Privacy-Preserving Learning Model Using Lightweight Encryption for Visual Sensing Industrial IoT Devices

被引:2
作者
Deebak, B. D. [1 ]
Hwang, Seong Oun [1 ]
机构
[1] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
来源
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE | 2025年
基金
新加坡国家研究基金会;
关键词
Computational modeling; Sensors; Privacy; Data models; Visualization; Computer architecture; Data privacy; Accuracy; Hidden Markov models; Edge computing; Communication cost; convolution neural network; Industrial Internet of Things; machine-to-machine; privacy-preserving; visual sensing; PRESERVATION; AGGREGATION;
D O I
10.1109/TETCI.2024.3523771
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Technological convergence in visual sensing with industrial IoT (VSI-IoT) can bring numerous advances to large-scale crowd management systems like visual crowdsensing. VSI-IoT has significant features, including sensing, computing, analyzing, and storing, to address the issues of bearing failures, such as unplanned outages, increased downtime, and reduced operational efficiency. By contrast, providing privacy to the IIoT environments is a challenging task. Thus, this paper presents a novel privacy-preserving learning (PPL) mechanism that senses the defect rate of bearing failures using lightweight model aggregation at edge computing systems to preserve the privacy features. This convergence model synthesizes shape features comprehensively to transform the feature vectors into predictive functions that examine the categorization models using a two-dimensional convolution neural network (2D-CNN). Using security analysis, we demonstrate that the proposed PPL can achieve better privacy protection and model accuracy to preserve the learning features without additional verifiability. Further, the examination results showed that the proposed 2D-CNN with BN and LN consumed less computation complexity to achieve better detection accuracy (similar to 87.91.9% to similar to 99.98%) and communication cost $ (similar to 21.09MB to 23.92MB) over three bearing datasets (i.e., IMS-Rexnord, CWRU, and Paderborn) than other state-of-the-art approaches. Above all, the privacy preserving based AlexNet was implemented using CryptoNet and LoLa to show different sets of efficiencies such as processing time, privacy, and integrity checks to preserve system performance following time-sensitive application scenarios like supply-chain optimization.
引用
收藏
页数:18
相关论文
共 38 条
  • [1] Ali M., 2014, P 27 INT C IND ENG O, P3
  • [2] Aono Y., 2017, P 5 ACM INT WORKSH S, P35
  • [3] Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority (Extended Abstract)
    Applebaum, Benny
    Kachlon, Eliran
    Patra, Arpita
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT IV, 2022, 13510 : 33 - 56
  • [4] Bernstein DJ, 2011, LECT NOTES COMPUT SC, V6571, P128, DOI 10.1007/978-3-642-19379-8_8
  • [5] Chabanne H., 2017, IACR CRYPTOL EPRINT, V2017, P35
  • [6] A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks
    Chen, Biwen
    Wu, Libing
    Wang, Huaqun
    Zhou, Lu
    He, Debiao
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) : 5813 - 5825
  • [7] Deep-Learning Method Based on 1D Convolutional Neural Network for Intelligent Fault Diagnosis of Rotating Machines
    Chuya-Sumba, Jorge
    Alonso-Valerdi, Luz Maria
    Ibarra-Zarate, David I.
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (04):
  • [8] Dhinakaran D, 2024, Arxiv, DOI arXiv:2401.00794
  • [9] BlockDL: Privacy-Preserving and Crowd-Sourced Deep Learning Through Blockchain
    Hu, Shili
    Li, Jiangfeng
    Zhao, Qinpei
    Zhang, Chenxi
    Zhang, Zijian
    Shi, Yang
    [J]. 26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [10] Hybrid Device-to-Device and Device-to-Vehicle Networks for Energy-Efficient Emergency Communications
    Huang, Zhengrui
    [J]. IEEE SYSTEMS JOURNAL, 2023, 17 (04): : 5429 - 5440