Next Article in Journal
An Efficient Task Scheduling Strategy Utilizing Mobile Edge Computing in Autonomous Driving Environment
Next Article in Special Issue
A Novel Intrusion Detection Model Using a Fusion of Network and Device States for Communication-Based Train Control Systems
Previous Article in Journal
The Application of a New Secure Software Development Life Cycle (S-SDLC) with Agile Methodologies
Previous Article in Special Issue
Advanced Bad Data Injection Attack and Its Migration in Cyber-Physical Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems

1
School of Software, Nanchang University, Nanchang 30029, China
2
Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada
3
Research Center for Interneural Computing, China Medical University, Taichung 40402, Taiwan
4
College of Computing and Software Engineering, Kennesaw State University, Kennesaw, GA 30144, USA
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(11), 1220; https://doi.org/10.3390/electronics8111220
Submission received: 4 September 2019 / Revised: 14 October 2019 / Accepted: 19 October 2019 / Published: 25 October 2019
(This article belongs to the Special Issue Security and Privacy in Cyber Physical Systems)

Abstract

:
The new developments in smart cyber-physical systems can be shown to include smart cities, Internet of things (IoT), and for the most part smart anything. To improve the security of sensitive personal information (SPI) in cyber-physical systems, we present some novel ideas related to the encryption of SPI. Currently, there are issues in traditional encryption methods, such as low speed of information acquisition, low recognition rate, low utilization rate of effective information resources, and high delay of information query. To address these issues, we propose a novel efficient encryption algorithm for the security of incremental SPI. First, our proposed method analyzes user information resources and determines valid data to be encrypted. Next, it uses adaptive acquisition methods to collect information, and uses our encryption method to complete secure encryption of SPI according to the acquisition results. Our experimental analysis clearly shows that the algorithm effectively improves the speed of information acquisition as well as effective information recognition rate, thus enhancing the security of SPI. The encryption model in turn can provide a strong guarantee for user information security.

1. Introduction

As users of smart devices, we have witnessed advancements in systems that are Internet based, which have created many different new avenues and challenges. The term cyber-physical systems (CPS) was first used in the mid-2000s, with the onset of importance given to interactions between systems that are connected to each other and also to the real-world we live in. CPS can be seen more as a thematic subject than as a disciplinary topic. Networked Physical Systems refers to the synchronization between computer information systems and Internet systems, the synchronization and interaction of information between computer process and physical process, and the real realization of object-to-object through the synchronization and interaction of computer calculation, Internet information transmission and industrial operating system control. Object-to-object, human-to-human three-dimensional integrated network information service. At present, network physical systems are mainly used in large-scale industrial production, medical aid system, engineering system and traffic intelligence system.
CPS can be defined as the direct intertwined connections between networks, computing, and processes that are physical in nature. The connections occur as network systems and embedded systems control and monitor processes. From this, built in feedback loops where processes directly affect computations and vice versa are kept track of. The promise of such systems is endless, with both societal and economic ramifications that have not yet been fully realized. We have noticed major financial investments worldwide to develop this technology further and in parallel major research efforts in the newly developed field. Building on both embedded systems and Networked Physical Systems directly, CPS can integrates the dynamics of physical processes with those of both networking and software, providing the necessary abstractions, design, and analysis techniques needed to further their very nature. As CPS are transmitting a myriad of different types of data back and forth between networks, computing resources, and physical hardware, it becomes important to realize that the need for efficient encryption algorithms in CPS exists.
Lately, with the increase in CPS, we have also seen rapid development of information (data) resource sharing. However, the security problems of private information has also appeared. Private information encryption is the symbol of the times and the only way to update and develop secure information sharing. To protect a user’s security, it is necessary to encrypt and protect sensitive personal information (SPI), as shown in [1,2]. Currently, users are becoming more concerned with the privacy of their information as opposed to just the novelty of the application being used [3]. Therefore, the secure encryption of SPI is an inevitable requirement of the future development of information sharing and storage [4,5]. SPI encryption has become a recent trend with the development of new information sharing and storage techniques for the future.
Research on encryption algorithms to be used on SPI is an effective way to protect users’ privacy. It has piqued the interest and attention of experts and scholars in this field, and achieved some effective research results. Moreover, as indicated earlier, with SPI potentially flowing freely in CPS based networks, the need for the security of such information to be preserved is mandatory and can be provided through our work presented here. Our novel encryption algorithm looks to solve the following shortcomings of current encryption algorithms:
  • low-speed data acquisition speed
  • low data recognition rate
  • effective utilization of resources
  • delays in data queries using traditional methods
Before encrypting data, our algorithm analyzes user data resources and encrypts the data according to the analysis results gauging the type of data involved. This effectively solves the problem of data query delays caused by traditional methods in encrypting large amounts of data by only encrypting data that needs enhanced security and privacy. To solve the problem of low data recognition rate and effective utilization of resources, an interference quantification method is used (described later) to determine the location of specific data after the data are encrypted. The experimental results show that the proposed algorithm effectively solves the shortcomings of traditional methods, and can protect a users’ privacy and information security. Traditional methods need a lot of manual intervention when encrypting information, and the degree of automation is low. Combining with the analysis of users’ private data resources, this paper uses an adaptive data collection method to collect SPI, which can improve the degree of automation of information encryption.

