Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing

被引:2
作者
Han, Song [1 ,2 ]
Ma, Hui [1 ,2 ]
Taherkordi, Amir [3 ]
Lan, Dapeng [3 ]
Chen, Yange [1 ,2 ]
机构
[1] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
[2] Henan Int Joint Lab Polarizat Sensing & Intelligen, Xuchang, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
关键词
computer network security; data privacy; security of data; PUBLIC-KEY CRYPTOSYSTEM; SECURITY; PROTOCOLS; STORAGE; MODEL;
D O I
10.1049/cmu2.12749
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system. This paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. image
引用
收藏
页码:461 / 476
页数:16
相关论文
共 50 条
  • [1] A privacy-preserving data aggregation scheme for dynamic groups in fog computing
    Shen, Xiaodong
    Zhu, Liehuang
    Xu, Chang
    Sharif, Kashif
    Lu, Rongxing
    INFORMATION SCIENCES, 2020, 514 (514) : 118 - 130
  • [2] An Efficient Computing Offloading Scheme Based on Privacy-Preserving in Mobile Edge Computing Networks
    Pang, Shanchen
    Sun, Huanhuan
    Wang, Min
    Wang, Shuyu
    Qiao, Sibo
    Xiong, Neal N.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [3] Privacy-Preserving Fog Computing Paradigm
    Abubaker, Nabil
    Dervishi, Leonard
    Ayday, Erman
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 502 - 509
  • [4] An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things
    Huang, Yongfei
    Xu, Guangxia
    Song, Xiaoling
    Xu, Yuqing
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (05) : 2012 - 2026
  • [5] A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing
    Shen, Jian
    Yang, Huijie
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2198 - 2210
  • [6] Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing
    Li, Hongyang
    Cheng, Qingfeng
    Li, Xinghua
    Ma, Siqi
    Ma, Jianfeng
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1832 - 1841
  • [7] Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing
    Al-Otaibi, Basmah
    Al-Nabhan, Najla
    Tian, Yuan
    SENSORS, 2019, 19 (04)
  • [8] Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
    Koo, Dongyoung
    Hur, Junbeom
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 739 - 752
  • [9] Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme
    Cui, Jie
    Wei, Lu
    Zhong, Hong
    Zhang, Jing
    Xu, Yan
    Liu, Lu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (06) : 1191 - 1204
  • [10] Privacy-preserving governmental data publishing: A fog-computing-based differential privacy approach
    Piao, Chunhui
    Shi, Yajuan
    Yan, Jiaqi
    Zhang, Changyou
    Liu, Liping
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 : 158 - 174