurance, N. Clarke and S. Furnell, Eds., IFIP Advances in Information and Communication Technology, vol. 593, Cham: Springer International Publishing, 2020, pp. 16-29, [Online]. Available: https://doi.org/10.1007/978-3-030-57404-8_2.
P. Rani, S. P. Yadav, P. N. Singh, and M. Almusawi, "Real-World Case Studies: Transforming Mental Healthcare With Natural Language Processing," in Demystifying the Role of Natural Language Processing (NLP) in Mental Health, A. Mishra, S. P. Yadav, M. Kumar, S. M. Biju, and G. C. Deka, Eds., IGI Global, 2025, pp. 303-324, [Online]. Available: https://doi.org/10.4018/979-8-3693-4203-9.ch016.
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, Oct. 2002, [Online]. Available: https://doi.org/10.1142/S0218488502001648.
N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy Beyond k-Anonymity and l-Diversity," in 2007 IEEE 23rd International Conference on Data Engineering, Istanbul: IEEE, Apr. 2007, pp. 106-115, [Online]. Available: https://doi.org/10.1109/ICDE.2007.367856.
A. Singh et al., "Resilient Wireless Sensor Networks in Industrial Contexts via Energy-Efficient Optimization and Trust-Based Secure Routing," Peer-to-Peer Networking and Applications, vol. 18, no. 3, p. 132, Jun. 2025, [Online]. Available: https://doi.org/10.1007/s12083-025-01946-5.
P. Rani and M. H. Falaah, "Real-Time Congestion Control and Load Optimization in Cloud-MANETs Using Predictive Algorithms," NJF Intelligent Engineering Journal, vol. 1, no. 1, pp. 66-76, 2024.
R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, "A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT," IEEE Access, vol. 5, pp. 3302-3312, 2017, [Online]. Available: https://doi.org/10.1109/ACCESS.2017.2677520.
H. Mahdikhani, S. Mahdavifar, R. Lu, H. Zhu, and A. A. Ghorbani, "Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT," IEEE Access, vol. 7, pp. 184438-184447, 2019, [Online]. Available: https://doi.org/10.1109/ACCESS.2019.2961270.
J. K. Singh and A. K. Goel, "Study on fog computing: security & privacy challenges in terms of IoT," Journal of Physics: Conference Series, vol. 2007, no. 1, p. 012039, Aug. 2021, [Online]. Available: https://doi.org/10.1088/1742-6596/2007/1/012039.
A. Saleem et al., "FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network," IEEE Internet of Things Journal, vol. 7, no. 7, pp. 6132-6142, Jul. 2020, [Online]. Available: https://doi.org/10.1109/JIOT.2019.2957314.
M. Manicka Raja and S. Manoj Kumar, "Aggregated PSO for Secure Data Transmission in WSN Using Fog Server," Intelligent Automation & Soft Computing, vol. 34, no. 2, pp. 1017-1032, 2022, [Online]. Available: https://doi.org/10.32604/iasc.2022.025665.
I. Abunadi, A. Rehman, K. Haseeb, L. Parra, and J. Lloret, "Traffic-Aware Secured Cooperative Framework for IoT-Based Smart Monitoring in Precision Agriculture," Sensors, vol. 22, no. 17, p. 6676, Sep. 2022, [Online]. Available: https://doi.org/10.3390/s22176676.
R. Lu, K. Alharbi, X. Lin, and C. Huang, "A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications," in 2015 IEEE Global Communications Conference (GLOBECOM), IEEE, 2015, pp. 1-6, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7417029/.
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Advances in Cryptology — EUROCRYPT ’99, J. Stern, Ed., Lecture Notes in Computer Science, vol. 1592, Berlin, Heidelberg: Springer, 1999, pp. 223-238, [Online]. Available: https://doi.org/10.1007/3-540-48910-X_16.
 |  
	
		|  
  
			    HOME 
			- Conference - Journal
 - Paper Submission to Journal
 - Paper Submission to Conference
 - For Authors
 - For Reviewers
 - Important Dates
 - Conference Committee
 - Editorial Board
 - Reviewers
 - Last Proceedings
 
			-
            Volume 13, Issue 3 (ICAIIT 2025) PROCEEDINGS
 -
            Volume 13, Issue 2 (ICAIIT 2025)
 -
            Volume 13, Issue 1 (ICAIIT 2025)
 -
            Volume 12, Issue 2 (ICAIIT 2024)
 -
            Volume 12, Issue 1 (ICAIIT 2024)
 -
            Volume 11, Issue 2 (ICAIIT 2023)
 -
            Volume 11, Issue 1 (ICAIIT 2023)
 -
            Volume 10, Issue 1 (ICAIIT 2022)
 -
            Volume 9, Issue 1 (ICAIIT 2021)
 -
            Volume 8, Issue 1 (ICAIIT 2020)
 -
            Volume 7, Issue 1 (ICAIIT 2019)
 -
            Volume 7, Issue 2 (ICAIIT 2019)
 -
            Volume 6, Issue 1 (ICAIIT 2018)
 -
            Volume 5, Issue 1 (ICAIIT 2017)
 -
            Volume 4, Issue 1 (ICAIIT 2016)
 -
			Volume 3, Issue 1 (ICAIIT 2015)
 -
			Volume 2, Issue 1 (ICAIIT 2014)
 -
			Volume 1, Issue 1 (ICAIIT 2013)
 
			ICAIIT 2025 PAST CONFERENCES
 -
			Photos
 -
			Reports
 
 ICAIIT 2024
 -
			Photos
 -
			Reports
 
 ICAIIT 2023
 -
			Photos
 -
			Reports
 
 ICAIIT 2021
 -
			Photos
 -
			Reports
 
 ICAIIT 2020
 -
			Photos
 -
			Reports
 
 ICAIIT 2019
 -
			Photos
 -
			Reports
 
 ICAIIT 2018
 -
			Photos
 -
			Reports
   
			    ETHICS IN PUBLICATIONS
 ACCOMODATION
   
			    CONTACT US   |  |