Paper Organization

The rest of the paper is organized as follows. In Section 2, we give a thorough survey of related work to the research presented here. We then present our proposed secure encryption method and its inner workings in Section 3. Our experimental comparison analysis is presented in Section 4. Finally, Section 5 gives some concluding remarks.

2. Related Work

Recently, encryption of personal information has been studied in depth as an effective way to solve the issues with SPI [5]. It has drawn the attention of experts and scholars in many fields, and has resulted in several strong methods.
In [6], Zhang et al. proposed a dual encryption reversible concealment algorithm for real-time network information based on chaotic sequences. The two kinds of scrambling methods are used to double encrypt the network information. For the first time, the chaotic sequence encryption algorithm is used to globally scramble the network information location. The second time, based on another set of chaotic sequences, the 0 bit and 1 bit of the target pixel value are again scrambled to ensure that the selected explicit (dense) attack can be defended. In this domain, the pseudo pixel is constructed by using the information to be embedded to replace the target pixel, thereby realizing rapid embedding of information. The embedded information is directly extracted from the ciphertext information according to the key calculation. After the receiver decrypts the information, each bit data of the target pixel is extracted to recover the original network information, thereby realizing reversible information hiding under double encryption. The experimental results show that the algorithm has the advantages of fast and efficient information embedding and large capacity. However, since the problem that some information can be shared is not considered, the algorithm has the problems of low security information recognition rate and high information query time delay.
In [7], Solomon et al., aiming at the problem that the current algorithm’s anti-deciphering ability is not high, proposed a network privacy protection digital information encryption technology based on homomorphic symbol frequency detection. First, the digital information encryption key structure of the network privacy protection object is constructed. Then, the encoding design of encryption and decryption is carried out, which uses the homomorphic symbol frequency detection to perform key optimization of digital encryption to improve the anti-deciphering level. Finally, a simulation experiment was conducted. The delay results show that the digital information encryption technology makes the encryption depth higher, and the deciphering rate of the encrypted data is effectively controlled. However, there is a problem that the information query time is high.
Zhang et al. proposed an anti-peep network security authentication information encryption method [8]. The anti-peep network data attributes are selected according to the professional knowledge and the overall structure of the data, and the selection results are pre-processed. According to the attribute processing result, a variable window is introduced to realize the determination and clearing of redundant data. First, the method sets the minimum, maximum, and minimum thresholds of the variable window and initializes the window. After that, the data to be matched is set, and the segmentation of the string is realized by the 3-gram method. After calculating the similarity between the data to be matched and the window data record, the calculation result is stored in a two-dimensional array. In addition, the data record similarity in the case of missing fields is calculated, thereby realizing the redundancy of each type of data in the network, and then the redundant data in the determination result is cleared. The method treats the plaintext as a continuous bitstream transmitted in the privacy network and inputs its link number into the data encryption. The seed is used to complete the initialization of the key sequence generator and generator, and the random encryption function is called to generate a random encryption number. The encrypted bitstream is then encrypted using the encrypted number. Experiments show that the information anti-attack coefficient is larger after encryption. However, this method has a problem of low resource utilization and cannot effectively meet the needs of users.
Qian et al. proposed a scheme they refer to as Privacy-Preserving Selective Aggregation (PPSA) [9]. PPSA can be described as a method which encrypts users’ SPI to prevent privacy disclosure from outside analysts and service providers alike. PPSA fully supports selective aggregate functions that are used for online user-based behavior analysis while also being able to guarantee differential privacy. The authors provided experimental results that show that their model can effectively support both aggregate queries (overall and selective) with acceptable levels of communication and computation overhead. However, due to the fact that some information can be shared, the algorithm has the well-known issues of slow data acquisition speeds.
Zhang et al. proposed a user privacy protection method based on dynamic hiding of sensitive itemsets (SIDH) [10], which senses the positive and negative boundaries of sensitive rules corresponding to the itemsets space and incrementally expands the original snapshot to query anonymous set data. This methodology hides and purifies sensitive association rules dynamically and finally realizes user privacy protection. The experimental results showed that the SIDH method is hidden. The speed of hiding sensitive itemsets is high, but the recognition rate of data is low.
Zhu proposed a new encryption method for privacy information acquisition process [11]. Privacy information in mobile Internet can be divided into several subspaces according to its attributes and acquisition time. Private information is encrypted in each subspace and transmitted to relay nodes. When a given relay node needs to read private information, it needs to request the corresponding sub-key of the private information from data source node. A data source node’s own unique strategy decides whether to authorize or not, and ensures the security of all the sub-keys it generates. After encryption, the lengthy private information is divided into smaller information slices by segmentation and reorganization. After transformation, the information is fused to ensure the integrity of the encrypted information. The experimental results showed that the proposed method improves the security and integrity of privacy information acquisition process, but it has issues with long query delay times.
To solve the above problems, an SPI security encryption algorithm based on incremental update data is proposed. Before encrypting data, our algorithm analyzes user data resources and encrypts the data according to the analysis results gauging the type of data involved, as  summarized in Section 3.1. This effectively solves the problem of data query delays caused by traditional methods in encrypting large amounts of data by only encrypting data that needs enhanced security and privacy. To solve the problem of low data recognition rate and effective utilization of resources, an interference quantification method is used (described in Section 3.3) to determine the location of specific data after the data are encrypted. The experimental results show that the proposed algorithm effectively solves the shortcomings of traditional methods, and can protect a users’ privacy and information security. We also include some discussion of the potential applications of our work. Our work here to our knowledge is both novel in implementation and also in results.

