Research on the privacy protection model of government cyber security in smart cities based on big data

被引:0
作者
Chen G. [1 ]
Wang H. [1 ]
机构
[1] School of Information and Electronic Engineering, Lu’an Vocational Technical College, Lu’an
关键词
D-SMART algorithm; fusion accuracy; network security; privacy protection; SMART algorithm;
D O I
10.1504/IJWET.2023.133615
中图分类号
学科分类号
摘要
With the escalation of hacking methods, the existing network security privacy model can no longer fully guarantee the security of private information. To solve the problem of poor security performance of the traditional privacy protection model, the research proposes an improved privacy protection algorithm based on the SMART algorithm by optimising the hierarchical processing of the original sensing data, which encrypts and protects the private data, and embeds the privacy protection algorithm into the government network security privacy protection model. The experimental results show that proposed algorithm has a privacy exposure probability of 0.05, a fusion accuracy of 89% and a network energy consumption of 82.5%, which is all better than comparison algorithms. It can provide better security protection to the government cybersecurity privacy protection model, and also provide a new idea for the privacy protection method of the privacy protection model. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:202 / 220
页数:18
相关论文
共 22 条
[1]  
Ahire P., Abraham J., Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques, Theoretical Computer Science, 922, 15, pp. 131-149, (2022)
[2]  
Aljeraisy A., Barati M., Rana O., Perera C., Privacy laws and privacy by design schemes for the internet of things: a developer’s perspective, ACM Computing Surveys, 54, 5, pp. 1-38, (2021)
[3]  
Du H., Chen L., Qian J., Hou J., Jung T., Li X.Y., PatronuS: a system for privacy-preserving cloud video surveillance, IEEE Journal on Selected Areas in Communications, 38, 6, pp. 1252-1261, (2020)
[4]  
Fang X., Luo J., Luo G., Wu W.W., Cai Z.P., Pan Y., Big data transmission in industrial IoT systems with small capacitor supplying energy, IEEE Transactions on Industrial Informatics, 15, 4, pp. 2360-2371, (2019)
[5]  
He W., Liu X., Nguyen H., Nahrstedt K., Abdelzaher T., PDA: privacy-preserving data aggregation in wireless sensor networks, 26th IEEE International Conference on Computer Communications, 3, pp. 2045-2053, (2007)
[6]  
Herley C., Van Oorschot P.C., Science of security: combining theory and measurement to reflect the observable, IEEE Security & Privacy, 16, 1, pp. 12-22, (2018)
[7]  
Hu Z., Li D., Improved heuristic job scheduling method to enhance throughput for big data analytics, Tsinghua Science and Technology, 27, 2, pp. 344-357, (2022)
[8]  
Luo B., Li X., Weng J., Guo J., Ma J., Blockchain enabled trust-based location privacy protection scheme in VANET, IEEE Transactions on Vehicular Technology, 69, 2, pp. 2034-2048, (2020)
[9]  
Lv Z., Qiao L., Hossain M.S., Choi B.J., Analysis of using blockchain to protect the privacy of drone big data, IEEE Network, 35, 1, pp. 44-49, (2021)
[10]  
Ni P., Liu B., He G., An online optimization strategy for a fluid catalytic cracking process using a case-based reasoning method based on big data technology, RSC Adv, 11, 46, pp. 28557-28564, (2021)