Abstract

With the development of modern science and technology as well as the steady advancement of urbanization, intelligent networks have emerged and are replacing traditional networks with the identity of next-generation networks. And information security is one of the most important research directions in the intelligent network construction. In order to resist the threat of privacy leakage during the data transmission of intelligent terminal, an original four-layer fog computing system which is suitable for intelligent network data collection, transmission, and processing structure is established in the paper. With the help of the Paillier algorithm for encryption and fine-grained aggregation, the fine-grained aggregated data as coefficients are embed in the cloud node, and Horner’s rule is conformed for unary polynomials, which further aggregates to reduce the amount of transmitted data, so that communication overhead is reduced as well. Meanwhile, the resolvability of Horner’s rules allows EPSI to finally obtain the subregional information plain text, and it is summed up to obtain cloud-level information data. Therefore, the comparative analysis of simulation experiments with other algorithms proves that the rational optimization of the research content in this paper plays a higher security role.

1. Introduction

The intelligent network is designed to combine traditional network and information network technologies to encourage family users to actively manage daily energy consumption and efficiently provide reference information needed by power supply companies for planning and regulation. Although the deployment of intelligent networks can bring huge socioeconomic benefits, severe information security risks also follow. During the transmission of information data, illegal attackers can master user’s life habits by maliciously eavesdropping on the data, which can also cause huge property losses to users or suppliers by maliciously tampering with the data [1, 2].

The network privacy protection research is usually dedicated to solve two kinds of security risks: intelligent terminal identity security risks and intelligent terminal data security risks. Identity security needs to consider the problem of identity distribution of each entity in the intelligent network and the problem of mutual authentication among different domains. Data security needs to ensure the confidentiality and integrity of the data to avoid data loss or leakage.

The work in the paper makes full use of decentralized computing and storage resources to achieve a better user experience, and its specific contributions are as follows [35]:

(1) Lightweight Key Agreement Identity Authentication to Achieve Privacy Data Integrity. A key agreement scheme based on elliptic curve is applied to the identity authentication between layers, which can avoid bilinear pairing, and effectively reduces the calculation overhead. In addition, a certificateless mode is adopted in the paper, which effectively avoids the case of dishonest key generation center eavesdropping and forging user signatures.

(2) Achieving Fine-Grained Aggregation of Data Privacy and Confidentiality. The Paillier encryption algorithm is used to process private data, and its additive homomorphism is applied to sum the intelligent terminal data in an encrypted state, so that data aggregation on the premise of protecting the privacy of personal information can be completed. Therefore, the data aggregation is completed under the premise of protecting the privacy of personal information, which effectively resists the eavesdropping attack brought by the curiosity of fog node.

(3) Realizing Multigranular Security Aggregation of Cloud-Fog Collaboration. The Horner rules are used for further coarse-grained aggregation of fog node data, and the least multiplication operation strategy is applied to speed up the operation. Meanwhile, the final data results can be accurate to the range of a single fog node area and also ensure that the fog cloud cannot obtain personal information data, which is enough to provide differentiated user data services.

2. Materials and Methods

A fog computing network architecture suitable for intelligent network data collection, processing, and transmission is built in the paper, as shown in Figure 1. It consists of 4 layers: equipment layer, fog layer, cloud layer, and EPSI. In the constructed system model, cloud node coverage is divided into subregions, and each region is assigned 1 jog node , which corresponds to fog1, fog2, …, , and there are the numbers of intelligent terminal (it indicates the th intelligent terminal device under the th fog node, ) of in the coverage of each fog node [6, 7].

As can be seen from Figure 1, the system model mainly includes the following five entities: KGC (key generation center), intelligent terminal, fog node, cloud node, and EPSI (electric power service institutions).

(1) KGC. It is a third party that is not completely trusted and is mainly responsible for generating various keys and sending them to various entities, which has relatively strong computing power [8, 9].

(2) Intelligent Terminal. The user information data are collected in real time, and it is encrypted. After negotiating with the corresponding fog node key, the encrypted data are signed and uploaded to the corresponding fog node periodically to wait for aggregation [10, 11, 15]. In addition, the user can send a request to the corresponding fog node to view the real-time data of the total amount of information in its coverage area so as to understand the regional information.