3. Secure Encryption Algorithm for SPI

With the application and development of network physical systems and more specifically CPS, the security of user’s trade secrets and private data has gradually become a research hotspot in this field. At present, the application of information technology (IT) in the security architecture of network physical system is not perfect, and the security encryption process of sensitive private message information has problems such as slow information acquisition speed and low recognition rate. Therefore, this paper designs a new SPI efficient encryption algorithm to alleviate such problems. The method first analyzes public data resources, private data resources and mixed data resources in user data. From this analysis, it is concluded which resources need to be encrypted and which data can be shared openly un-encrypted. The key concept here is that not all data fall under the context of SPI, therefore there is no need to waste computational resources to encrypt/decrypt them. The analysis of the data aids in establishing a targeted user data subset for sharing and the encryption structure. User data resources are collected in using an adaptive data collection method. Finally, the data encryption method based on interference quantization is used to complete the analysis on the secure encryption method for SPI. An overview flow chart is given in Figure 1.

3.1. SPI Analysis

In the context of incremental data updates, SPI is mainly classified into three types: public data resources, private data resources, and mixed data resources, depending on the scope and type of information.
  • Public data resources
    Public data resources refer to users’ information stored on servers not under their direct control, which can be accessed by other users through open channels and can be understood without users having strong professional knowledge. The cost of public data acquisition is relatively low, and it is a relatively low level of privacy security category [12]. Some common data and Web data information belong to public data, including personal credit information, e-mail addresses, browsing traffic, job categories and other similar information. This kind of data resources is mainly used by users themselves and others, and will not usually threaten users’ privacy. Users do not need to worry about the source of resources and data security, but only pay attention to the satisfaction of information and the utilization of attached resources.
  • Private data resources
    Private data resources exist in the users’ own storage system, mainly for information that cannot be publicly obtained, involving SPI and potentially some relatively important business data and other non-public private data, which can be divided into personal account login account and password, user identity card information, electronic financial information, and individuals/business data, among others [13]. Private data need a high level of privacy and security. They cannot be acquired and utilized by people other than public administration departments. At the same time, external organizations cannot access this part of any resources.
  • Mixed data resources
    Mixed data resources are the collection of public data resources and private data resources. Through the network, data security can be balanced between public data resources and private data resources [14]. User’s private data resources are linked with public data resources to form a user’s mixed data resources. Specifically, it includes the personal account login account and password, user ID card information and personal credit information, mailbox address and other information in public information.
Private data resources belong to the privacy information of individual users, and cannot be obtained and used by people other than public administration departments. Therefore, this paper mainly encrypts private data resources. The natural combination of different systems and distributed resources can realize the secure encryption of data resources. The user privacy information resource structure is represented by Figure 2.

