Privacy-Preserving Data Mining on Blockchain-Based WSNs

被引:8
作者
Hrovatin, Niki [1 ,2 ]
Tosic, Aleksandar [1 ,2 ]
Mrissa, Michael [1 ,2 ]
Kavsek, Branko [1 ,3 ]
机构
[1] Univ Primorska, Fac Math Nat Sci & Informat Technol, Glagoljaska 8, Koper 6000, Slovenia
[2] InnoRenew CoE, Livade 6a, Izola 6310, Slovenia
[3] Jozef Stefan Inst, Jamova 39, Ljubljana 1000, Slovenia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 11期
关键词
WSN; air quality; privacy; blockchain; data mining; WIRELESS SENSOR NETWORKS; DATA AGGREGATION; INFERENCE;
D O I
10.3390/app12115646
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Currently, the computational power present in the sensors forming a wireless sensor network (WSN) allows for implementing most of the data processing and analysis directly on the sensors in a decentralized way. This shift in paradigm introduces a shift in the privacy and security problems that need to be addressed. While a decentralized implementation avoids the single point of failure problem that typically applies to centralized approaches, it is subject to other threats, such as external monitoring, and new challenges, such as the complexity of providing decentralized implementations for data mining algorithms. In this paper, we present a solution for privacy-aware distributed data mining on wireless sensor networks. Our solution uses a permissioned blockchain to avoid a single point of failure in the system. Contracts are used to construct an onion-like structure encompassing the Hoeffding trees and a route. The onion-routed query conceals the network identity of the sensors from external adversaries, and obfuscates the actual computation to hide it from internally compromised nodes. We validate our solution on a use case related to an air quality-monitoring sensor network. We compare the quality of our model against traditional models to support the feasibility and viability of the solution.
引用
收藏
页数:18
相关论文
共 59 条
[31]   Learning model trees from evolving data streams [J].
Ikonomovska, Elena ;
Gama, Joao ;
Dzeroski, Saso .
DATA MINING AND KNOWLEDGE DISCOVERY, 2011, 23 (01) :128-168
[32]   FBI: A Federated Learning-Based Blockchain-Embedded Data Accumulation Scheme Using Drones for Internet of Things [J].
Islam, Anik ;
Al Amin, Ahmed ;
Shin, Soo Young .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (05) :972-976
[33]   A survey on location privacy protection in Wireless Sensor Networks [J].
Jiang, Jinfang ;
Han, Guangjie ;
Wang, Hao ;
Guizani, Mohsen .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 :93-114
[34]  
Jung TH, 2013, IEEE INFOCOM SER, P2634
[35]   WHAT CAN WE LEARN PRIVATELY? [J].
Kasiviswanathan, Shiva Prasad ;
Lee, Homin K. ;
Nissim, Kobbi ;
Raskhodnikova, Sofya ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2011, 40 (03) :793-826
[36]  
Laube P., 2008, GEOGRAPHIC DATA MINI, DOI [10.1201/9781420073980.ch16, DOI 10.1201/9781420073980.CH16]
[37]   Privacy preservation in wireless sensor networks: A state-of-the-art survey [J].
Li, Na ;
Zhang, Nan ;
Das, Sajal K. ;
Thuraisingham, Bhavani .
AD HOC NETWORKS, 2009, 7 (08) :1501-1514
[38]   Privacy-Preserving Data Mining: Methods, Metrics, and Applications [J].
Mendes, Ricardo ;
Vilela, Joao P. .
IEEE ACCESS, 2017, 5 :10562-10582
[39]  
MERKLE RC, 1988, LECT NOTES COMPUT SC, V293, P369
[40]  
Moinet A., 2017, ARXIV