(3) Fog Node. It locates in the middle layer of intelligent terminal and cloud node, which dedicates to fully tap local computing power. There is a fog node in each subarea, and the fog node interacts with the intelligent terminal within its coverage area, which can effectively resist malicious injection attacks through identity authentication technology, perform fine-grained aggregation on the authenticated data, and forward the aggregated data to the corresponding cloud node.

(4) Cloud Node. The cloud receives the aggregated cipher text from each fog node in its coverage area, avoids malicious injection through identity authentication, and uses Horner rules for the second aggregation to obtain a coarse-grained aggregation result [1214]. In addition, the cloud node sends coarse-grained aggregated data to EPSI through a secure channel.

(5) EPSI. EPSI receives the coarse-grained aggregated data from the cloud node, and it first parses at a high speed to obtain the fine-grained aggregated cipher text of each fog node. Then, decryption is performed to obtain the plain text of the information amount of each subregion, and plain texts are summed. Thus, the total amount of information covered by the cloud is obtained, and multigranular real-time data basis is provided for scheduling. Meanwhile, EPSI can also aggregate real-time data of subregions and send them back to each fog node through the “cloud-fog” communication link so that the user can query the amount of information. This operation not only saves the computing resources of the cloud but also enables the user to query the information in real time with low latency.

The communication link between KGC and intelligent terminal, fog node, cloud node, and EPSI and the communication link between the cloud node and EPSI are credible, while the communication links between other layers are not safe. The paper mainly considers the following three threats [1518]: (1)There are threats on the fog and cloud nodes. The fog and cloud nodes are generally considered to be honest and trustworthy, which will follow the protocol and are trustworthy in most cases. However, it cannot be ignored that the fog node and the cloud node also have the possibility of being captured. Therefore, the system must ensure that the fog node and the cloud node cannot obtain the private user’s private data in plain text; that is, the data cannot appear in plain text in the fog node and the cloud node. Meanwhile, the fog node and the cloud node cannot have the decryption key, which can ensure the security of the system(2)The eavesdropper threatens to eavesdrop on the communication link. The eavesdroppers may obtain user privacy data by eavesdropping on the communication link. Therefore, the system must ensure that the privacy data of a single user does not appear in each communication link; that is, the data exists in the form of cipher text during the transmission of each communication link. At the same time, the key generation center only sends the decryption key to the intelligent terminal and EPSI through the trusted secret channel, and the communication links from intelligent terminal to the fog node, the fog node to the cloud node and the cloud node to EPSI will not transmit the decryption key, and eavesdroppers will not be able to eavesdrop on the decryption key. It ensures that even if eavesdroppers eavesdrop on the information from the communication link, they will not be able to crack user’s private data(3)The threat of an attacker actively attacking. In addition to launching passive attacks through eavesdropping, attackers can also maliciously inject through camouflage and other methods, thereby destroying the authenticity and integrity of private data. Therefore, before receiving the data and performing the protocol operation, the fog node or the cloud node must authenticate the identity through key agreement to ensure that the data comes from the legal entity, and the data is sent to the legal entity

3. Results and Discussion

EPSI’s scheduling analysis depends on the real-time information volume of each area, so the data will be read to the intelligent terminal of each area at a fixed time interval. However, there is a certain risk of privacy leakage in the process of reading and transmitting data, and there is a problem that the communication overhead of traditional data transmission is relatively large. Therefore, homomorphic encryption is used in the paper to ensure the privacy and confidentiality of data during transmission. What is more, the multigranular aggregation of the fog layer and the cloud layer can effectively reduce the amount of data transmitted, thereby reducing transmission consumption [19]. In particular, the data results of multigranularity aggregation can also improve the flexibility of scheduling. With the help of a lightweight identity authentication scheme with low computing overhead, it can save fog and cloud computing resources while resisting camouflage attacks.

The privacy protection data aggregation scheme proposed in the paper consists of the key generation and distribution, the intelligent terminal data report, the fog node fine-grained report, the cloud node coarse-grained aggregation report, and EPSI aggregation report reading 5 parts.