3.2. SPI Collection

Combined with the above definitions of SPI resources, the adaptive data collection method is used to collect SPI. After instructions are sent to specify the tasks for data collection, appropriate data collection tasks and a decision module are selected to meet the needs of the tasks. Concurrently, privacy information is gathered by the data processing module to integrate the resources [15,16].
For collection, suppose there are q parameter collection tasks for completing of data collection. The goal of data collection is to make a reasonable assignment of the q tasks.
Suppose a parameter detection task Q occurs at a certain moment of time. An alliance is introduced, and the task assignment is performed in the area where the collection task appears. According to the different requirements of acquisition task Q m , the task is decomposed into Q m = Q m 1 , Q m 2 , , Q m i . The appropriate data acquisition is selected to form the corresponding data alliance A m , A m = P m 1 , P m 2 , P m i . The acquisition task is assigned in the data alliance, P m i carries on the sub-task Q m x of the acquisition task, Q m x Q m , ( x = 1 , 2 , , i ) , and the results are transmitted to the electronic storage library.
To achieve efficient and real-time detection of the user privacy data parameters, and effectively improve the performance of data resources, the time of data collection is used as an evaluation function. The time of data acquisition can be represented by a matrix of q × q , where the information element e x t m n represents the execution time of acquisition task m at the information node  P n .
The execution time of acquisition task mainly includes: the time of data transmission e x t m n t r , the overhead time e x t m n o h and the time spent on data processing e x t m n p r :
e x t m n = e x t m n t r + e x t m n o h + e x t m n p r
The total amount of data resources is related to transmission time e x t m n t r and amount of data D t r , e x t m n t r = D t r . Overhead time e x t m n o h depends on the packet size. Assuming that the writing time and reading time of a packet is equal, the relationship between overhead time, data visits D o h and data resource storage speed V can be expressed as: e x t m n o h = 2 D o h / V . Data processing time e x t m n p r is different because of different tasks.
r P m represents the sum of time of node P when performing the information acquisition task Q m , and  t Q m represents the sum of time when data resource acquisition task performs q tasks, which can be represented as:
t P m = Σ n = 1 p e x t m n t Q m = Σ m = 1 q t P m
The energy consumption of data nodes includes energy consumption of computing data resources C p r o , and energy consumption of communication data C c o m .
The energy consumption of computing data resources is the energy consumption of processing tasks for data acquisition. If  S P n is the energy consumption of tasks perfumed by P n in time, and energy consumption of computing when data node P n processes task can be expressed as:
C p r o P n = Σ m = 1 q S P n e x t m n
The data energy consumption is generated during the process of data transmission. The energy consumption of data transmission is C 0 , c o m at a given distance of d 0 , and the data energy consumption is related to spatial distance d i n between central data nodes P i and P n :
C i , c o m = d i n 2 d 0 2 × 4 π 2 β G t G r λ 2 × C 0 , c o m
In Equation (4), G t represents the emission coefficient of data node P i , G r is the receiving coefficient of data node P n , λ represents wavelength of communication, β is factor of data power, and all parameters are constant. 4 π 2 β / G t G r λ 2 × C 0 , c o m stands for constant. thus, transmission energy consumption of a unit of data can be evaluated with d i n 2 / d 0 2 .
The energy consumption C of data can be expressed as:
C = Σ n = 1 P C p r o + C c o m
The data load balance degree represents the difference range of time for performing the acquisition task and time of completing the acquisition. The ratio of difference to data acquisition time [17,18] is used to describe the information load balance degree, which can be defined as:
L = 1 Σ m = 1 q T t P m / q × T
In Equation (6), T indicates the total time to complete the data acquisition, T = max m = 1 q t P m .
By the above process, the collection of user privacy information resources has been completed.

