Please use this identifier to cite or link to this item: https://ir.swu.ac.th/jspui/handle/123456789/29087
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTanabodee N.
dc.contributor.authorSuksomboon K.
dc.contributor.authorIssariyapat C.
dc.contributor.authorMongkolluksamee S.
dc.contributor.authorNiruntasukrat A.
dc.contributor.authorTansangworn N.
dc.contributor.authorKitisin S.
dc.contributor.otherSrinakharinwirot University
dc.date.accessioned2023-11-15T01:54:30Z-
dc.date.available2023-11-15T01:54:30Z-
dc.date.issued2022
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85145581454&doi=10.1145%2f3570748.3570752&partnerID=40&md5=64674c8438f225511b4d3ab78bfacec2
dc.identifier.urihttps://ir.swu.ac.th/jspui/handle/123456789/29087-
dc.description.abstractThe emergence of privacy breaches in IoT surges demands for embedding privacy-by-design into IoT systems. Decades of work on privacy-enhancing technologies have resulted in myriad ways to secure outsourcing computation with homomorphic encryption (HE) that allows the third party (e.g., cloud) computes over encrypted data. All of them are still yet far away from the rapid development of practical privacy-preserving IoT systems. Abstraction and flexibility in development are keys to accelerating privacy-preserving IoT deployment. Nevertheless, HE tools and compilers are primarily written in low-level languages like C++, posing a high entry barrier to IoT developers. This paper proposes CipherFlow, the HE node extension for Node-RED, a visually and flexibly programmable dataflow tool for rapid IoT development. CipherFlow offers three pipeline abstractions: 1) a playground of drag-and-drop HE nodes in Node-RED, 2) arithmetic operators, and 3) optimal parameter setting guidelines. As a result, IoT developers can create and verify their secured computing functions on data flows. We demonstrate the applicability and effectiveness of CipherFlow through the performance evaluation. Furthermore, our evaluation shows the performance and security trade-off depending on the HE parameters. © 2022 ACM.
dc.publisherAssociation for Computing Machinery
dc.subjecthomomorphic encryption
dc.subjectIoT
dc.subjectNode-RED
dc.subjectPrivacy
dc.subjecthomomorphic encryption
dc.subjectIoT
dc.subjectNode-RED
dc.subjectPrivacy
dc.titleCipherFlow: A Playground for Developing Privacy-Preserving IoT in Node-RED
dc.typeConference paper
dc.rights.holderScopus
dc.identifier.bibliograpycitationACM International Conference Proceeding Series. Vol , No. (2022), p.18-25
dc.identifier.doi10.1145/3570748.3570752
Appears in Collections:Scopus 2022

Files in This Item:
There are no files associated with this item.


Items in SWU repository are protected by copyright, with all rights reserved, unless otherwise indicated.