skip to main content
10.1145/3640824.3640868acmotherconferencesArticle/Chapter ViewAbstractPublication PagescceaiConference Proceedingsconference-collections
research-article

PCS-ADS: Privacy Computing System for Agricultural Data Security

Published: 08 March 2024 Publication History

Abstract

With the wide application of Internet of Things, big data and other technologies in smart agriculture, more and more agricultural data are collected and used. The current analysis and processing through IoT platforms and other centralised methods have more serious data security problems. Privacy computing is a technology that completes data security calculations under the premise that both parties do not disclose data, and the data of each participant participates in the calculation is in the form of cipher text to maximally reduce the risk of data leakage. Aiming at the small volume and high frequency scenario of agricultural data, this paper proposes a distributed privacy computing framework by integrating cryptography, edge computing and blockchain, and designs a privacy computing system called PCS-ADS for smart agricultural data. This paper focuses on describing the system model architecture and system function implementation, which includes key business processes, core modules, core algorithms and other parts. Finally, the security and performance evaluation of the system is carried out. The results show that, for sum and variance, the computation time for multi-party under the amount of 1w data of each party is no more than 0.1s, and for the high-frequency computation scenarios, the computation time under the amount of 100 data of each party is no more than 7s and 1.5s, respectively. Experimental results prove that PCS-ADS is effective and has a strong practicality.

References

[1]
Nikesh Gondchawar, RS Kawitkar, Iot based smart agriculture. International Journal of advanced research in Computer and Communication Engineering, 5(6):838–842, 2016.
[2]
Fanlun Xiong and Kezhi Qiao. Intelligent systems and its application in agriculture. IFAC Proceedings Volumes, 32(2):5597–5602, 1999.
[3]
Xing Yang, Lei Shu, Jianing Chen, Mohamed Amine Ferrag, Jun Wu, Edmond Nurellari, and Kai Huang. A survey on smart agriculture: Development modes, technologies, and security and privacy challenges. IEEE/CAA Journal of Automatica Sinica, 8(2):273–302, 2021.
[4]
Lee Mathews. Florida water plant hackers exploited old software and poor password habits. Forbes Magazine, 15, 2021.
[5]
Mehdi Hazrati, Rozita Dara, and Jasmin Kaur. On-farm data security: practical recommendations for securing farm data. Frontiers in Sustainable Food Systems, 6:884187, 2022.
[6]
Parvaneh Nowbakht, Lilian O'Sullivan, Fiona Cawkwell, David P Wall, and Paul Holloway. A comparison of obfuscation methods used for privacy protection: Exploring the challenges of polygon data in agricultural research. Transactions in GIS, 26(2):949–979, 2022.
[7]
Min Zhou, Yandong Zheng, Yunguo Guan, Limin Peng, and Rongxing Lu. Efficient and privacy-preserving range-max query in fog-based agricultural iot. Peer-to-Peer Networking and Applications, 14(4):2156–2170, 2021.
[8]
Mohamed Amine Ferrag, Lei Shu, Xing Yang, Abdelouahid Derhab, and Leandros Maglaras. Security and privacy for green iot-based agriculture: Review, blockchain solutions, and challenges. IEEE access, 8:32031–32053, 2020.
[9]
Mohamed Amine Ferrag, Lei Shu, Hamouda Djallel, and Kim-Kwang Raymond Choo. Deep learning-based intrusion detection for distributed denial of service attack in agriculture 4.0. Electronics, 10(11):1257, 2021.
[10]
Jussi Nikander, Onni Manninen, and Mikko Laajalahti. Requirements for cybersecurity in agricultural communication networks. Computers and electronics in agriculture, 179:105776, 2020.
[11]
Dirk Van Der Linden, Ola Aleksandra Michalec, and Anna Zamansky. Cybersecurity for smart farming: socio-cultural context matters. IEEE Technology and Society Magazine, 39(4):28–35, 2020.
[12]
Michael Naehrig, Kristin Lauter, and Vinod Vaikuntanathan. Can homomorphic encryption be practical? In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pages 113–124, 2011.
[13]
Shagufta Mehnaz, Gowtham Bellala, and Elisa Bertino. A secure sum protocol and its application to privacy-preserving multi-party analytics. In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, pages 219–230, 2017.
[14]
Andrew C Yao. Protocols for secure computations. In 23rd annual symposium on foundations of computer science (sfcs 1982), pages 160–164. IEEE, 1982.
[15]
Aner Ben-Efraim, Yehuda Lindell, and Eran Omri. Optimizing semi-honest secure multiparty computation for the internet. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 578–590, 2016.

Index Terms

  1. PCS-ADS: Privacy Computing System for Agricultural Data Security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CCEAI '24: Proceedings of the 2024 8th International Conference on Control Engineering and Artificial Intelligence
    January 2024
    297 pages
    ISBN:9798400707971
    DOI:10.1145/3640824
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 March 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Data Security
    2. Internet of Agricultural Things
    3. Privacy Computing
    4. Smart Agriculture

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • the Research and Application of Key Technologies for Blockchain-based Privacy Computing and Trusted Smart Computing project

    Conference

    CCEAI 2024

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 24
      Total Downloads
    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 17 Oct 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media