| With the rapid development of the Internet of Things(Io T),the analysis and processing of massive interconnected sensing data has become an urgent need in many scenarios.As a basic tool for analyzing and processing massive data,data aggregation has received exten-sive attention.At the same time,cloud computing technology,with its efficient computing function and powerful storage function,provides a new development direction for data ag-gregation,namely:outsourcing data aggregation.However,outsourcing data aggregation still faces some challenges:(1)In the scenarios,such as smart city and smart healthcare system,the data involved in aggregation may come from multiple data domains.Therefore,it is necessary to consider how to realize data aggregation operation for multi-domain data.(2)Aggregators can not be trusted as a third party.So it is necessary to ensure the correct-ness of the aggregation process which aggregators participate in.That is,it is necessary to verify the aggregation results of aggregators.(3)The data of the data provider inevitably contains sensitive information,so it is necessary to ensure the confidentiality of the data participating in the aggregation.In addition,in some location-sensitive scenarios,the data involved in aggregation is closely related to the location or area of the data provider,such as:intelligent transportation,logistics Io T,etc.Therefore,location-aware secure outsourcing data aggregation is a matter of concern.However,the combination of location-aware and outsourcing data aggregation also requires consideration of location-related security issues.That is,ensuring location privacy on the basis of location-aware outsourced data aggregation.This article introduces multi-blockchain and cross-chain mechanisms to realize the sharing and aggregation of data in multiple data domains.On this basis,this article designs a location-based verifiable secure outsourcing data aggregation scheme in multi-domains(V ODAloc),and an area-based verifiable secure outsourcing data aggregation scheme in multi-domains(V ODAarea).The main research results of this article are as follows:1.This article proposes scheme V ODAloc,which realizes outsourcing data aggregation in multi-data domain,satisfies the verifiability of aggregation results and data confidentiality,and ensures location verification while protecting requester location strategy privacy and data provider location privacy.This scheme combines vector operation based on circle re-gion and the twin Diffie-Hellman key exchange protocol,which not only protects the privacy of requestor’s location strategy and data provider’s location privacy,but also realizes location verification.What’s more,this scheme combines homomorphic encryption,homomorphic commitment scheme and location-aware key provided by location verification,which en-sures the aggregation verifiability and data confidentiality.Through security analysis,it is proved that the scheme V ODAloccan achieve the proposed goals,including location strategy privacy,data provider location privacy,aggregation results verifiability,data confidentiality.2.This article proposes scheme V ODAarea,which realizes outsourced data aggregation in multiple data domains,satisfies the aggregation results verifiability and data confidential-ity,and ensures the verification of the data provider’s area.This scheme combines location cryptography and Diffie-Hellman key exchange protocol,which not only realizes location authentication and area authentication,but also negotiates the session key related to area au-thentication.What’s more,this scheme combines homomorphic encryption,homomorphic commitment scheme to ensure the aggregation results verifiablity and data confidentiality.Through security analysis,it is proved that the scheme V ODAareacan achieve the proposed goals,including verification results security,session keys security,data aggregation results verifiability,data confidentiality.3.By selecting different parameters,the experiments of V ODAlocand V ODAareaare de-signed to test the local computing overhead of each entity in each stage.Finally,the scheme proposed in this article is compared with the related work in terms of design objectives and performance.It can be seen that the scheme proposed in this article not only provides more powerful functions,but also balances the overall computing cost. |