A Security and Privacy-Preserving Approach Based on Data Disturbance for Collaborative Edge Computing in Social IoT Systems

被引:36
|
作者
Zhang, Peiying [1 ,2 ]
Wang, Yaqi [1 ]
Kumar, Neeraj [3 ,4 ]
Jiang, Chunxiao [5 ,6 ]
Shi, Guowei [7 ]
机构
[1] China Univ Petr East China, Coll Comp Sci & Technol, Qingdao 266580, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Deemed Univ, Thapar Inst Engn & Technol, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[4] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[5] Tsinghua Univ, Beijing Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[6] Tsinghua Univ, Tsinghua Space Ctr, Beijing 100084, Peoples R China
[7] China Acad Informat & Commun Technol, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Computational modeling; Training; Data privacy; Generative adversarial networks; Data models; Internet of Things; Collaborative edge computing (CEC); Internet of things (IoT); security management; sentence similarity analysis; AUTHENTICATION; ENCRYPTION; BANDWIDTH; EFFICIENT; NETWORK; AWARE;
D O I
10.1109/TCSS.2021.3092746
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of the network. It has changed from a single data user to a dual role of both producing and using data. And collaborative edge computing (CEC) has been born in time. CEC itself can not only solve the problem of computing and storage but also combines with the deep learning (DL) model to make full use of edge computing ability. However, as the core of DL, the robustness of neural network is often not high. In addition, edge devices of CEC are facing a highly dynamic environment, which can easily cause the edge network to be attacked by malicious devices. Therefore, user privacy protection and security issues for CEC deserve more attention. To avoid privacy leakage and security crisis of CEC in social IoT systems, a data protection method based on data disturbance method and adversarial training viewpoint is introduced in this article. Besides, a new adversarial sample generation method based on the firefly algorithm (FA) is proposed. This method reduces the time complexity of traditional by an order for magnitude compared with traditional generative adversarial network (GAN) generation. Since sentences, information on CEC in the IoT system is characterized by a large amount of data, strict confidentiality, and high-security requirements, and they are usually high-risk information on privacy leakage. The proposed method is conducted to the sentence similarity analysis model based on a convolutional neural network (CNN) in the CEC scene to test the feasibility of the method. Compared with the original CNN, the accuracy of the model using the confrontation training method is improved by 4.8%. At the same time, the security value of our model is 2.1% higher than that of the simple CNN model, and it has the best security performance among the four comparison models. Further experiments have demonstrated that the model performs better in its capacity of resisting disturbance and can effectively help multiple organizations to implement data usage and sentence information on the requirements of user privacy protection, data security, and government regulations.
引用
收藏
页码:97 / 108
页数:12
相关论文
共 50 条
  • [1] Optimization algorithms in security and privacy-preserving data disturbance for collaborative edge computing social IoT deep learning architectures
    Boopathi, Mythili
    Gupta, Sachin
    Zabeeulla, A. N. Mohammed
    Gupta, Rupal
    Vekriya, Vipul
    Pandey, Arvind Kumar
    SOFT COMPUTING, 2023,
  • [2] Edge computing assisted privacy-preserving data computation for IoT devices
    Sun, Gaofei
    Xing, Xiaoshuang
    Qian, Zhenjiang
    Li, Wei
    COMPUTER COMMUNICATIONS, 2021, 166 : 208 - 215
  • [3] Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues
    Zhang, Jiale
    Chen, Bing
    Zhao, Yanchao
    Cheng, Xiang
    Hu, Feng
    IEEE ACCESS, 2018, 6 : 18209 - 18237
  • [4] Multilayer privacy-preserving model for security and privacy access control in edge computing
    Karthikeyan, K.
    Madhavan, P.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (10):
  • [5] Privacy-preserving healthcare monitoring for IoT devices under edge computing
    Cao, Wei
    Shen, Wenting
    Zhang, Zhixiang
    Qin, Jing
    COMPUTERS & SECURITY, 2023, 134
  • [6] ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-Based Smart City
    Gheisari, Mehdi
    Quoc-Viet Pham
    Alazab, Mamoun
    Zhang, Xiaobo
    Fernandez-Campusano, Christian
    Srivastava, Gautam
    IEEE ACCESS, 2019, 7 : 155779 - 155786
  • [7] A privacy-preserving location data collection framework for intelligent systems in edge computing
    Yao, Aiting
    Pal, Shantanu
    Li, Xuejun
    Zhang, Zheng
    Dong, Chengzu
    Jiang, Frank
    Liu, Xiao
    AD HOC NETWORKS, 2024, 161
  • [8] Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT: An ADMM approach
    Yao, Yuanfan
    Wang, Ziyu
    Zhou, Pan
    COMPUTERS & SECURITY, 2020, 96
  • [9] Collaborative Fog Computing Architecture for Privacy-Preserving Data Aggregation
    Qusa, Hani
    Tarazi, Jumana
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 86 - 91
  • [10] A crypto-based approach to privacy-preserving collaborative data mining
    Zhan, Justin
    Matwin, Stan
    ICDM 2006: SIXTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, WORKSHOPS, 2006, : 546 - 550