Privacy and Accuracy for Cloud-Fog-Edge Collaborative Driver-Vehicle-Road Relation Graphs

被引:11
作者
Cui, Zongmin [1 ,2 ,3 ]
Lu, Zhixing [2 ]
Yang, Laurence T. [2 ,3 ,4 ]
Yu, Jing [1 ,2 ,3 ]
Chi, Lianhua [5 ]
Xiao, Yan [6 ]
Zhang, Shunli [1 ,2 ]
机构
[1] Jiujiang Univ, Sch Comp & Big Data Sci, Jiujiang 332005, Peoples R China
[2] Hainan Univ, Sch Comp Sci & Technol, Haikou 570228, Peoples R China
[3] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
[4] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[5] La Trobe Univ, Dept Comp Sci & Informat Technol, Melbourne, Vic 3086, Australia
[6] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Vehicles; Privacy; Roads; Collaboration; Data privacy; Computer science; Monitoring; Cloud-fog-edge collaborative driver-vehicle-road framework; relation graphs; privacy quality; analytic accuracy; self-adaptive evolution; HOMOMORPHIC ENCRYPTION; AUTHENTICATION SCHEME; DATA FUSION; FRAMEWORK; PREDICTION; NETWORKS; INTERNET;
D O I
10.1109/TITS.2023.3254370
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
There are three key roles in Intelligent Transportation Systems (ITS): driver, vehicle and road. However, existing static interactions among Driver-Vehicle-Road (DVR) are too passive to reflect the change of driver preferences, vehicle conditions, road conditions, etc. Therefore, we provide a data-driven Cloud-Fog-Edge Collaborative Driver-Vehicle-Road (CFEC-DVR) framework. The framework could self-adaptively evolves through continuous iteration to provide better ITS services for humans. The collaboration among DVR creates a lot of relation data that construct our relation graphs. Cloud brings some privacy risks. Relation graphs have great analytic value. As DVR collaboration, privacy quality and analytic accuracy are three key issues in the framework, we propose a Relation Graph Privacy-Preserving scheme with High Accuracy in our framework, which is named as RGPP-HA. Based on machine learning, our method nearly maximizes the difficulty for attackers to know exactly how many other roles are connected to the attacked role, which enhances the privacy quality. Meanwhile, we find as much valuable information as possible from roles' encrypted relations for more accurately analytic performance. Based on the experiments, we compare the proposed scheme RGPP-HA with existing classic and relevant schemes. The experimental results show that our scheme has the best privacy quality and analytic accuracy. This further verifies the feasibility of CFEC-DVR framework.
引用
收藏
页码:8749 / 8761
页数:13
相关论文
共 50 条
  • [1] Adaptive Distributionally Robust Optimization
    Bertsimas, Dimitris
    Sim, Melvyn
    Zhang, Meilin
    [J]. MANAGEMENT SCIENCE, 2019, 65 (02) : 604 - 618
  • [2] Malware Detection Based on Graph Attention Networks for Intelligent Transportation Systems
    Catal, Cagatay
    Gunduz, Hakan
    Ozcan, Alper
    [J]. ELECTRONICS, 2021, 10 (20)
  • [3] A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
    Cheon, Jung Hee
    Kim, Jinsu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (05) : 1052 - 1063
  • [4] Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem
    Cominetti, Eduardo Lopes
    Simplicio, Marcos A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2988 - 2998
  • [5] Diao ZL, 2019, AAAI CONF ARTIF INTE, P890
  • [6] A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing
    Ding, Xiaofeng
    Wang, Cui
    Choo, Kim-Kwang Raymond
    Jin, Hai
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (02) : 331 - 343
  • [7] Dong MX, 2014, IEEE CLOUD COMPUT, V1, P50, DOI 10.1109/MCC.2014.85
  • [8] Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks
    Dong, Mianxiong
    Ota, Kaoru
    Yang, Laurence T.
    Chang, Shan
    Zhu, Hongzi
    Zhou, Zhenyu
    [J]. COMPUTER NETWORKS, 2014, 74 : 58 - 70
  • [9] Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment
    Feng, Jun
    Yang, Laurence T.
    Zhu, Qing
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 857 - 868
  • [10] Spectral grouping using the Nystrom method
    Fowlkes, C
    Belongie, S
    Chung, F
    Malik, J
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2004, 26 (02) : 214 - 225