Please use this identifier to cite or link to this item:
https://ir.swu.ac.th/jspui/handle/123456789/29087
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tanabodee N. | |
dc.contributor.author | Suksomboon K. | |
dc.contributor.author | Issariyapat C. | |
dc.contributor.author | Mongkolluksamee S. | |
dc.contributor.author | Niruntasukrat A. | |
dc.contributor.author | Tansangworn N. | |
dc.contributor.author | Kitisin S. | |
dc.contributor.other | Srinakharinwirot University | |
dc.date.accessioned | 2023-11-15T01:54:30Z | - |
dc.date.available | 2023-11-15T01:54:30Z | - |
dc.date.issued | 2022 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85145581454&doi=10.1145%2f3570748.3570752&partnerID=40&md5=64674c8438f225511b4d3ab78bfacec2 | |
dc.identifier.uri | https://ir.swu.ac.th/jspui/handle/123456789/29087 | - |
dc.description.abstract | The emergence of privacy breaches in IoT surges demands for embedding privacy-by-design into IoT systems. Decades of work on privacy-enhancing technologies have resulted in myriad ways to secure outsourcing computation with homomorphic encryption (HE) that allows the third party (e.g., cloud) computes over encrypted data. All of them are still yet far away from the rapid development of practical privacy-preserving IoT systems. Abstraction and flexibility in development are keys to accelerating privacy-preserving IoT deployment. Nevertheless, HE tools and compilers are primarily written in low-level languages like C++, posing a high entry barrier to IoT developers. This paper proposes CipherFlow, the HE node extension for Node-RED, a visually and flexibly programmable dataflow tool for rapid IoT development. CipherFlow offers three pipeline abstractions: 1) a playground of drag-and-drop HE nodes in Node-RED, 2) arithmetic operators, and 3) optimal parameter setting guidelines. As a result, IoT developers can create and verify their secured computing functions on data flows. We demonstrate the applicability and effectiveness of CipherFlow through the performance evaluation. Furthermore, our evaluation shows the performance and security trade-off depending on the HE parameters. © 2022 ACM. | |
dc.publisher | Association for Computing Machinery | |
dc.subject | homomorphic encryption | |
dc.subject | IoT | |
dc.subject | Node-RED | |
dc.subject | Privacy | |
dc.subject | homomorphic encryption | |
dc.subject | IoT | |
dc.subject | Node-RED | |
dc.subject | Privacy | |
dc.title | CipherFlow: A Playground for Developing Privacy-Preserving IoT in Node-RED | |
dc.type | Conference paper | |
dc.rights.holder | Scopus | |
dc.identifier.bibliograpycitation | ACM International Conference Proceeding Series. Vol , No. (2022), p.18-25 | |
dc.identifier.doi | 10.1145/3570748.3570752 | |
Appears in Collections: | Scopus 2022 |
Files in This Item:
There are no files associated with this item.
Items in SWU repository are protected by copyright, with all rights reserved, unless otherwise indicated.