3.1. Key Generation and Distribution
3.1.1. Paillier Key Generation and Distribution

KGC first randomly selects two large prime numbers and to satisfy and calculates as the public key for homomorphic encryption. Assuming , is calculated [2022], a random integer is chosen to ensure the existence of . The public key is (, ), and the private key is (, ). The key generation center sends the same set of public and private keys to each intelligent terminal within the coverage of the same fog node and sends the corresponding public key to the fog node, which provides the public and private keys to EPSI.

3.1.2. Key Generation and Distribution in the Key Agreement Part

KGC randomly selects large prime numbers , , and to generate a pseudorandom elliptic curve and determines the generator . If is a base point of order on the elliptic curve, and the cyclic group generated by the base point will be . Then, a secure hash function is selected. The construction method of is to first perform the point multiplication operation on the elliptic curve to obtain the point , add the horizontal and vertical coordinate values of , and then modulo to complete the hash operation. The structure of is direct modulo. The construction method of is to first add the points of 3 points on the elliptic curve, then do the point multiplication, and add the two coordinate values to do a hash operation [23].

KGC randomly generates , calculates , publicizes the parameters (, , , , , and ), and keeps it confidential . Each intelligent terminal , fog node , and cloud node select account , , and to, respectively, register. After successful registration, KGC provides the intelligent terminal with a partial private key , intelligent terminal public key , and fog node public key and . Next, KGC provides the fog node with some private keys , intelligent terminal public key , fog node public key , cloud node public key and . Finally, KGC provides the cloud node with some private key , cloud node public key , fog node public key and [24, 25].

Among them, for the account , KGC selects , generates a public key , and produces a partial private key , thereby computing for calculating the final . For the account identity , KGC generates the public key and part of the private key and also computes to calculate the final . For the account IDcloud, KGC generates the public key and part of the private key and computes to calculate the final . KGC sends these public keys and some private keys to intelligent terminal , fog node fogj, and the cloud node through secure channels, respectively [26, 27].

After obtaining the public and private keys, user can determine whether some of the private keys given by KGC are valid by calculating whether is established. In addition, fog node fogj and the cloud node are the same.

3.2. Intelligent Terminal Data Report

In order to prevent the user’s private data from being exposed to eavesdroppers in the “intelligent terminal-fog” communication link, the private data in the paper are chosen to encrypt in the intelligent terminal. Moreover, the data generated by the intelligent terminal is generally uploaded to the fog node periodically, assuming that the time gap is 15 min. Then, the intelligent terminal encrypts the real-time information data every 15 minutes, generates a signature on the encrypted data after the two parties of the transmission complete the key agreement, and uploads the data report to the corresponding fog node, and finally, waits for the fog node to aggregate it [28, 29].

Assuming that there are intelligent terminals in a subregion, the information stored in the intelligent terminal in the subregion is (, ), and intelligent terminal will perform the following operations.

3.2.1. Key Negotiation between the Fog Node and Intelligent Terminal

In order to prevent attackers from impersonating intelligent terminal and injecting false data or impersonating the fog node to eavesdrop on the data, this scheme builds a lightweight identity authentication based on the elliptic curve to confirm the identity of the operation user.

In order to prevent an attacker from eavesdropping on the key from KGC and pretending to be an intelligent terminal or node, the public key and some private keys are generated by KGC during system initialization. The long-term private key and temporary private key are generated by the intelligent terminal node itself, and the long-term private key and temporary private key are generated by the fog node itself.

Given the user identity , it calculates and sends the message to fog node , where nonce is the current time stamp. Next, wait for fog node reply report. If the reply report is a retransmission command, then rekey negotiation will be performed. If the response report is , then determine whether the nonce is the time stamp sent by the intelligent terminal before. If it is, then calculate the according to the formula to determine whether is established. If it is true, according to formula (2), calculate , , and . if it is not true, the negotiation fails, and fog node will be required to resend the verification message. Finally, user calculates the value according to

3.2.2. Raw Data Perception

The intelligent terminal uploads data every 15 minutes and generally consists of one integer and several decimals. In order to ensure the normal operation of the Paillier algorithm, the original data is multiplied by before encryption and a rounding operation is performed to retain digits after the decimal point. Three digits after the decimal point are retained in the simulation verification, but the proposed scheme can be generalized to more than one decimal point. It is calculated as follows:

The more the number of reserved data bits, the greater the data calculation and transmission consumption will be, but the accuracy of the same data will be higher.

