Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing

被引:2
作者
Han, Song [1 ,2 ]
Ma, Hui [1 ,2 ]
Taherkordi, Amir [3 ]
Lan, Dapeng [3 ]
Chen, Yange [1 ,2 ]
机构
[1] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
[2] Henan Int Joint Lab Polarizat Sensing & Intelligen, Xuchang, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
关键词
computer network security; data privacy; security of data; PUBLIC-KEY CRYPTOSYSTEM; SECURITY; PROTOCOLS; STORAGE; MODEL;
D O I
10.1049/cmu2.12749
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system. This paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. image
引用
收藏
页码:461 / 476
页数:16
相关论文
共 50 条
  • [21] Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing
    Gu, Bruce
    Gao, Longxiang
    Wang, Xiaodong
    Qu, Youyang
    Jin, Jiong
    Yu, Shui
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04): : 2298 - 2309
  • [22] A Security and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems
    Zhang, Peiying
    Wang, Yaqi
    Kumar, Neeraj
    Jiang, Chunxiao
    Shi, Guowei
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (01) : 97 - 108
  • [23] Advanced Privacy-Preserving Framework for Enhancing Fog Computing to Secure IoT Data Stream
    Ranjan, Aditya Kaushal
    Kumar, Prabhat
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 380 - 388
  • [24] Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid
    Liu, Jia-Nan
    Weng, Jian
    Yang, Anjia
    Chen, Yizhao
    Lin, Xiaodong
    IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (01) : 247 - 257
  • [25] An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing
    Alamer, Abdulrahman
    Basudan, Sultan
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2020, 91
  • [26] Auction-and-Learning Based Lagrange Coded Computing Model for Privacy-Preserving, Secure, and Resilient Mobile Edge Computing
    Asheralieva, Alia
    Niyato, Dusit
    Xiong, Zehui
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (02) : 744 - 764
  • [27] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [28] Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing
    Gao, Wenjing
    Yu, Jia
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3578 - 3589
  • [29] An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Liu, Ximeng
    Huang, Cheng
    IEEE ACCESS, 2018, 6 : 19025 - 19033
  • [30] A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing
    Basudan, Sultan
    Lin, Xiaodong
    Sankaranarayanan, Karthik
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (03): : 772 - 782