Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing

被引:2
作者
Han, Song [1 ,2 ]
Ma, Hui [1 ,2 ]
Taherkordi, Amir [3 ]
Lan, Dapeng [3 ]
Chen, Yange [1 ,2 ]
机构
[1] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
[2] Henan Int Joint Lab Polarizat Sensing & Intelligen, Xuchang, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
关键词
computer network security; data privacy; security of data; PUBLIC-KEY CRYPTOSYSTEM; SECURITY; PROTOCOLS; STORAGE; MODEL;
D O I
10.1049/cmu2.12749
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system. This paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. image
引用
收藏
页码:461 / 476
页数:16
相关论文
共 50 条
  • [31] Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 678 - 688
  • [32] Privacy-Preserving Federated Learning for Internet of Medical Things Under Edge Computing
    Wang, Ruijin
    Lai, Jinshan
    Zhang, Zhiyang
    Li, Xiong
    Vijayakumar, Pandi
    Karuppiah, Marimuthu
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) : 854 - 865
  • [33] A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing
    Zhou, Zequan
    Luo, Xiling
    Wang, Yupeng
    Mao, Jian
    Luo, Feixiang
    Bai, Yi
    Wang, Xiaochao
    Liu, Gang
    Wang, Junjun
    Zeng, Feng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (12) : 16592 - 16606
  • [34] Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing
    Zeng, Shengke
    Zhang, Hongjie
    Hao, Fei
    Li, Hongwei
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1729 - 1738
  • [35] Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario
    Chen, Yanan
    Lu, Zhenyu
    Xiong, Hu
    Xu, Weixiang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [36] A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS
    Yao Lin Kong Xiangwei Wu Guowei Fan Qingna Lin Chi(School of Electronics & Information Engineering
    Journal of Electronics(China), 2010, 27 (01) : 68 - 78
  • [37] An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City
    Gheisari, Mehdi
    Wang, Guojun
    Chen, Shuhong
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 81 (81)
  • [38] P3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing
    Zhao, Ping
    Huang, Haojun
    Zhao, Xiaohui
    Huang, Daiyu
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2020, 7 (03): : 818 - 826
  • [39] A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT
    Shang, Shuai
    Li, Xiong
    Gu, Ke
    Li, Lei
    Zhang, Xiaosong
    Pandi, Vijayakumar
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 4305 - 4316
  • [40] Allowing privacy-preserving fog computing with digital identity assurance in remote clinical services
    Buccafurri, Francesco
    Lax, Gianluca
    Russo, Antonia
    ELECTRONIC GOVERNMENT- AN INTERNATIONAL JOURNAL, 2023, 19 (02) : 185 - 201