Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles

被引:19
|
作者
Bi, Renwan [1 ,2 ]
Xiong, Jinbo [1 ,2 ]
Tian, Youliang [3 ]
Li, Qi [4 ,5 ]
Choo, Kim-Kwang Raymond [6 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[2] Informat Engn Univ, Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[3] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
[5] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Object detection; Cryptography; Protocols; Servers; Privacy; Computational modeling; Image edge detection; Connected autonomous vehicles (CAVs); edge computing; faster R-convolutional neural network (CNN); object detection; privacy protection; FRAMEWORK;
D O I
10.1109/JIOT.2022.3212464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Connected autonomous vehicles (CAVs) are capable of capturing high-definition images from onboard sensors, which can be used to facilitate the detection of objects in the vicinity. Such images may, however, contain sensitive information (e.g., human faces and license plates) as well as the indirect location of CAVs. To protect the object privacy of images shared by CAVs, this article proposes a privacy-preserving object detection (P2OD) framework. Specifically, we propose multiple secure computing protocols designed to construct a privacy-preserving Faster $R$ -convolutional neural network (CNN) model to securely extract features and bounding-boxes of objects in an image. By leveraging edge computing (with higher performance computation and lower latency, in comparison to cloud-based solutions), CAVs randomly split the captured images and upload them to two noncollusive edge servers. Both servers will then perform the P2OD framework cooperatively to directly detect objects over random image shares without exposing sensitive information. The theoretical analysis demonstrates the security, correctness, and efficiency of the P2OD framework, and the experimental findings show that the P2OD framework can effectively protect the classification and location privacy of image objects for CAVs. Compared with the original Faster R-CNN model, the classification and regression errors of the P2OD framework can be controlled within 10-12 and 10-14, respectively.
引用
收藏
页码:2314 / 2329
页数:16
相关论文
共 50 条
  • [41] Privacy-Preserving Electricity Trading for Connected Microgrids
    Alas, Oriol
    Sebe, Francesc
    APPLIED SCIENCES-BASEL, 2024, 14 (04):
  • [42] A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing
    Li, Hongzhi
    Han, Dezhi
    Tang, Mingdong
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3189 - 3200
  • [43] Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing
    Li, Hongyang
    Cheng, Qingfeng
    Li, Xinghua
    Ma, Siqi
    Ma, Jianfeng
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1832 - 1841
  • [44] InPPTD: A Lightweight Incentive-Based Privacy-Preserving Truth Discovery for Crowdsensing Systems
    Xue, Kaiping
    Zhu, Bin
    Yang, Qingyou
    Gai, Na
    Wei, David S. L.
    Yu, Nenghai
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06): : 4305 - 4316
  • [45] Achieving Privacy-Preserving Online Diagnosis With Outsourced SVM in Internet of Medical Things Environment
    Xie, Bin
    Xiang, Tao
    Liao, Xiaofeng
    Wu, Jiahui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4113 - 4126
  • [46] Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid
    Hu, Chunqiang
    Zhuang, Huijun
    Chen, Jiajun
    Hu, Pengfei
    Xiang, Tao
    Yu, Jiguo
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (02) : 777 - 788
  • [47] Lightweight and Privacy-Preserving IoT Service Recommendation Based on Learning to Hash
    Wan, Haoyang
    Wu, Yanping
    Yang, Yihong
    Yan, Chao
    Chi, Xiaoxiao
    Zhang, Xuyun
    Shen, Shigen
    TSINGHUA SCIENCE AND TECHNOLOGY, 2025, 30 (04): : 1793 - 1807
  • [48] Lightweight Privacy-Preserving Ensemble Classification for Face Recognition
    Ma, Zhuo
    Liu, Yang
    Liu, Ximeng
    Ma, Jianfeng
    Ren, Kui
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 5778 - 5790
  • [49] Lightweight Privacy-Preserving Equality Query in Edge Computing
    Wu, Qiyu
    Zhou, Fucai
    Xu, Jian
    Feng, Da
    Li, Bao
    IEEE ACCESS, 2019, 7 : 182588 - 182599
  • [50] Achieving Privacy-Preserving Multitask Allocation for Mobile Crowdsensing
    Zhang, Yuanyuan
    Ying, Zuobin
    Chen, C. L. Philip
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 16795 - 16806