Journal of Xidian University ›› 2023, Vol. 50 ›› Issue (4): 45-53.doi: 10.19665/j.issn1001-2400.2023.04.005

• Special Issue on Cyberspace Security • Previous Articles     Next Articles

Privacy-preserving internet of things data filtering scheme

ZHOU Rang1(),ZHANG Xiaosong2,3(),WANG Xiaofen2(),LI Dongfen1(),CHEN Tao2(),ZHANG Xiaojun4()   

  1. 1. College of Computer Science and Cyber Security,Chengdu University of Technology,Chengdu 610059,China
    2. School of Computer Science and Engineering,University of Electronic Science and Technology of China, Chengdu 611731,China
    3. Cyberspace Security Research Center,Peng Cheng Laboratory,Shenzhen 518055,China
    4. School of Computer Science,Southwest Petroleum University,Chengdu 610500,China
  • Received:2023-01-12 Online:2023-08-20 Published:2023-10-17
  • Contact: Xiaofen WANG;;;;;


With the development of industry 5.0,the operational data need to be collected and uploaded in real time in the practical Internet of Things (IoT).To describe and analyze the working state of the IoT more precisely,high accurate and real-time data are required.Then,in practical applications,many different types of IoT data are stored together without classifying,which could reduce the efficiency of data analysis.In order to improve the efficiency of data analysis in the hybrid data storage environment,it is necessary to use the method of data shunting in the process of data upload to realize the classified storage of data.However,the traditional data shunting method shunts the plaintext data according to its source identity,during which the source information on the plaintext data will leak the identity and privacy of the IoT devices.Therefore,how to realize the classified storage of these IoT data through the data shunting without revealing the privacy has become an urgent problem to be solved in the security management of the IoT data.In this paper,a new privacy-preserving IoT data filtering scheme is proposed.On the basis of maintaining the context and device identity privacy,each data filtering rule is set by a filtering trapdoor,which is computed from the identity of the data source device.Then,the data can be classified and routed by the relay nodes following the given rules in the data uploading phase,from which the heterologous data can be classified and the homologous data are stored together,which can help further data access control and data analysis.Experiment results show that our scheme is efficient and practical.

Key words: Internet of Things, data filtering, filtering trapdoor, filtering index, device identity privacy

CLC Number: 

  • TP309