3.3. Security Encryption Method of UPI

Combined with the above-mentioned collection techniques of user data, the interference quantization method is used to facilitate the encryption of large amounts of SPI [19].
Assuming k is fixed and represented by k , the problem of resource encryption in k data can be represented as:
max Σ j J Σ i I R i j ( k ) x i j ( k ) s . t Σ i I x i j ( k ) = 1
In Equation (7), R i j ( k ) indicates the total amount of SPI, and  x i j ( k ) indicates the amount of mixed data.
By solving Equation (7), X of all k are worked out. We give j as fixed in j , the resource sharing problem on the j th data is considered, and  P j k 0 . P max is considered separately, it can be derived that:
max Σ k K R j k s . t Σ k K G j t k P j k 1 t h
In Equation (8), R j k indicates the rate at which data is encrypted. The data objective function Σ k K R j k can be used to sum up k to get:
Σ k K R j k = log 2 Σ k K G j k ¯ P j k ¯ + Σ t T I j h t + n j k Σ k ¯ K / k G j k P j k + Σ t T I j h t + n j k
In Equation (9), I j h t indicates the interference item after encryption of SPI is determined. We have seen that conventional data encryption usually needs to solve complex non-convex optimization problems as given in [20]. However, here, we use interference encryption to simplify the problem. For ease of description, some auxiliary variables are introduced. v j t h represents the interference of k resources on the jth SPI resource, and the formula given in Equation (8) is converted into Equation (10), which is called the SPI interference problem.
max Σ k K R j k s . t Σ k K v j t k I t h
In Equation (9), P j k ¯ = v j t k / G j k ¯ , P j k is a function of v j t k , and the data variable is P j k = v j t k 0 , G j t k P max . It is worth noting here that the constraint of interference becomes a form of summation of simple variables. Thus, the SPI encryption method of interference quantization can be introduced to simplify the original data encryption interference problem [21,22,23,24,25,26].
Dealing with individual user data: assuming that Δ v represents the infinitesimal of interference, it can only be shared as a region, and the length of the quantization is L, thus I t h = L Δ v . Equation (10) can be simplified into L, and the infinitesimal Δ v of interference can be divided into the largest objective function [27,28,29,30]. Let l 1.2 . , L indicate step l, and  Δ v l represents the interference infinitesimal of step l, and when information is single, the information interference infinitesimal of each step is equal.
Δ v l = Δ v = I t h / L
In Equation (11), when Δ v l shares with the kth data, the corresponding resource infinitesimal is given by Equation (12):
Δ P j k = Δ v l G j t k , k K
Dealing with multiple resources of data, suppose that, by L step, the interfering micro-components are distributed to massive data, then:
Δ v l = I R L + 1 l
In Equation (13), I R represents remaining interference quantification of data, and is updated according to Equation (14):
I R = I t h Σ k K G j t k P j k
In Equation (14), the data vector P j is updated at each step according to the SPI to interfere with the resources corresponding to the micro-cloud. Considering that multiple resources of data are disturbed, when Δ v l share the k th data, the corresponding resource infinitesimal takes the minimum value of data, and Equation (15) is given:
Δ P j k = min Δ v l G j t k , K
By the above conversion, this paper can simplify the encryption of interference data of SPI. F j Δ v l , k represents the function goals in Equation (9) when Δ v l shares to k th data. At each step, the maximum data F j Δ v l , k brought by π l is numbered as ( π l ), which can be expressed as:
π l = arg max F ( j ) Δ v l , k
Finally, the SPI resource encryption vector P j is obtained. The privacy of the data is completed and can be updated as securely encrypted. Algorithm 1 is obtained from summarizing the Encryption process using Equations (1)–(16). We also expand Algorithm 1 by showing the Key Expansion Function in Algorithm 2.
Algorithm 1: Encryption algorithm.
Electronics 08 01220 i001
Electronics 08 01220 i002
Algorithm 2: Key expansion function.
Electronics 08 01220 i003

4. Experimental Results and Analysis

4.1. Experimental Setup

We selected the data provided by Google Dataset Search dataset as the experimental data source [31].
Google Dataset Search dataset can be regarded as a one-stop dataset shop, which contains massive data of different sizes and types from sources such as NASA and ProPublica. The data source is comprehensive, so the dataset has strong applicable value. Through MATLAB 8.0 software, a large-scale data resource experimental platform for interference quantification was built, and used for data processing. Taking data acquisition time, information resource recognition rate, information query delay and effective utilization of resources as experimental indicators, the proposed method was compared with those peers from [6,7,8,9] to verify the effectiveness of our method. All methods from [6,7,8,9] were rerun and compared with our method. All models were implemented in the Matlab R2017b software environment and has been subject to processing and analysis as described next.