3.2.3. Original Data Encryption

In order to ensure the confidentiality of private data, this section uses the Paillier algorithm to encrypt the intelligent terminal to protect it from the threat of malicious attacks. In this encryption scheme, it is assumed that each intelligent terminal and EPSI shares a private key and a public key, but the private key is completely hidden from the fog node and the cloud node. In particular, the public key and the private key have been generated and distributed by KGC in the generation of system parameters. The encryption process of private data is as follows: random number is selected, and for any plain text , the public key (, ) is used to encrypt the cipher text CCCC obtained as

Each intelligent terminal packages the encrypted data and session key into an intelligent terminal data report, which is uploaded to the corresponding fog node every 15 minutes.

3.3. Fog Node Fine-Grained Aggregation Report

The operation of directly uploading explosively increased intelligent terminal data to the cloud will generate a large amount of transmission energy consumption and increase the bandwidth burden, which can make it difficult to meet the needs of low-latency transmission. Therefore, this section reduces the data traffic at the core network by introducing a fog node and further reduces the amount of data by performing relevant calculations at the fog node, which can reduce data transmission energy consumption. What is more, the Paillier algorithm used by intelligent terminal encryption has good addition homomorphism, which can support the addition calculation of data in the encrypted state, and obtain the correct data result after decryption. In addition, this homomorphic encryption feature ensures the privacy of the data on the fog side, even if an attacker maliciously eavesdrops, who cannot obtain the private data plain text, thereby effectively protecting the data security.

3.3.1. Identity Negotiation between the Fog Node and Intelligent Terminal

Given the fog node identity , it checks whether the nonce sent from the intelligent terminal is time-sensitive; that is, the current time stamp nonce is obtained and verified whether is established. If it is not established, the key negotiation fails, and user will be required to resend the authentication message. If it is true, will be calculated according to the formula to determine whether is true. If it is true, the formulas (6), (7), and (8) will calculate and will be returned to user

Then, according to formula (9), , , and are calculated.

Finally, fog node calculates the value according to

3.3.2. Fog Node Identity Authentication

The session key is extracted from the data report sent from the intelligent terminal and compared with the corresponding session key in the fog node. If they are consistent, the encrypted data in the data report will be received and will wait for the next aggregation. If they are inconsistent, they will be discarded. So far, the key agreement and identity authentication between the device layer and the fog layer are completed. The complete process is shown in Figure 2

3.3.3. Fog Node Fine-Grained Aggregation

At the fog node, for the data , it is encrypted in the user report sent by the coverage intelligent terminal and added aggregation; that is, the data is multiplied in :

3.3.4. Fog Node and Cloud Node Key Agreement

Before uploading, a key agreement is performed on the fog node fogj and cloud node again to calculate the session key Kj

3.3.5. Fog Node Fine-Grained Aggregation Report Generation

The aggregated cipher text and session key of fog node are packaged into a fine-grained aggregated report of the fog node and sent to the corresponding cloud node

3.4. Cloud Node Coarse-Grained Aggregation Report

The cloud received encrypted aggregate data from fog nodes within the coverage of the cloud node. In order to perform multigranular aggregation on the data in this area, the data obtained after the final EPSI decryption can be accurate to the fog node layer, and Horner rules are introduced in this section to complete the coarse-grained aggregation of the data. Horner rules can not only provide aggregation and parsing operations, since they use the least multiplication strategy, but also reduce the energy consumption caused by the calculation.

3.4.1. Cloud Node and Fog Node Key Agreement

Given the cloud node identity , key agreement is performed with fog node and the session key is calculated.

3.4.2. Cloud Node Identity Authentication

The session key from the fog node fine-grained aggregation report is compared with the corresponding session key in the cloud node. If they are consistent, the fine-grained aggregated data will be received in the fog node report and the next aggregation will be waited for. If they are inconsistent, they will be discarded.

3.4.3. Cloud Node Coarse-Grained Aggregation

For the fog-level fine-grained aggregated data set from the fog node, is selected to satisfy as a parameter for Horner aggregation.

3.4.4. Cloud Node Coarse-Grained Aggregation Report Generation

The intelligent terminal data within the coverage of a cloud node is aggregated into a data in the cloud and transmitted to EPSI through a secure channel.

