Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

Digital Communications and Networks - Tập 9 - Trang 906-919 - 2023
Yizhou Shen1,2, Shigen Shen3, Qi Li1, Haiping Zhou1, Zongda Wu1, Youyang Qu4
1Department of Computer Science and Engineering, Shaoxing University, Shaoxing, 312000, China
2School of Computer Science and Informatics, Cardiff University, Cardiff CF24 3AA, United Kingdom
3School of Information Engineering, Huzhou University, Huzhou 313000, Zhejiang, China
4School of Information Technology, Deakin University, Burwood, VIC, 3125, Australia

Tài liệu tham khảo

Sha, 2020, A survey of edge computing-based designs for iot security, Digit. Commun. Netw., 6, 195, 10.1016/j.dcan.2019.08.006 Wu, 2016, Scalable privacy-preserving big data aggregation mechanism, Digit. Commun. Netw., 2, 122, 10.1016/j.dcan.2016.07.001 Wu, 2020, A dummy-based user privacy protection approach for text information retrieval, Knowl. Base Syst., 195, 10.1016/j.knosys.2020.105679 Wu, 2021, Constructing dummy query sequences to protect location privacy and query privacy in location-based services, World Wide Web, 24, 25, 10.1007/s11280-020-00830-x Li, 2021, Privacy-preserving federated learning framework based on chained secure multiparty computing, IEEE Internet Things J., 8, 6178, 10.1109/JIOT.2020.3022911 Chen, 2021, Towards asynchronous federated learning for heterogeneous edge-powered internet of things, Digit. Commun. Netw., 7, 317, 10.1016/j.dcan.2021.04.001 Wang, 2020, Security and privacy in 6g networks: new areas and new challenges, Digit. Commun. Netw., 6, 281, 10.1016/j.dcan.2020.07.003 Li, 2020, Optimized content caching and user association for edge computing in densely deployed heterogeneous networks, IEEE Trans. Knowl. Data Eng. Liu, 2018, Data sharing in vanets based on evolutionary fuzzy game, Future Generat. Comput. Syst., 81, 141, 10.1016/j.future.2017.10.037 Shen, 2018, Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based iot networks, IEEE Internet Things J., 5, 1043, 10.1109/JIOT.2018.2795549 Shen, 2019, HSIRD: a model for characterizing dynamics of malware diffusion in heterogeneous wsns, J. Netw. Comput. Appl., 146 Liu, 2018, Energy-efficient two-layer cooperative defense scheme to secure sensor-clouds, IEEE Trans. Inf. Forensics Secur., 13, 408, 10.1109/TIFS.2017.2756344 Wang, 2020, Preserving balance between privacy and data integrity in edge-assisted internet of things, IEEE Internet Things J., 7, 2679, 10.1109/JIOT.2019.2951687 Liu, 2021, A bayesian q-learning game for dependable task offloading against ddos attacks in sensor edge cloud, IEEE Internet Things J., 8, 7546, 10.1109/JIOT.2020.3038554 Stergiou, 2021, Iot-based big data secure management in the fog over a 6g wireless network, IEEE Internet Things J., 8, 5164, 10.1109/JIOT.2020.3033131 Raichura, 2017, Bigcache: a cache-based bigdata management in mobile networks, Int. J. Mobile Commun., 15, 49, 10.1504/IJMC.2017.080577 Jin, 2017, Information-centric mobile caching network frameworks and caching optimization: a survey, J. Netw. Comput. Appl., 146, 33 Liang, 2020, A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud, IEEE Internet Things J., 7, 5481, 10.1109/JIOT.2020.2981005 Gong, 2021, A trusted attestation scheme for data source of internet of things in smart city based on dynamic trust classification, IEEE Internet Things J., 8, 16121, 10.1109/JIOT.2020.3006349 Tewari, 2020, Secure timestamp-based mutual authentication protocol for iot devices using rfid tags, Int. J. Semantic Web Inf. Syst., 16, 20, 10.4018/IJSWIS.2020070102 Fan, 2018, Lightweight rfid protocol for medical privacy protection in iot, IEEE Trans. Ind. Inf., 14, 1656, 10.1109/TII.2018.2794996 Xia, 2021, Online distributed offloading and computing resource management with energy harvesting for heterogeneous mec-enabled iot, IEEE Trans. Wireless Commun., 20, 6743, 10.1109/TWC.2021.3076201 Mukherjee, 2020, Intelligent edge computing: security and privacy challenges, IEEE Commun. Mag., 58, 26, 10.1109/MCOM.001.2000297 Rao, 2019, Privacy techniques for edge computing systems, Proc. IEEE, 107, 1632, 10.1109/JPROC.2019.2918749 Zhang, 2020, Toward privacy-aware task allocation in social sensing-based edge computing systems, IEEE Internet Things J., 7, 11384, 10.1109/JIOT.2020.2999025 Gu, 2020, Privacy on the edge: customizable privacy-preserving context sharing in hierarchical edge computing, IEEE Trans. Netw. Sci. Eng., 7, 2298, 10.1109/TNSE.2019.2933639 Xu, 2020, Joint optimization of offloading utility and privacy for edge computing enabled iot, IEEE Internet Things J., 7, 2622, 10.1109/JIOT.2019.2944007 Zhou, 2019, Privacy-preserving online task allocation in edge-computing-enabled massive crowdsensing, IEEE Internet Things J., 6, 7773, 