4.2. Analysis of Experimental Results

Figure 3 shows the comparison of data acquisition speeds of the proposed method with the peer methods in [6,7,8,9]. In the cases with the same amount of data, we observed a shorter acquisition time coupled with higher efficiency of data acquisition. Therefore, we used data collection time to verify the collection efficiency. The specific results are shown in Figure 3. One item of note here is that, as the information resources increase, most other methods show a linear increase in collection time, whereas our method shows more of a constant relationship staying consistent throughout increase in information.
Analysis of Figure 3 shows that the private data collection time of the five methods is different. The acquisition time of the methods in [6] is between 1.4 s and 4.2 s, and the acquisition time of the method given in [7] is between 2.1 s and 6.7 s. The acquisition time of the method given in [8] is between 1.2 s and 10.8 s, and the collection time of private information is relatively long. The acquisition time of the methods [9] is between 4.5 s and 10.8 s. We attribute these valid data to the algorithm using an adaptive data collection method, which enables the decision module while the data collection task is being performed, saving a lot of time and meeting the task requirements.
To verify data recognition accuracy of the methods, we again used algorithms from [6,7,8,9] to compare to our algorithm under different data resource scenarios. The results are shown in Figure 4.
The analysis of Figure 4 shows that, when the resource quantity is 1 × 10 3 bit, the data recognition rates of the methods [6,7,8,9] are 69%, 78%, 37%, and 36%, respectively. The data recognition rate of our algorithm is 92%. When the resource quantity is 6 × 10 3 bit, the data recognition rates of the methods from [6,7,8,9] are 59%, 80%, 62%, and 64%, respectively. Comparatively, data recognition rate of our algorithm is slightly over 90%. Observing the overall graph in Figure 4, the data recognition rate of the algorithm is always best, indicating our algorithm has a high data recognition rate and good recognition performance [32]. We attribute this to the fact that conventional information encryption needs to solve complex non-convex optimization problems. However, our method simplifies the problem in a different way, known as interference encryption. To make the description more convenient, some auxiliary variables are introduced, which reduce the influence of interference items and improves the recognition rate of effective data. One unexplained behavior to note is the decrease in rate where the information resource quantity is 4 × 10 3 bit; however, after this amount, as expected, this is a slight increase. This unexplained decrease may be attributed to some special behavior of the algorithm at that amount of data.
Figure 5 shows the comparison of delay caused by data resource queries in seconds of our proposed algorithm with delays in [6,7,8,9].
Analysis of Figure 5 shows that the query delay of the five methods increases as the amount of data resources are increased. When the private data used in the query are 6 × 10 3 bit, the SPI query delays of [6,7,8,9] are 10.5 s, 8.5 s, 5.5 s, and 18 s, respectively. Similarly, our algorithm creates a delay of just above 1 s. When the amount of private data used in the query reach 10 × 10 3 bit, the privacy data query delays from [6,7,8,9] are 24.5 s, 16.5 s, 11.5 s, and 26 s, respectively. In comparison, our algorithm creates a delay which is still approximately 1 s. A user would not notice a change in delay even if the private data used in a query were increased. This clearly indicates that the data resource query delay of our algorithm is small, has better query performance, and is more feasible for large data storage applications. Our algorithm over the whole set of information resource amounts performed better than all comparable reference methods.
Table 1 shows the comparison of the utilization rate of information resources (%) between the methods from [6,7,8,9] and our algorithm.
Analysis of Table 1 shows that the utilization of data resources of the four methods is different in the case of different amounts of private data. When the private data are 10 × 10 3 bit, the resource utilization rates of from [6,7,8,9] are 69%, 78%,  68%, and 85%, respectively. In comparison, the resource utilization rate of our proposed algorithm is 90%. When the private data are 30 × 10 3 bit, the resource utilization rates from [6,7,8,9] are 62%, 80%, and 72%, and 80%, respectively. Comparatively, the resource utilization rate of our algorithm is 97%. It can be seen in Table 1 that, regardless of the amount of private data, the resource utilization rate of our algorithm exceeds 90%, and from this it can be concluded that the resource utilization is strong.
Based on the above experimental results, our algorithm can effectively improve the collection time of private data, increase the recognition rate of data resources, lessen the delay caused from queries of private data, and increase the utilization of data resources. As a result, we can conclude that our encryption algorithm exceeds some of the current algorithms from [6,7,8,9] in overall performance.

5. Conclusions

With the rapid development of the Internet, information dissemination is oriented to the needs of users. According to practice, in the society of information proliferation and resource reorganization, secure encryption of private information is a requirement for all data. In privacy encryption process of private data, the existing methods cannot effectively enhance the security of information, and cannot meet the different needs of users based on specific usage tendencies. To this end, a private data security encryption algorithm for incremental update data is proposed to protect SPI. The experimental results clearly show that the resource utilization rate of this algorithm is 97%, which is much higher than that of the traditional methods. Moreover, data acquisition time of our algorithm is less than 1.0 s, which is much lower than that of the traditional methods as well. This is due to the fact that the algorithm in this paper adopts the adaptive data collection method, enabling the decision module while the data collection task is going on, which saves a lot of time and meets the requirements of the task. This shows that our algorithm has better encryption effects and can effectively improve the security of information. Compared to traditional methods, we show that data resource recognition rate and utilization rates are higher and that data query delay is lower, which is because our algorithm simplifies the problem in different ways, called interference encryption. It introduces some auxiliary variables, which reduces the influence of interference items and improves the effective data, showing the effectiveness of our proposed methodology. This in turn indicates that the algorithm can effectively solve the shortcomings of traditional methods and has practical application.

Author Contributions

Conceptualization, G.S. and X.Z.; methodology, G.S.; validation, X.Z. and R.M.P.; formal analysis, X.Z.; writing—original draft preparation, X.Z.; writing—review and editing, G.S.; project administration, and R.M.P.