3.5. EPSI Aggregation Report Reading

EPSI receives coarse-grained aggregated data from the cloud . Due to the resolvability of Horner’s rule, the aggregated data can be parsed into fog-level fine-grained aggregated data of fog nodes to provide differentiated data services for users.

3.5.1. Horner Analysis

The coarse aggregated data Sumc is analyzed in the cloud.

Through the Horner rule analytical formula, the fine-grained aggregated data of each fog node is obtained.

3.5.2. Decryption of Fog-Level Fine-Grained Aggregated Data

The fog-level fine-grained aggregated data is decrypted to obtain the plaintext of the fine-grained aggregated data in each fog node

Since the original data is multiplied by before, the original data is uploaded and the rounding operation is performed to retain the digits after the decimal point. After EPSI decrypted the privacy protection data to obtain the plain text , it is necessary to divide the data by to restore the data.

EPSI performs data mining on the fine-grained aggregated data of these fog nodes, and the cloud-level aggregated data are obtained by adding them together to provide differentiated real-time data support for scheduling.

In addition, EPSI can also package and send the fine-grained aggregated data of each subregion in plain text back to the fog node of each subregion, so that users can query with low latency and save EPSI computing processing resources.

4. Discussion

4.1. Security Analysis

This part mainly analyzes the security of this scheme from the aspects of privacy, confidentiality, and integrity and compares the security with the existing privacy protection data aggregation PPADA scheme.

4.1.1. Privacy

Privacy data is always encrypted when it is uploaded to the fog node and the cloud node which do not have permission to obtain the decryption key. Therefore, even if the fog node or the cloud node tries to eavesdrop on the private data, it can only obtain the private data cipher text instead of the plain text. Finally, EPSI sends the total real-time information of each sub-region to the fog node in plain text. At this time, the fog node and the cloud node receive the total information volume of the subregion instead of the information volume of a single user, which can guarantee the privacy of data and effectively respond to threats on the fog node and the cloud node.

4.1.2. Confidentiality

Privacy data is encrypted when it is transmitted in each unsecured communication link of the system model, and even if the eavesdropper eavesdrops on the private data cipher text, it cannot obtain valid data plain text without the decryption key. Finally, when EPSI sends the real-time data of each subregion back to the fog node, the transmission data is the total information volume of the subregion instead of the information volume of a single user, which does not expose user privacy. Therefore, it guarantees the confidentiality of the data and can effectively deal with the threat of eavesdropper eavesdropping on the communication link.

4.1.3. Integrity

The solution in this paper uses a lightweight key agreement identity authentication. Before each data is uploaded, the two parties of the session conduct a key agreement to facilitate identity authentication when the data is uploaded. Once the session keys of the two parties are inconsistent, if one of the two parties in the session or both parties are not legal entities but the attacker is disguised, the identity authentication will fail, and the data will be discarded and reissued. Moreover, the identity authentication scheme effectively avoids malicious injections caused by the identity masquerading of the data sender and node eavesdropping attacks caused by the identity masquerading of the data recipient, which can ensure the integrity of the data.

4.1.4. Security Comparison

The PPADA scheme, respectively, uses the Paillier encryption scheme and blind signature to ensure the confidentiality and integrity of the data. However, since the private data is decrypted in the fog node and compiled into the database, the privacy of the data cannot be guaranteed at this time. In particular, the data aggregation scheme combining the Horner rule and the Paillier encryption algorithm proposed in the paper can meet this challenge. While ensuring data privacy, the electricity bill is directly generated by the control center and passed back to each user through the fog node.

In summary, the scheme in the paper can guarantee the privacy, confidentiality, and integrity of data during transmission, which has more advantages in terms of security.

4.2. Identity Authentication Performance

The performance of the identity authentication scheme is mainly compared in three aspects: the number of operations, the number of dot multiplications, and the number of communications between both parties in the key agreement. Security starts with four aspects: antieavesdropping on session keys, antieavesdropping on long-term public keys, antispoofing attacks, and two-way authentication. Compared with the scheme, the performance and safety are compared as shown in Table 1.

