Privacy-preserving data integration scheme in industrial robot system based on fog computing and edge computing

被引:2
作者
Han, Song [1 ,2 ]
Ma, Hui [1 ,2 ]
Taherkordi, Amir [3 ]
Lan, Dapeng [3 ]
Chen, Yange [1 ,2 ]
机构
[1] Xuchang Univ, Sch Informat Engn, Xuchang 461000, Peoples R China
[2] Henan Int Joint Lab Polarizat Sensing & Intelligen, Xuchang, Peoples R China
[3] Univ Oslo, Dept Informat, Oslo, Norway
关键词
computer network security; data privacy; security of data; PUBLIC-KEY CRYPTOSYSTEM; SECURITY; PROTOCOLS; STORAGE; MODEL;
D O I
10.1049/cmu2.12749
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To solve the security problems of the moving robot system in the fog network of the Industrial Internet of Things (IIoT), this paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network data. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. Finally, experiments and simulations are conducted on the robot system of fog computing in the IIoT. The results demonstrate that the proposed scheme can improve the security and efficiency of the said robot system. This paper presents a privacy-preserving data integration scheme in the moving robot system. First, a novel data collection enhancement algorithm is proposed to enhance the image effects, and a k-anonymous location and data privacy protection protocol based on Ad hoc network (Ad hoc-based KLDPP protocol) is designed in secure data collection phase to protect the privacy of location and network. Second, the secure multiparty computation with verifiable key sharing is introduced to realize the valid computation against share cheating in the robot system. Third, the ciphertext classification method in a neural network is considered in the secure data storage process to realize the special application. image
引用
收藏
页码:461 / 476
页数:16
相关论文
共 50 条
  • [41] P2FLF: Privacy-Preserving Federated Learning Framework Based on Mobile Fog Computing
    Ankayarkanni B.
    Pani N.K.
    Anand M.
    Malathy V.
    Bhupati
    International Journal of Interactive Mobile Technologies, 2023, 17 (17) : 72 - 81
  • [42] Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
    Al-Mekhlafi, Zeyad Ghaleb
    Lashari, Saima Anwar
    Altmemi, Jalal Mohammed Hachim
    Al-Shareeda, Mahmood A.
    Mohammed, Badiea Abdulkarem
    Sallam, Amer A.
    Al-Qatab, Bassam Ali
    Alshammari, Mohammad T.
    Alayba, Abdulaziz M.
    IEEE ACCESS, 2024, 12 : 100152 - 100166
  • [43] Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
    Saurabh Rana
    Dheerendra Mishra
    Riya Arora
    Wireless Personal Communications, 2021, 119 : 727 - 747
  • [44] Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment
    Rana, Saurabh
    Mishra, Dheerendra
    Arora, Riya
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (01) : 727 - 747
  • [45] A Privacy-Preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission
    Whaiduzzaman, Md
    Hossain, Md Razon
    Shovon, Ahmedur Rahman
    Roy, Shanto
    Laszka, Aron
    Buyya, Rajkumar
    Barros, Alistair
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2020, 24 (12) : 3564 - 3575
  • [46] Disease Prediction in Edge Computing: A Privacy-Preserving Technique for PHI Collection and Analysis
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Wang, Wei
    Du, Xiaojiang
    Guizani, Mohsen
    Sharif, Kashif
    IEEE NETWORK, 2022, 36 (06): : 6 - 11
  • [47] Privacy-preserving Real-time Anomaly Detection Using Edge Computing
    Mehnaz, Shagufta
    Bertino, Elisa
    2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, : 469 - 480
  • [48] Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach
    Seyedi, Zahra
    Rahmati, Farhad
    Ali, Mohammad
    Liu, Ximeng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 410 - 431
  • [49] SoK: Privacy-Preserving Computing in the Blockchain Era
    Almashaqbeh, Ghada
    Solomon, Ravital
    2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 124 - 139
  • [50] Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks
    Gai, Keke
    Wu, Yulu
    Zhu, Liehuang
    Xu, Lei
    Zhang, Yan
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 7992 - 8004