Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

被引:49
作者
Shen, Shigen [1 ]
Wu, Xiaoping [1 ]
Sun, Panjun [2 ]
Zhou, Haiping [2 ]
Wu, Zongda [2 ]
Yu, Shui [3 ]
机构
[1] Huzhou Univ, Sch Informat Engn, Huzhou 313000, Peoples R China
[2] Shaoxing Univ, Dept Comp Sci & Engn, Shaoxing 312000, Peoples R China
[3] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW, Australia
关键词
Internet of Things; Edge computing; Privacy preservation; Signaling game; Signaling Q -learning; DATA AGGREGATION SCHEME; MALWARE PROPAGATION; DETECTION GAME; CENTRIC VIEW; DATA-STORAGE; INTERNET; PROTECTION; SECURITY; THINGS;
D O I
10.1016/j.eswa.2023.120192
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends requests to gather private data from an edge-computing-based IoT cloud storage system across the edge nodes. To solve this problem, a privacy-preservation signaling game for edge-computing-based IoT networks is proposed to characterize the interactions between an IoT node and its corresponding edge node when managing an IoT resourcegrant system. Optimal privacy preservation strategies for edge nodes are then theoretically derived. A signaling Q-learning algorithm is then designed to address the problem of achieving convergent equilibrium and game parameters from a practical perspective. The theoretical results are validated using simulations that focus on two statistical points (i.e., the optimal probability of an IoT node requesting maliciously and the posterior probability of an IoT node being malicious). By comparing the proposed signaling Q-learning algorithm with the greedy algorithm benchmark, the proposed algorithm is shown to more effectively decrease the optimal probability of an IoT node sending malicious requests. Thus, privacy preservation for edge-computing-based IoT cloud storage systems can be strengthened.
引用
收藏
页数:13
相关论文
共 71 条
[1]   Artificial Intelligence (AI)-Empowered Intrusion Detection Architecture for the Internet of Vehicles [J].
Alladi T. ;
Kohli V. ;
Chamola V. ;
Yu F.R. ;
Guizani M. .
IEEE Wireless Communications, 2021, 28 (03) :144-149
[2]   A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things [J].
Alwarafy, Abdulmalik ;
Al-Thelaya, Khaled A. ;
Abdallah, Mohamed ;
Schneider, Jens ;
Hamdi, Mounir .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4004-4022
[3]   Privacy preservation of cloud data in business application enabled by multi-objective red deer-bird swarm algorithm [J].
Balashunmugaraja, B. ;
Ganeshbabu, T. R. .
KNOWLEDGE-BASED SYSTEMS, 2022, 236
[4]   A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT [J].
Bi, Renwan ;
Chen, Qianxin ;
Chen, Lei ;
Xiong, Jinbo ;
Wu, Dapeng .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
[5]   Secure Frequency Control of Hybrid Power System Under DoS Attacks via Lie Algebra [J].
Cheng, Zihao ;
Yue, Dong ;
Shen, Shigen ;
Hu, Songlin ;
Chen, Lei .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :1172-1184
[6]   A Game-Theoretic Analysis of Energy-Depleting Jamming Attacks with a Learning Counterstrategy [J].
Chiariotti, Federico ;
Pielli, Chiara ;
Laurenti, Nicola ;
Zanella, Andrea ;
Zorzi, Michele .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2020, 16 (01)
[7]   Improving Data Utility Through Game Theory in Personalized Differential Privacy [J].
Cui, Lei ;
Qu, Youyang ;
Nosouhi, Mohammad Reza ;
Yu, Shui ;
Niu, Jian-Wei ;
Xie, Gang .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (02) :272-286
[8]   Game Theory for Cyber Security and Privacy [J].
Do, Cuong T. ;
Tran, Nguyen H. ;
Hong, Choongseon ;
Kamhoua, Charles A. ;
Kwiat, Kevin A. ;
Blasch, Erik ;
Ren, Shaolei ;
Pissinou, Niki ;
Iyengar, Sundaraja Sitharama .
ACM COMPUTING SURVEYS, 2017, 50 (02) :30-37
[9]   Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things [J].
Du, Miao ;
Wang, Kun ;
Chen, Yuanfang ;
Wang, Xiaoyan ;
Sun, Yanfei .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) :62-67
[10]   Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices [J].
Eskandari, Mojtaba ;
Janjua, Zaffar Haider ;
Vecchio, Massimo ;
Antonelli, Fabio .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) :6882-6897