The number indicates the number of times, “√” indicates that this aspect of security, and “×” indicates that it does not have this aspect of security. In particular, “Φ1” stands for antieavesdropping of session keys, “Φ1” refers to antieavesdropping of long-term public keys, and “Φ1” indicates anti-identity fraud attacks. “Φ1” stands for two-way authentication.

As shown in Table 1, the identity authentication scheme in the paper is lower than other operations, point multiplication, and communication times, which reflects its lightness and also has the characteristics of antieavesdropping of session keys, antieavesdropping of long-term public keys, anti-identity fraud attacks, and two-way authentication. Through the comparison of the seven performance indicators in Table 1, the solution proposed in the paper is more secure than that of the literature.

4.3. Performance Comparison Test

The performance of the proposed solution is evaluated in terms of the computational cost of each entity, communication overhead between entities, and resource distribution and compared with the existing PPUAC scheme, PADF scheme, and the constructed one-time aggregation scheme (called SIG-ADD), where the SIG-ADD achieves the same result as this solution; that is, EPSI can obtain the fine-grained aggregated data of each fog node in plain text. Supposing that the fog node performs fine-grained aggregation on the data from the intelligent terminal in the coverage area, then it is up loaded to the cloud node. What is more, the cloud node no longer aggregates the data but directly forwards it to EPSI, and EPSI uses the Paillier decryption algorithm to solve each fog node granular aggregated data plain text. The simulation data in this part comes from the real data of residents provided by the Energy Control Committee of the Irish Social Science Data Archive, which is shown in Table 2.

A large prime number and are taken to generate the curve used for key negotiation, and Paillier-encrypted large prime numbers and are randomly generated by a big integer class.

4.3.1. Calculation Overhead

Assuming that the EPSI management area is divided into sub-areas, there is one cloud node under each subarea, there are fog nodes under each cloud node, and there are intelligent terminals in each fog node area. In the simulation, it is assumed that there is 1 cloud node, i.e., ; there are 3 fog nodes, i.e.,

The symbol represents the computational cost of an exponential operation on , the symbol refers to the computational cost of an exponential operation on , the symbol represents the computational cost of a multiplication operation on , and the computational cost of bilinear pair operation is . (i)Intelligent Terminal. Both the scheme in the paper and the SIG-ADD scheme use the Paillier algorithm for encryption, which requires a total of times exponential modulus finger operations , and the key negotiation part requires a times dot product algorithm. In particular, the PPUAC scheme requires times exponential modulus multiplications and times multiplication , while the PDAF scheme requires exponential modulus multiplications , times multiplications , and twice times bilinear pair calculation .(ii)Fog Node fogj. In order to complete fine-grained aggregation, the scheme of this paper and the SIG-ADD scheme need to perform times of multiplication operations on and perform the key agreement () times multiplication algorithm. In addition, the PPUAC scheme requires () times bilinear pair calculation and times to multiply , while the PDAF scheme requires () times bilinear pair calculation and () times exponential modular multiplication operation .(iii)Cloud Node. In the scheme of this paper, when performing coarse-grained aggregation, times upper multiplication and key agreement times the dot product algorithm on are performed. The SIG-ADD scheme only performs times the dot product algorithm for key agreement, and the PPUAC scheme performed () times bilinear pair calculation and the times the multiplication of on the cloud node.(iv)EPSI. The decryption of this program and the SIG-ADD program requires times exponential modulus finger operation and times upper modulus operation . In addition to these calculation overheads, the PPUAC scheme also needs to perform times bilinear pair calculation . In addition to the above calculation overhead, the PDAF scheme also needs to perform times bilinear pair calculation .

Among them, the upper multiplication operation is negligible relative to and , and the point multiplication operation on the elliptic curve is generally replaced by cumulative point addition, and it can also be ignored.

The comparison of the computational costs of the four schemes in the entire system model is shown in Figure 3.

It can be seen that the calculation overhead generated by the scheme in this paper and the SIG-ADD scheme in the entire system model is almost the same and is much smaller than the PPUAC scheme and PDAF scheme. As the number of intelligent terminals increases, this advantage is more obvious. Since the scheme in this paper adopts a lightweight key agreement identity authentication scheme and compares with the complicated and cumbersome bilinear pairing authentication, the calculation overhead generated is smaller.

