Tensor-based ranking-hiding privacy-preserving scheme for cloud-fog-edge cooperative cyber-physical-social systems

被引:0
作者
Yu, Jing [1 ]
Xiao, Yan [2 ]
Chi, Lianhua [3 ]
Zhang, Shunli [4 ]
Cui, Zongmin [5 ]
机构
[1] Jiujiang Univ, Sch Management, Jiujiang 332005, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[3] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic, Australia
[4] Qinghai Inst Technol, Sch Comp & Informat Sci, Xining 810016, Peoples R China
[5] JiuJiang Univ, Sch Comp & Big Data Sci, Jiujiang 332005, Peoples R China
关键词
Tensor-based ranking-hiding; Privacy-preserving data analysis; Cloud-fog-edge cooperation; Reliable rules; Cyber-physical-social systems;
D O I
10.1016/j.jnca.2025.104167
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Users living in Cyber-Physical-Social Systems (CPSS) generate massive amounts of data every day. The CPSS data may imply some reliable rules that can help CPSS better provide highly reliable services to humans. Nevertheless, the high-level reliable rules are very difficult to be mined and formalized. Therefore, we propose a Cloud-Fog-Edge Cooperative Reliable CPSS (CFECRC) framework for possibly adding reliable rules into CPSS. Ranked data is an important type of data in CPSS. How to design a secure, accurate and efficient ranking-hiding privacy-preserving scheme is a key challenge in CFECRC framework. However, existing privacy-preserving methods still have various shortcomings in the trade-off among privacy-preserving, analytic accuracy, and computational efficiency for ranking-hiding. To address the shortcomings, we propose a Tensor-based Ranking- Hiding Privacy-Preserving scheme (TRHPP) for CFECRC framework. First, we construct a set of 5th-order tensors to synthetically model item, user, location, time and weather as a whole to enhance analytic accuracy. Second, we obfuscate CPSS data and hide data ranking based on the obfuscated data to strengthen privacy- preserving and decrease computational overhead. The experimental results show that our scheme significantly outperforms existing classical schemes in privacy-preserving, analytic accuracy and computational efficiency simultaneously. This further verifies the feasibility of our framework.
引用
收藏
页数:11
相关论文
共 36 条
[1]   Panther: Practical Secure Two-Party Neural Network Inference [J].
Feng, Jun ;
Wu, Yefan ;
Sun, Hong ;
Zhang, Shunli ;
Liu, Debin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 :1149-1162
[2]  
Feng SS, 2015, PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), P2069
[3]   PBFL: A Privacy-Preserving Blockchain-Based Federated Learning Framework With Homomorphic Encryption and Single Masking [J].
Han, Baofu ;
Li, Bing ;
Jurdak, Raja ;
Zhang, Peiyun ;
Zhang, Hao ;
Feng, Pan ;
Yuen, Chau .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (10) :14229-14243
[4]   Mixture of latent multinomial naive Bayes classifier [J].
Harzevili, Nima Shiri ;
Alizadeh, Sasan H. .
APPLIED SOFT COMPUTING, 2018, 69 :516-527
[5]   RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks [J].
Issa, Wael ;
Moustafa, Nour ;
Turnbull, Benjamin ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :3772-3787
[6]   Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion [J].
Li, Songyuan ;
Tian, Hui ;
Shen, Hong ;
Sang, Yingpeng .
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2021, 10 (02)
[7]   Similarity-Based Label Inference Attack Against Training and Inference of Split Learning [J].
Liu, Junlin ;
Lyu, Xinchen ;
Cui, Qimei ;
Tao, Xiaofeng .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 :2881-2895
[8]   Privacy-Preserving Power System Obfuscation: A Bilevel Optimization Approach [J].
Mak, Terrence W. K. ;
Fioretto, Ferdinando ;
Shi, Lyndon ;
Van Hentenryck, Pascal .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2020, 35 (02) :1627-1637
[9]   Privacy-preserving Real-time Anomaly Detection Using Edge Computing [J].
Mehnaz, Shagufta ;
Bertino, Elisa .
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, :469-480
[10]  
Mei Lang, 2023, ACM Transactions on Information Systems, V42, P1