10.1109/JIOT.2019.2903515 Zhen, 2020, Distributed privacy protection strategy for mec enhanced wireless body area networks, Digit. Commun. Netw., 6, 229, 10.1016/j.dcan.2019.08.007 Li, 2019, Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications, IEEE Internet Things J., 6, 4755, 10.1109/JIOT.2018.2874473 Liu, 2021, Keep your data locally: federated-learning-based data privacy preservation in edge computing, IEEE Netw, 35, 60, 10.1109/MNET.011.2000215 Du, 2020, Differential privacy preserving of training model in wireless big data with edge computing, IEEE Trans. Big Data, 6, 283, 10.1109/TBDATA.2018.2829886 He, 2020, Peace: privacy-preserving and cost-efficient task offloading for mobile-edge computing, IEEE Trans. Wireless Commun., 19, 1814, 10.1109/TWC.2019.2958091 Zhao, 2020, Privacy-preserving scheme against poisoning attacks in mobile-edge computing, IEEE Trans. Comput. Social Syst., 7, 818, 10.1109/TCSS.2019.2960824 Du, 2018, Big data privacy preserving in multi-access edge computing for heterogeneous internet of things, IEEE Commun. Mag., 56, 62, 10.1109/MCOM.2018.1701148 Li, 2020, Privacy-preserving and distributed algorithms for modular exponentiation in iot with edge computing assistance, IEEE Internet Things J., 7, 8769, 10.1109/JIOT.2020.2995677 Do, 2017, Game theory for cyber security and privacy, ACM Comput. Surv., 50, 30 Ezhei, 2017, Information sharing vs. privacy: a game theoretic analysis, Expert Syst. Appl., 88, 327, 10.1016/j.eswa.2017.06.042 Cui, 2019, Improving data utility through game theory in personalized differential privacy, J. Comput. Sci. Technol., 34, 272, 10.1007/s11390-019-1910-3 Qu, 2018, A hybrid privacy protection scheme in cyber-physical social networks, IEEE Trans. Comput. Social Syst., 5, 773, 10.1109/TCSS.2018.2861775 Zhang, 2020, Community structure-based trilateral stackelberg game model for privacy protection, Appl. Math. Model., 86, 20, 10.1016/j.apm.2020.04.025 Li, 2019, Incorporating social interaction into three-party game towards privacy protection in iot, Comput. Network., 150, 90, 10.1016/j.comnet.2018.11.036 Xiong, 2021, An ai-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of iot, IEEE Trans. Ind. Inf., 17, 922, 10.1109/TII.2019.2957130 Sivaraman, 2020, A game-theoretic approach for enhancing data privacy in sdn-based smart grids, IEEE Internet Things J., 8, 10583, 10.1109/JIOT.2020.3048357 Jin, 2019, On the security-privacy tradeoff in collaborative security: a quantitative information flow mame perspective, IEEE Trans. Inf. Forensics Secur., 14, 3273, 10.1109/TIFS.2019.2914358 Riahi Sfar, 2019, A game theoretic approach for privacy preserving model in iot-based transportation, Intell. Transp. Syst., 20, 4405, 10.1109/TITS.2018.2885054 Nosouhi, 2021, Ucoin: an efficient privacy preserving scheme for cryptocurrencies, IEEE Trans. Dependable Secure Comput. Liu, 2020, Deepga: a privacy-preserving data aggregation game in crowdsensing via deep reinforcement learning, IEEE Internet Things J., 7, 4113, 10.1109/JIOT.2019.2957400 Liu, 2021, Bilateral privacy-utility tradeoff in spectrum sharing systems: a game-theoretic approach, IEEE Trans. Wireless Commun., 20, 5144, 10.1109/TWC.2021.3065927 Wu, 2020, A privacy-preserving game model for local differential privacy by using information-theoretic approach, IEEE Access, 8, 216741, 10.1109/ACCESS.2020.3041854 Mengibaev, 2020, The impact of interactive dependence on privacy protection behavior based on evolutionary game, Appl. Math. Comput., 379 Du, 2018, Community-structured evolutionary game for privacy protection in social networks, IEEE Trans. Inf. Forensics Secur., 13, 574, 10.1109/TIFS.2017.2758756 Sun, 2022, The optimal privacy strategy of cloud service based on evolutionary game, Cluster Comput., 25, 13, 10.1007/s10586-020-03164-5 Das, 2021, Anonymity scheme for privacy preservation in location-based services on iot environment, Int. J. Autom. Control, 15, 340, 10.1504/IJAAC.2021.114923 Tourani, 2018, Security, privacy, and access control in information-centric networking: a survey, IEEE Commun, Surveys Tuts, 20, 566, 10.1109/COMST.2017.2749508 Xu, 2021, An integrated privacy preserving attribute-based access control framework supporting secure deduplication, IEEE Trans. Dependable Secure Comput., 18, 706, 10.1109/TDSC.2019.2946073 Qu, 2021, Customizable reliable privacy-preserving data sharing in cyber-physical social networks, IEEE Trans. Netw. Sci. Eng., 8, 269, 10.1109/TNSE.2020.3036855 Hassan, 2020, Differential privacy techniques for cyber physical systems: a survey, IEEE Commun. Surveys Tuts., 22, 746, 10.1109/COMST.2019.2944748 Yang, 2021 Weibull, 1995 Akkaoui, 2020, An evolutionary game-theoretic trust study of a blockchain-based personal health data sharing framework Teschl, 2012