Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment

被引:3
作者
Alrayes, Fatma S. [1 ]
Maray, Mohammed [2 ]
Alshuhail, Asma [3 ]
Almustafa, Khaled Mohamad [4 ,5 ]
Darem, Abdulbasit A. [6 ]
Al-Sharafi, Ali M. [7 ]
Alotaibi, Shoayee Dlaim [8 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] King Khalid Univ, Coll Comp Sci, Dept Informat Syst, Abha, Saudi Arabia
[3] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Informat Syst, Al Hufuf, Saudi Arabia
[4] Gulf Univ Sci & Technol GUST, Dept Elect & Comp Engn, Hawally 32093, Kuwait
[5] GUST Engn & Appl Innovat Res Ctr GEAR, Mishref, Kuwait
[6] Northern Border Univ, Ctr Sci Res & Entrepreneurship, Ar Ar 73213, Saudi Arabia
[7] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci & Artificial Intelligence, Bisha 67714, Saudi Arabia
[8] Univ Hail, Coll Comp Sci & Engn, Dept Artificial Intelligence & Data Sci, Hail, Saudi Arabia
关键词
Privacy-preserving; Ensemble model; Linear scaling normalization; High-dimensional; Big data; Intrusion detection; INTRUSION DETECTION; BLOCKCHAIN; MACHINE; SYSTEM;
D O I
10.1038/s41598-025-87454-1
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In the present digital scenario, the explosion of Internet of Things (IoT) devices makes massive volumes of high-dimensional data, presenting significant data and privacy security challenges. As IoT networks enlarge, certifying sensitive data privacy while still employing data analytics authority is vital. In the period of big data, statistical learning has seen fast progressions in methodological practical and innovation applications. Privacy-preserving machine learning (ML) training in the development of aggregation permits a demander to firmly train ML techniques with the delicate data of IoT collected from IoT devices. The current solution is primarily server-assisted and fails to address collusion attacks among servers or data owners. Additionally, it needs to adequately account for the complex dynamics of the IoT environment. In a large-sized big data environment, privacy protection challenges are additionally enlarged. The data dimensional can have vague meaningful patterns, making it challenging to certify that privacy-preserving models do not destroy the efficacy and accuracy of statistical methods. This manuscript presents a Privacy-Preserving Statistical Learning with an Optimization Algorithm for a High-Dimensional Big Data Environment (PPSLOA-HDBDE) approach. The primary purpose of the PPSLOA-HDBDE approach is to utilize advanced optimization and ensemble techniques to ensure data confidentiality while maintaining analytical efficacy. In the primary stage, the linear scaling normalization (LSN) method scales the input data. Besides, the sand cat swarm optimizer (SCSO)-based feature selection (FS) process is employed to decrease the high dimensionality problem. Moreover, the recognition of intrusion detection takes place by using an ensemble of temporal convolutional network (TCN), multi-layer auto-encoder (MAE), and extreme gradient boosting (XGBoost) models. Lastly, the hyperparameter tuning of the three models is accomplished by utilizing an improved marine predator algorithm (IMPA) method. An extensive range of experimentations is performed to improve the PPSLOA-HDBDE technique's performance, and the outcomes are examined under distinct measures. The performance validation of the PPSLOA-HDBDE technique illustrated a superior accuracy value of 99.49% over existing models.
引用
收藏
页数:27
相关论文
共 93 条
[1]   Cloud Network Anomaly Detection Using Machine and Deep Learning Techniques- Recent Research Advancements [J].
Abdallah, Amira Mahamat ;
Alkaabi, Aysha ;
Alameri, Ghaya ;
Rafique, Saida Hafsa ;
Musa, Nura Shifa ;
Murugan, Thangavel .
IEEE ACCESS, 2024, 12 :56749-56773
[2]  
AbdelMouty A. M., 2022, J. Intell. Syst. Internet Things, V7
[3]   Optimizing Smart Home Intrusion Detection With Harmony-Enhanced Extra Trees [J].
Abdusalomov, Akmalbek ;
Kilichev, Dusmurod ;
Nasimov, Rashid ;
Rakhmatullayev, Ilkhom ;
Im Cho, Young .
IEEE ACCESS, 2024, 12 :117761-117786
[4]   Comprehensive survey of artificial intelligence techniques and strategies for climate change mitigation [J].
Amiri, Zahra ;
Heidari, Arash ;
Navimipour, Nima Jafari .
ENERGY, 2024, 308
[5]   An artificial intelligence approach for energy-aware intrusion detection and secure routing in internet of things-enabled wireless sensor networks [J].
Aruchamy, Prasanth ;
Gnanaselvi, Sabeena ;
Sowndarya, Devi ;
Naveenkumar, Pushpalatha .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (23)
[6]   Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies [J].
Asadi, Mehdi ;
Jamali, Mohammad Ali Jabraeil ;
Heidari, Arash ;
Navimipour, Nima Jafari .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (11)
[7]  
Babu C. S., 2025, Scalable Modeling and Efficient Management of IoT Applications, P153
[8]   Fog-Sec: Secure end-to-end communication in fog-enabled IoT network using permissioned blockchain system [J].
Babu, Erukala Suresh ;
Rao, Mekala Srinivasa ;
Swain, Gandharba ;
Nikhath, A. Kousar ;
Kaluri, Rajesh .
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (05)
[9]   Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks [J].
Babu, Erukala Suresh ;
Barthwal, Amogh ;
Kaluri, Rajesh .
COMPUTER COMMUNICATIONS, 2023, 199 :10-29
[10]   Optimizing data aggregation and clustering in Internet of things networks using principal component analysis and Q-learning [J].
Bajpai A. ;
Verma H. ;
Yadav A. .
Data Science and Management, 2024, 7 (03) :189-196