4.3.2. Communication Overhead

Supposing that the symbol indicates the length of data sent by the intelligent terminal user to the corresponding fog node, the symbol indicates the length of data sent by the fog node to the corresponding cloud node, the symbol indicates the length of data sent by the cloud node to EPSI. If the parameter is 64 bits, then the number of Paillier cipher text data bits will be 128 bits. So, it is

Then, the total communication cost of this solution is

Among them, the and of the SIG-ADD scheme are consistent with the calculation formula of this scheme, while the calculation formula of is

Therefore, the total communication cost of the SIG-ADD scheme is

Supposing there are 3 cloud nodes, the length of each ID is 160 bits and the length of each session key is 256 bits, the communication overhead of the scheme in this paper, the SIG-ADD scheme, the PPUAC scheme, and the PDAF scheme are analyzed in the intelligent terminal to the cloud node, cloud node to EPSI communication link under different fog node numbers. Figure 4 shows a comparison of the communication overhead of the four schemes for transmitting data on the link between the intelligent terminal and cloud node.

Figure 5 shows the comparison of the communication overhead of the four schemes for transmitting data on the link between the cloud node and EPSI.

It can be seen from Figures 4 and 5 that in the communication link from the intelligent terminal to cloud node, the communication overhead of the PPUAC scheme and the PDAF scheme continues to increase with the increase of the f5og node. When the number of the fog node is 5, the communication overhead has, respectively, reached 13000 bits and 12000 bits. Meanwhile, the communication overhead of this scheme and the SIG-ADD scheme is almost the same at this stage. In the communication link from the cloud node to EPSI, the communication overhead of the SIG-ADD scheme increases linearly with the increase of the number of fog nodes, and when the number of fog nodes exceeds 3, the communication overhead has reached more than 8000 bits. The communication overhead of the scheme of this paper, PPUAC scheme, and PDAF scheme is maintained at the same level and the communication overhead of this scheme is lower. In summary, the total communication overhead of the solution in this paper on the entire communication link is much lower than that of the other three solutions. Additionally, as the fog node increases, the advantages of this solution are more obvious. It shows that the scheme in this paper is a lightweight privacy data multilevel aggregation scheme. Based on lightweight identity authentication and multilevel aggregation considerations, the data transmission overhead is effectively reduced.

4.3.3. Resource Distribution Assessment

Different intelligent environments have different intelligent node networks and different rule sets. In order to verify the effectiveness of the distribution algorithm in the paper, the distribution mechanism in the paper is compared with the centralized distribution and ordinary distribution mechanisms. The two sets of data are designed as follows.

Under the same simulation environment of the intelligent node network, six groups of experiments with an increasing number of rules are set. The experiment numbers and corresponding rules are shown in Table 2, and the (total) obtained by the above three allocation mechanisms in six sets of experiments is shown in Figure 6.

As can be seen from Figure 6, as the rules grow, the inference network becomes more complicated, and the delay of the centralized distribution increases sharply. Meanwhile, the real-time performance is very poor. Compared with the other three distributed real-time performances, the real-time performance has been significantly improved. Moreover, the real-time performance has been further improved on the basis of ordinary distribution with the algorithm proposed in the paper.

For the centralized distribution, it is not necessary to evaluate the resource balance. The Stdsen obtained by the distributed mechanism in six sets of experiments is shown in Table 3.

From Table 3, it can be obtained that the resource utilization of the algorithm in the paper is obviously better than that of the other three distributed types, and the optimization degree is more obvious when the number of rules is large.

5. Conclusions

A data aggregation scheme for intelligent network security and privacy protection in the paper is proposed based on fog computing in view of the hidden security risks faced by intelligent network data collection and transmission. Moreover, the key generation center in the solution is not completely trusted. In particular, by means of the point-plus-add feature of the elliptic curve, the authentication speed can be sped up. Meanwhile, with the advantage of data aggregation, the amount of data transmission can be lowered, which further reduces communication overhead. Therefore, simulation experiments have further confirmed the performance advantages of the proposed scheme in terms of security, practicality, calculation, and communication overhead. In the future, the theory of data space-time compression and network resource optimization will be considered integrating to further improve network system performance.

Data Availability

All data included in this study are available upon request by contact with the corresponding author.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.