Implementing adaptive dragonfly optimization for privacy preservation in IoT

被引:3
|
作者
Apare, Ravindra S. [1 ]
Gujar, Satish N. [2 ]
机构
[1] JJT Univ, Jhunjhunu, Rajasthan, India
[2] BSCOER, Pune, Maharashtra, India
关键词
Internet of Things; sensitive data; privacy preservation; Improved Dragonfly Algorithm; SECURITY; INTERNET; ALGORITHM; THINGS; FRAMEWORK; ARCHITECTURE; CHALLENGES; PROTOCOLS; SERVICES;
D O I
10.3233/JHS-190619
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT (Internet of Things) is a sophisticated analytics and automation system that utilizes networks, big data, artificial intelligence, and sensing technology, and is controlled by an embedded module. It allows one to use affordable wireless technology and transmits the data into the cloud at a component level. It also provides a place to save the data - however, the significant challenges in IoT relay on security restrictions related with device cost. Moreover, the increasing amount of devices further generate opportunities for attacks. Hence, to overcome this issue, this paper intends to develop a promising methodology associated with data privacy preservation for handling the IoT network. It is obvious that the IoT devices often generate time series data, where the range of respective time series data can be vast. Under such circumstances, proper information extraction through effective analysis and relevant privacy preservation of sensitive data from IoT is challenging. In this paper, the problem that occurred in the data preservation is formulated as a non-linear objective model. To solve this objective model, an improved, optimized Dragonfly Algorithm (DA) is adopted, which is termed the Improved DA (IDA) algorithm. Here, the proposed model focused on preserving the physical activity of human monitoring data in the IoT sector. Moreover, the proposed IDA algorithm is compared with conventional schemes such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Bee Colony (ABC), Firefly (FF) and DA and the outcomes prove that the suggested scheme is highly used for preserving the sensitive information uploaded in IoT.
引用
收藏
页码:331 / 348
页数:18
相关论文
共 50 条
  • [41] A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data
    Moulahi, Wided
    Jdey, Imen
    Moulahi, Tarek
    Alawida, Moatsum
    Alabdulatif, Abdulatif
    COMPUTERS IN BIOLOGY AND MEDICINE, 2023, 167
  • [42] Edge Computing and IoT Analytics for Agile Optimization in Intelligent Transportation Systems
    Peyman, Mohammad
    Copado, Pedro J.
    Tordecilla, Rafael D.
    Martins, Leandro do C.
    Xhafa, Fatos
    Juan, Angel A.
    ENERGIES, 2021, 14 (19)
  • [43] A Taxonomy of IoT: Security and Privacy Threats
    Alsamani, Badr
    Lahza, Husam
    CONFERENCE PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT), 2018, : 72 - 77
  • [44] Privacy Agents for IoT Cloud Communication
    Shahzad, Syed Khuram
    Iqbal, Muhammad Waseem
    Ahmad, Nadeem
    IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, : 239 - 245
  • [45] A Hybrid Optimization Approach to Enhance Source Location Privacy for IoT Healthcare
    Arpitha, T.
    Chouhan, Dharamendra
    Shreyas, J.
    IEEE ACCESS, 2024, 12 : 132801 - 132816
  • [46] A Video Deduplication Scheme with Privacy Preservation in IoT
    Li, Xuan
    Lin, Jie
    Li, Jin
    Jin, Biao
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015), 2016, 575 : 409 - 417
  • [47] On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance
    Brotsis, Sotirios
    Limniotis, Konstantinos
    Bendiab, Gueltoum
    Kolokotronis, Nicholas
    Shiaeles, Stavros
    COMPUTER NETWORKS, 2021, 191
  • [48] Joint Optimization of Offloading Utility and Privacy for Edge Computing Enabled IoT
    Xu, Xiaolong
    He, Chengxun
    Xu, Zhanyang
    Qi, Lianyong
    Wan, Shaohua
    Bhuiyan, Md Zakirul Alam
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 2622 - 2629
  • [49] A Double Obfuscation Approach for Protecting the Privacy of IoT Location Based Applications
    Albouq, Sami Saad
    Sen, Adnan Ahmed Abi
    Namoun, Abdallah
    Bahbouh, Nour Mahmoud
    Alkhodre, Ahmad B.
    Alshanqiti, Abdullah
    IEEE ACCESS, 2020, 8 : 129415 - 129431
  • [50] K-anonymity scheme for privacy preservation in location-based services on IoT environment
    Das, Ayan Kumar
    Tabassum, Ayesha
    Sadaf, Sayema
    Sinha, Ditipriya
    INTERNATIONAL JOURNAL OF AUTOMATION AND CONTROL, 2021, 15 (03) : 340 - 362