Funding

The APC was funded by MDPI.

Acknowledgments

The authors would like to thank Dr. Shuai Liu, Hunan Normal University for his support with this publication.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, C.; Wang, B.; Li, W.; Huang, S.; Kong, L.; Li, Z.; Li, L. Conversion of invisible metal-organic frameworks to luminescent perovskite nanocrystals for confidential information encryption and decryption. Nat. Commun. 2017, 8, 1138. [Google Scholar] [CrossRef] [PubMed]
  2. Wang, X.; Li, W.; Li, W.; Gu, C.; Zheng, H.; Wang, Y.; Zhang, S.X.A. An RGB color-tunable turn-on electrofluorochromic device and its potential for information encryption. Chem. Commun. 2017, 53, 11209–11212. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Xiao, D.; Li, X.; Liu, S.J.; Wang, Q.H. Encryption and display of multiple-image information using computer-generated holography with modified GS iterative algorithm. Opt. Commun. 2018, 410, 488–495. [Google Scholar] [CrossRef]
  4. Lu, Y.; Zhu, M. Privacy preserving distributed optimization using homomorphic encryption. Automatica 2018, 96, 314–325. [Google Scholar] [CrossRef] [Green Version]
  5. Poh, G.S.; Chin, J.J.; Yau, W.C.; Choo, K.K.R.; Mohamad, M.S. Searchable symmetric encryption: Designs and challenges. ACM Comput. Surv. (CSUR) 2017, 50, 40. [Google Scholar] [CrossRef]
  6. Zhang, C.L.; Xiong, L.; Lu, L.C. Simulation of Double-Encrypted Reversible Concealment Algorithm for Real-time Network Information. Comput. Simul. 2018, 35, 201–204+268. (In Chinese) [Google Scholar]
  7. Solomon, M.; Elias, E.P. Privacy Protection for Wireless Medical Sensor Data. Int. J. Sci. Res. Sci. Technol. 2018, 4, 1439–1440. [Google Scholar]
  8. Zhang, K.; Douros, K.; Li, H.; Li, H.; Wei, Y. Systems and Methods for Pressure-Based Authentication of an Input on a Touch Screen. U.S. Patent 8,988,191, 24 March 2015. [Google Scholar]
  9. Qian, J.; Qiu, F.; Wu, F. Privacy-Preserving Selective Aggregation of Online User Behavior Data. IEEE Trans. Comput. 2016, 66, 326–338. [Google Scholar] [CrossRef]
  10. Zhang, H.T.; Zhu, Y.H.; Huo, X.Y. User privacy protection method based on dynamic hiding of sensitive items. Appl. Res. Comput. 2017, 34, 3740–3744. [Google Scholar]
  11. Zhu, L.N. Research on Encryption Simulation of Private Information Acquisition Process over Mobile Internet. Comput. Simul. 2018, 8, 156–159. [Google Scholar]
  12. Chen, Y.R.; Rezapour, A.; Tzeng, W.G. Privacy-preserving ridge regression on distributed data. Inf. Sci. 2018, 451, 34–49. [Google Scholar] [CrossRef]
  13. Grice, W.P.; Evans, P.G.; Lawrie, B.; Legre, M.; Lougovski, P.; Ray, W.; Williams, B.P.; Qi, B.; Smith, A.M. Two-party secret key distribution via a modified quantum secret sharing protocol. Opt. Express 2015, 23, 7300–7311. [Google Scholar] [CrossRef] [PubMed]
  14. Quan, L.-X. Storage Method and Implementation of Education Resource Ontology in a Relational Database. J. Langfang Teach. Univ. (Nat. Sci. Ed.) 2016, 2, 3. [Google Scholar]
  15. Liu, S.; Pan, Z.; Cheng, X. A Novel Fast Fractal Image Compression Method based on Distance Clustering in High Dimensional Sphere Surface. Fractals 2017, 25, 1740004. [Google Scholar] [CrossRef]
  16. Dou, Y.; Chan, H.C.; Au, M.H. A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud. IEEE Trans. Parallel Distrib. Syst. 2018, 30, 1208–1221. [Google Scholar] [CrossRef]
  17. Luo, Z.Y.; Shi, R.H.; Xu, M.; Zhang, S. A novel quantum solution to privacy-preserving nearest neighbor query in location-based services. Int. J. Theor. Phys. 2018, 57, 1049–1059. [Google Scholar] [CrossRef]
  18. Wang, L.; Zhang, Z.; Dong, M.; Wang, L.; Cao, Z.; Yang, Y. Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Commun. Mag. 2018, 56, 76–81. [Google Scholar] [CrossRef]
  19. Aminifar, A.; Eles, P.; Peng, Z. Optimization of Message Encryption for Real-Time Applications in Embedded Systems. IEEE Trans. Comput. 2017, 67, 748–754. [Google Scholar] [CrossRef] [Green Version]
