Privacy-Preserving Tucker Train Decomposition Over Blockchain-Based Encrypted Industrial IoT Data

被引:21
作者
Feng, Jun [1 ,2 ]
Yang, Laurence Tianruo [1 ,2 ]
Zhang, Ronghao [3 ]
Gavuna, Benard Safari [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu 610054, Peoples R China
[2] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
关键词
Blockchain; Tensors; Data privacy; Cryptography; Peer-to-peer computing; Privacy; cloud computing; encrypted data; industrial IoT (IIoT); privacy protection; tensor; tensor factorization; SECURE;
D O I
10.1109/TII.2020.2968923
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tucker decomposition has been widely used to extract meaningful and underlying data from heterogeneous data generated by different kinds of devices in a wide range of industrial Internet of Things (IIoT) applications. IIoT data uploaded to the cloud contain personal and sensitive information; thus, there is a growing concern about data privacy. Current existing data analysis solutions, however, assume that the data are reliably and securely collected from different IIoT data providers, an assumption that is not always true in the real world. To address the issues, in this article we propose a privacy-preserving tucker train decomposition based on gradient descent over blockchain-based encrypted IIoT data. Specifically, we use blockchain techniques to enable IIoT data providers to reliably and securely share their data by encrypting them locally before recording them in the blockchain. We use tensor train (TT) theory to build an efficient TT-based tucker decomposition based on gradient descent that tremendously reduces the number of elements to be updated during the tucker decomposition. We utilize the massive resources of fogs and clouds to implement an efficient privacy-preserving tucker train decomposition scheme. We use homomorphic encryption to build our scheme that does complete tucker train decomposition without the involvement of users. Results from a series of extensive experiments on synthetic datasets and real-world datasets demonstrate that our proposed scheme is efficient.
引用
收藏
页码:4904 / 4913
页数:10
相关论文
共 27 条
  • [21] A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing
    Wang, Tian
    Zhang, Guangxue
    Liu, Anfeng
    Bhuiyan, Md Zakirul Alam
    Jin, Qun
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4831 - 4843
  • [22] A Big Data-as-a-Service Framework: State-of-the-Art and Perspectives
    Wang, Xiaokang
    Yang, Laurence T.
    Liu, Huazhong
    Deen, M. Jamal
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (03) : 325 - 340
  • [23] PPHOPCM: Privacy-Preserving High-Order Possibilistic c-Means Algorithm for Big Data Clustering with Cloud Computing
    Zhang, Qingchen
    Yang, Laurence T.
    Chen, Zhikui
    Li, Peng
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2022, 8 (01) : 25 - 34
  • [24] Privacy-Preserving Double-Projection Deep Computation Model With Crowdsourcing on Cloud for Big Data Feature Learning
    Zhang, Qingchen
    Yang, Laurence T.
    Chen, Zhikui
    Li, Peng
    Deen, M. Jamal
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2896 - 2903
  • [25] Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based Image Denoising
    Zheng, Yifeng
    Duan, Huayi
    Tang, Xiaoting
    Wang, Cong
    Zhou, Jiantao
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1261 - 1275
  • [26] Application of Nonnegative Tensor Factorization for Intercity Rail-Air Transport Supply Configuration Pattern Recognition
    Zhong, Han
    Qi, Geqi
    Guan, Wei
    Hua, Xiaochen
    [J]. SUSTAINABILITY, 2019, 11 (06):
  • [27] Decentralizing Privacy: Using Blockchain to Protect Personal Data
    Zyskind, Guy
    Nathan, Oz
    Pentland, Alex 'Sandy'
    [J]. 2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 180 - 184