  20. Gao, C.Z.; Cheng, Q.; He, P.; Susilo, W.; Li, J. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack. Inf. Sci. 2018, 444, 72–88. [Google Scholar] [CrossRef]
  21. Xia, Y.; Chen, W.; Liu, X.; Zhang, L.; Li, X.; Xiang, Y. Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2629–2641. [Google Scholar] [CrossRef]
  22. Dwivedi, A.D.; Morawiecki, P.; Srivastava, G. Differential cryptanalysis of round-reduced speck suitable for internet of things devices. IEEE Access 2019, 7, 16476–16486. [Google Scholar] [CrossRef]
  23. Bryce, R.; Shaw, T.; Srivastava, G. Mqtt-g: A publish/subscribe protocol with geolocation. In Proceedings of the 2018 41st International Conference on Telecommunications and Signal Processing (TSP), Athens, Greece, 4–6 July 2018; pp. 1–4. [Google Scholar]
  24. Dwivedi, A.D.; Dhar, S.; Srivastava, G.; Singh, R. Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM. Cryptography 2019, 3, 4. [Google Scholar] [CrossRef]
  25. Srivastava, G.; Fisher, A.; Bryce, R.; Crichigno, J. Green Communication Protocol with Geolocation. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–6. [Google Scholar]
  26. Malina, L.; Srivastava, G.; Dzurenda, P.; Hajny, J.; Fujdiak, R. A Secure Publish/Subscribe Protocol for Internet of Things. In Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, 26–29 August 2019. [Google Scholar]
  27. Yao, Z.; Ge, J.; Wu, Y.; Jian, L. A privacy preserved and credible network protocol. J. Parallel Distrib. Comput. 2019, 132, 150–159. [Google Scholar] [CrossRef]
  28. Ma, Y.; Wu, Y.; Li, J.; Ge, J. APCN: A Scalable Architecture for Balancing Accountability and Privacy in Large-scale Content-based Networks. Inf. Sci. 2019, 484, 27–43. [Google Scholar] [CrossRef]
  29. Zhou, R.; Zhang, X.; Wang, X.; Yang, G.; Wang, H.; Wu, Y. Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things. Inf. Sci. 2019, 491, 251–264. [Google Scholar] [CrossRef]
  30. Tian, Y.; Guo, J.; Wu, Y.; Lin, H. Towards Attack and Defense Views of Rational Delegation of Computation. IEEE Access 2019, 7, 44037–44049. [Google Scholar] [CrossRef]
  31. Google Search Datasets. Available online: https://developers.google.com/search/docs/data-types/dataset (accessed on 11 September 2019).
  32. Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M.; Srivastava, G. Security Aspects of Internet of Things aided Smart Grids: A Bibliometric Survey. Internet Things 2019, 100111. [Google Scholar] [CrossRef]
Figure 1. Secure encryption algorithm flow chart.
Figure 1. Secure encryption algorithm flow chart.
Electronics 08 01220 g001
Figure 2. SPI resource structural map.
Figure 2. SPI resource structural map.
Electronics 08 01220 g002
Figure 3. SPI collection time.
Figure 3. SPI collection time.
Electronics 08 01220 g003
Figure 4. Recognition rate of information resources.
Figure 4. Recognition rate of information resources.
Electronics 08 01220 g004
Figure 5. Privacy information query latency.
Figure 5. Privacy information query latency.
Electronics 08 01220 g005
Table 1. Comparison of utilization rates of information resources of the proposed method with peers.
Table 1. Comparison of utilization rates of information resources of the proposed method with peers.
Privacy InformationMethods
( × 10 3 bit)Reference [6]Reference [7]Reference [8]Reference [9]Method (ours)
106978688590
156382747692
206578738195
256882677393
306280728097

Share and Cite

MDPI and ACS Style

Zhu, X.; Srivastava, G.; M. Parizi, R. An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems. Electronics 2019, 8, 1220. https://doi.org/10.3390/electronics8111220

AMA Style

Zhu X, Srivastava G, M. Parizi R. An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems. Electronics. 2019; 8(11):1220. https://doi.org/10.3390/electronics8111220

Chicago/Turabian Style

Zhu, Xiaogang, Gautam Srivastava, and Reza M. Parizi. 2019. "An Efficient Encryption Algorithm for the Security of Sensitive Private Information in Cyber-Physical Systems" Electronics 8, no. 11: 1220. https://doi.org/10.3390/electronics8111220

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop