期刊文献+
共找到87篇文章
< 1 2 5 >
每页显示 20 50 100
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
1
作者 Sandeep Dasari Rajesh Kaluri 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第8期2035-2051,共17页
The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizat... The increasing data pool in finance sectors forces machine learning(ML)to step into new complications.Banking data has significant financial implications and is confidential.Combining users data from several organizations for various banking services may result in various intrusions and privacy leakages.As a result,this study employs federated learning(FL)using a flower paradigm to preserve each organization’s privacy while collaborating to build a robust shared global model.However,diverse data distributions in the collaborative training process might result in inadequate model learning and a lack of privacy.To address this issue,the present paper proposes the imple-mentation of Federated Averaging(FedAvg)and Federated Proximal(FedProx)methods in the flower framework,which take advantage of the data locality while training and guaranteeing global convergence.Resultantly improves the privacy of the local models.This analysis used the credit card and Canadian Institute for Cybersecurity Intrusion Detection Evaluation(CICIDS)datasets.Precision,recall,and accuracy as performance indicators to show the efficacy of the proposed strategy using FedAvg and FedProx.The experimental findings suggest that the proposed approach helps to safely use banking data from diverse sources to enhance customer banking services by obtaining accuracy of 99.55%and 83.72%for FedAvg and 99.57%,and 84.63%for FedProx. 展开更多
关键词 Federated learning FedAvg FedProx flower framework privacy preservation financial sectors
下载PDF
Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning
2
作者 Feiye Zhang Qingyu Yang Dou An 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第10期1984-1999,共16页
The smart grid utilizes the demand side management technology to motivate energy users towards cutting demand during peak power consumption periods, which greatly improves the operation efficiency of the power grid. H... The smart grid utilizes the demand side management technology to motivate energy users towards cutting demand during peak power consumption periods, which greatly improves the operation efficiency of the power grid. However, as the number of energy users participating in the smart grid continues to increase, the demand side management strategy of individual agent is greatly affected by the dynamic strategies of other agents. In addition, the existing demand side management methods, which need to obtain users’ power consumption information,seriously threaten the users’ privacy. To address the dynamic issue in the multi-microgrid demand side management model, a novel multi-agent reinforcement learning method based on centralized training and decentralized execution paradigm is presented to mitigate the damage of training performance caused by the instability of training experience. In order to protect users’ privacy, we design a neural network with fixed parameters as the encryptor to transform the users’ energy consumption information from low-dimensional to high-dimensional and theoretically prove that the proposed encryptor-based privacy preserving method will not affect the convergence property of the reinforcement learning algorithm. We verify the effectiveness of the proposed demand side management scheme with the real-world energy consumption data of Xi’an, Shaanxi, China. Simulation results show that the proposed method can effectively improve users’ satisfaction while reducing the bill payment compared with traditional reinforcement learning(RL) methods(i.e., deep Q learning(DQN), deep deterministic policy gradient(DDPG),QMIX and multi-agent deep deterministic policy gradient(MADDPG)). The results also demonstrate that the proposed privacy protection scheme can effectively protect users’ privacy while ensuring the performance of the algorithm. 展开更多
关键词 Centralized training and decentralized execution demand side management multi-agent reinforcement learning privacy preserving
下载PDF
Privacy preserving supply chain quantity discount contract design 被引量:2
3
作者 谢翠华 仲伟俊 张玉林 《Journal of Southeast University(English Edition)》 EI CAS 2009年第1期132-137,共6页
The development and deployment of privary preserving supply chain quantity discount contract design can allow supply chain collaborations to take place without revealing any participant's data to others, reaping the ... The development and deployment of privary preserving supply chain quantity discount contract design can allow supply chain collaborations to take place without revealing any participant's data to others, reaping the benefits of collaborations wbile avoiding the drawbacks of privacy information disclosure. First, secure multi-party computation protocols are applied in the joint-ordering policy between a single supplier and a single retailer, the joint-ordering policy can be conducted without disclosing private cost information of any of the other supply chain partners. Secondly, secure multi-party computation protocols are applied in the privacy preserving supply chain quantity discount contract design between a single supplier and a single retailer. The information disclosure analyses of the algorithm show that: the optimal quantity discount of the jointordering policy can be conducted without disclosing private cost information of any of the other supply chain partners; the above protocol can be implemented without mediators; the privacy preserving quantity discount algorithm can be mutually verifiable and has solved the problem of asymmetric information. 展开更多
关键词 supply chain quantity discount privacy preserving
下载PDF
Privacy Preserving Image Encryption with Deep Learning Based IoT Healthcare Applications 被引量:1
4
作者 Mohammad Alamgeer Saud S.Alotaibi +5 位作者 Shaha Al-Otaibi Nazik Alturki Anwer Mustafa Hilal Abdelwahed Motwakel Ishfaq Yaseen Mohamed I.Eldesouki 《Computers, Materials & Continua》 SCIE EI 2022年第10期1159-1175,共17页
Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies.Blockchain,data encryption,and deep learning(DL... Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies.Blockchain,data encryption,and deep learning(DL)models can be utilized to design efficient security solutions for IoT healthcare applications.In this aspect,this article introduces a Blockchain with privacy preserving image encryption and optimal deep learning(BPPIEODL)technique for IoT healthcare applications.The proposed BPPIE-ODL technique intends to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique encompasses the design of dragonfly algorithm(DFA)with signcryption technique to encrypt the medical images captured by the IoT devices.Besides,blockchain(BC)can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.In addition,the classification process includes SqueezeNet based feature extraction,softmax classifier(SMC),and Nadam based hyperparameter optimizer.The usage of Nadam model helps to optimally regulate the hyperparameters of the SqueezeNet architecture.For examining the enhanced encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is carried out.The simulation outcomes demonstrate the significant performance of the BPPIE-ODL technique on the other techniques with increased precision and accuracy of 0.9551 and 0.9813 respectively. 展开更多
关键词 Internet of things healthcare decision making privacy preserving blockchain deep learning
下载PDF
An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET
5
作者 Safiullah Khan Ali Raza Seong Oun Hwang 《Computers, Materials & Continua》 SCIE EI 2022年第5期3703-3719,共17页
Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solutionthat improves road safety and comfort for travelers on roads. However, wireles... Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solutionthat improves road safety and comfort for travelers on roads. However, wireless communications over open-access environments face many security andprivacy issues that may affect deployment of large-scale VANETs. Researchershave proposed different protocols to address security and privacy issues in aVANET, and in this study we cryptanalyze some of the privacy preservingprotocols to show that all existing protocols are vulnerable to the Sybilattack. The Sybil attack can be used by malicious actors to create fakeidentities that impair existing protocols, which allows them to imitate trafficcongestion or at worse cause an accident that may result in the loss of humanlife. This vulnerability exists because those protocols store vehicle identitiesin an encrypted form, and it is not possible to search over the encryptedidentities to find fake vehicles. This attack is serious in nature and veryprevalent for privacy-preserving protocols. To cope with this kind of attack,we propose a novel and practical protocol that uses Public key encryptionwith an equality test (PKEET) to search over the encrypted identities withoutleaking any information, and eventually eliminate the Sybil attack. Theproposed approach improves security and at the same time maintains privacyin VANET. Our performance analysis indicates that the proposed protocoloutperforms state-of-the-art protocols: The proposed beacon generation timeis constant compared to a linear increase in existing protocols, with beaconverification shown to be faster by 7.908%. Our communicational analysisshows that the proposed protocol with a beacon size of 322 bytes has the leastcommunicational overhead compared to other state-of-the-art protocols. 展开更多
关键词 VANET authentication protocol CRYPTANALYSIS privacy preserving intelligent systems
下载PDF
An Overview of Privacy Preserving Schemes for Industrial Internet of Things
6
作者 Yan Huo Chun Meng +1 位作者 Ruinian Li Tao Jing 《China Communications》 SCIE CSCD 2020年第10期1-18,共18页
The concept of Internet of Everything is like a revolutionary storm,bringing the whole society closer together.Internet of Things(IoT)has played a vital role in the process.With the rise of the concept of Industry 4.0... The concept of Internet of Everything is like a revolutionary storm,bringing the whole society closer together.Internet of Things(IoT)has played a vital role in the process.With the rise of the concept of Industry 4.0,intelligent transformation is taking place in the industrial field.As a new concept,an industrial IoT system has also attracted the attention of industry and academia.In an actual industrial scenario,a large number of devices will generate numerous industrial datasets.The computing efficiency of an industrial IoT system is greatly improved with the help of using either cloud computing or edge computing.However,privacy issues may seriously harmed interests of users.In this article,we summarize privacy issues in a cloud-or an edge-based industrial IoT system.The privacy analysis includes data privacy,location privacy,query and identity privacy.In addition,we also review privacy solutions when applying software defined network and blockchain under the above two systems.Next,we analyze the computational complexity and privacy protection performance of these solutions.Finally,we discuss open issues to facilitate further studies. 展开更多
关键词 privacy preserving cloud computing edge computing industrial Internet of Things
下载PDF
Novel Privacy Preserving Method of Countering the Threats from Priori Knowledge
7
作者 杨维嘉 黄上腾 《Journal of Donghua University(English Edition)》 EI CAS 2009年第6期603-606,共4页
Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve ... Recently,many data anonymization methods have been proposed to protect privacy in the applications of data mining.But few of them have considered the threats from user's priori knowledge of data patterns.To solve this problem,a flexible method was proposed to randomize the dataset,so that the user could hardly obtain the sensitive data even knowing data relationships in advance.The method also achieves a high level of accuracy in the mining process as demonstrated in the experiments. 展开更多
关键词 data mining privacy preserving priori knowledge ANONYMIZATION
下载PDF
Research on Privacy Preserving Data Mining
8
作者 Pingshui Wang Tao Chen Zecheng Wang 《Journal of Information Hiding and Privacy Protection》 2019年第2期61-68,共8页
In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have... In recent years,with the explosive development in Internet,data storage and data processing technologies,privacy preservation has been one of the greater concerns in data mining.A number of methods and techniques have been developed for privacy preserving data mining.This paper provided a wide survey of different privacy preserving data mining algorithms and analyzed the representative techniques for privacy preservation.The existing problems and directions for future research are also discussed. 展开更多
关键词 privacy preserving data mining RANDOMIZATION ANONYMIZATION secure multiparty computation
下载PDF
A Survey on Recent Advances in Privacy Preserving Deep Learning
9
作者 Siran Yin Leiming Yan +2 位作者 Yuanmin Shi Yaoyang Hou Yunhong Zhang 《Journal of Information Hiding and Privacy Protection》 2020年第4期175-185,共11页
Deep learning based on neural networks has made new progress in a wide variety of domain,however,it is lack of protection for sensitive information.The large amount of data used for training is easy to cause leakage o... Deep learning based on neural networks has made new progress in a wide variety of domain,however,it is lack of protection for sensitive information.The large amount of data used for training is easy to cause leakage of private information,thus the attacker can easily restore input through the representation of latent natural language.The privacy preserving deep learning aims to solve the above problems.In this paper,first,we introduce how to reduce training samples in order to reduce the amount of sensitive information,and then describe how to unbiasedly represent the data with respect to specific attributes,clarify the research results of other directions of privacy protection and its corresponding algorithms,summarize the common thoughts and existing problems.Finally,the commonly used datasets in the privacy protection research are discussed in this paper. 展开更多
关键词 Deep learning privacy preserving adversarial learning differentia-lly private
下载PDF
Privacy Preserving Solution for the Asynchronous Localization of Underwater Sensor Networks 被引量:9
10
作者 Haiyan Zhao Jing Yan +1 位作者 Xiaoyuan Luo Xinping Guan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2020年第6期1511-1527,共17页
Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security atta... Location estimation of underwater sensor networks(USNs)has become a critical technology,due to its fundamental role in the sensing,communication and control of ocean volume.However,the asynchronous clock,security attack and mobility characteristics of underwater environment make localization much more challenging as compared with terrestrial sensor networks.This paper is concerned with a privacy-preserving asynchronous localization issue for USNs.Particularly,a hybrid network architecture that includes surface buoys,anchor nodes,active sensor nodes and ordinary sensor nodes is constructed.Then,an asynchronous localization protocol is provided,through which two privacy-preserving localization algorithms are designed to estimate the locations of active and ordinary sensor nodes.It is worth mentioning that,the proposed localization algorithms reveal disguised positions to the network,while they do not adopt any homomorphic encryption technique.More importantly,they can eliminate the effect of asynchronous clock,i.e.,clock skew and offset.The performance analyses for the privacy-preserving asynchronous localization algorithms are also presented.Finally,simulation and experiment results reveal that the proposed localization approach can avoid the leakage of position information,while the location accuracy can be significantly enhanced as compared with the other works. 展开更多
关键词 Asynchronous clock LOCALIZATION privacy preservation underwater sensor networks(USNs)
下载PDF
ε-inclusion: privacy preserving re-publication of dynamic datasets
11
作者 Qiong WEI Yan-sheng LU Lei ZOU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第8期1124-1133,共10页
This paper presents a novel privacy principle, ε-inclusion, for re-publishing sensitive dynamic datasets. ε-inclusion releases all the quasi-identifier values directly and uses permutation-based method and substitut... This paper presents a novel privacy principle, ε-inclusion, for re-publishing sensitive dynamic datasets. ε-inclusion releases all the quasi-identifier values directly and uses permutation-based method and substitution to anonymize the microdata. Combined with generalization-based methods, ε-inclusion protects privacy and captures a large amount of correlation in the microdata. We develop an effective algorithm for computing anonymized tables that obey the ε-inclusion privacy requirement. Extensive experiments confirm that our solution allows significantly more effective data analysis than generalization-based methods. 展开更多
关键词 privacy preservation Re-publication ε-inclusion privacy principle
下载PDF
A Cloud-Fog Enabled and Privacy-Preserving IoT Data Market Platform Based on Blockchain
12
作者 Yurong Luo Wei You +3 位作者 Chao Shang Xiongpeng Ren Jin Cao Hui Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期2237-2260,共24页
The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among th... The dynamic landscape of the Internet of Things(IoT)is set to revolutionize the pace of interaction among entities,ushering in a proliferation of applications characterized by heightened quality and diversity.Among the pivotal applications within the realm of IoT,as a significant example,the Smart Grid(SG)evolves into intricate networks of energy deployment marked by data integration.This evolution concurrently entails data interchange with other IoT entities.However,there are also several challenges including data-sharing overheads and the intricate establishment of trusted centers in the IoT ecosystem.In this paper,we introduce a hierarchical secure data-sharing platform empowered by cloud-fog integration.Furthermore,we propose a novel non-interactive zero-knowledge proof-based group authentication and key agreement protocol that supports one-to-many sharing sets of IoT data,especially SG data.The security formal verification tool shows that the proposed scheme can achieve mutual authentication and secure data sharing while protecting the privacy of data providers.Compared with previous IoT data sharing schemes,the proposed scheme has advantages in both computational and transmission efficiency,and has more superiority with the increasing volume of shared data or increasing number of participants. 展开更多
关键词 IoT data sharing zero-knowledge proof authentication privacy preserving blockchain
下载PDF
Privacy-Preserving Healthcare and Medical Data Collaboration Service System Based on Blockchain and Federated Learning
13
作者 Fang Hu Siyi Qiu +3 位作者 Xiaolian Yang ChaoleiWu Miguel Baptista Nunes Hui Chen 《Computers, Materials & Continua》 SCIE EI 2024年第8期2897-2915,共19页
As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in dat... As the volume of healthcare and medical data increases from diverse sources,real-world scenarios involving data sharing and collaboration have certain challenges,including the risk of privacy leakage,difficulty in data fusion,low reliability of data storage,low effectiveness of data sharing,etc.To guarantee the service quality of data collaboration,this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning,termed FL-HMChain.This system is composed of three layers:Data extraction and storage,data management,and data application.Focusing on healthcare and medical data,a healthcare and medical blockchain is constructed to realize data storage,transfer,processing,and access with security,real-time,reliability,and integrity.An improved master node selection consensus mechanism is presented to detect and prevent dishonest behavior,ensuring the overall reliability and trustworthiness of the collaborative model training process.Furthermore,healthcare and medical data collaboration services in real-world scenarios have been discussed and developed.To further validate the performance of FL-HMChain,a Convolutional Neural Network-based Federated Learning(FL-CNN-HMChain)model is investigated for medical image identification.This model achieves better performance compared to the baseline Convolutional Neural Network(CNN),having an average improvement of 4.7%on Area Under Curve(AUC)and 7%on Accuracy(ACC),respectively.Furthermore,the probability of privacy leakage can be effectively reduced by the blockchain-based parameter transfer mechanism in federated learning between local and global models. 展开更多
关键词 Blockchain technique federated learning healthcare and medical data collaboration service privacy preservation
下载PDF
Pri-EMO:A universal perturbation method for privacy preserving facial emotion recognition 被引量:1
14
作者 Yong Zeng Zhenyu Zhang +2 位作者 Jiale Liu Jianfeng Ma Zhihong Liu 《Journal of Information and Intelligence》 2023年第4期330-340,共11页
Facial emotion have great significance in human-computer interaction,virtual reality and people's communication.Existing methods for facial emotion privacy mainly concentrate on the perturbation of facial emotion ... Facial emotion have great significance in human-computer interaction,virtual reality and people's communication.Existing methods for facial emotion privacy mainly concentrate on the perturbation of facial emotion images.However,cryptography-based perturbation algorithms are highly computationally expensive,and transformation-based perturbation algorithms only target specific recognition models.In this paper,we propose a universal feature vector-based privacy-preserving perturbation algorithm for facial emotion.Our method implements privacy-preserving facial emotion images on the feature space by computing tiny perturbations and adding them to the original images.In addition,the proposed algorithm can also enable expression images to be recognized as specific labels.Experiments show that the protection success rate of our method is above 95%and the image quality evaluation degrades no more than 0.003.The quantitative and qualitative results show that our proposed method has a balance between privacy and usability. 展开更多
关键词 Facial emotion recognition privacy preserving PERTURBATION Universal algorithm Feature space
原文传递
Lightweight privacy-preserving truth discovery for vehicular air quality monitoring
15
作者 Rui Liu Jianping Pan 《Digital Communications and Networks》 SCIE CSCD 2023年第1期280-291,共12页
Air pollution has become a global concern for many years.Vehicular crowdsensing systems make it possible to monitor air quality at a fine granularity.To better utilize the sensory data with varying credibility,truth d... Air pollution has become a global concern for many years.Vehicular crowdsensing systems make it possible to monitor air quality at a fine granularity.To better utilize the sensory data with varying credibility,truth discovery frameworks are introduced.However,in urban cities,there is a significant difference in traffic volumes of streets or blocks,which leads to a data sparsity problem for truth discovery.Protecting the privacy of participant vehicles is also a crucial task.We first present a data masking-based privacy-preserving truth discovery framework,which incorporates spatial and temporal correlations to solve the sparsity problem.To further improve the truth discovery performance of the presented framework,an enhanced version is proposed with anonymous communication and data perturbation.Both frameworks are more lightweight than the existing cryptography-based methods.We also evaluate the work with simulations and fully discuss the performance and possible extensions. 展开更多
关键词 privacy preserving Truth discovery Crowdsensing Vehicular networks
下载PDF
Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management
16
作者 Duan Pengfei Ma Zhaofeng +2 位作者 Zhang Yuqing Wang Jingyu Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期224-236,共13页
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve... With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability. 展开更多
关键词 access control data trading MAABE multi-channel privacy preserving
下载PDF
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes 被引量:9
17
作者 Yizhou Shen Shigen Shen +3 位作者 Qi Li Haiping Zhou Zongda Wu Youyang Qu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期906-919,共14页
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high freq... The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high frequency.Thus,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes.To address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme.In particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the game.IoT devices may make malicious requests to achieve their goals of stealing privacy.Accordingly,edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed.They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.Built upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning strategy.Furthermore,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme.Therefore,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared. 展开更多
关键词 privacy preservation Internet of things Evolutionary game Data sharing Edge computing
下载PDF
Smart contract token-based privacy-preserving access control system for industrial Internet of Things 被引量:1
18
作者 Weizheng Wang Huakun Huang +3 位作者 Zhimeng Yin Thippa Reddy Gadekallu Mamoun Alazab Chunhua Su 《Digital Communications and Networks》 SCIE CSCD 2023年第2期337-346,共10页
Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability ... Due to mobile Internet technology's rapid popularization,the Industrial Internet of Things(IIoT)can be seen everywhere in our daily lives.While IIoT brings us much convenience,a series of security and scalability issues related to permission operations rise to the surface during device communications.Hence,at present,a reliable and dynamic access control management system for IIoT is in urgent need.Up till now,numerous access control architectures have been proposed for IIoT.However,owing to centralized models and heterogeneous devices,security and scalability requirements still cannot be met.In this paper,we offer a smart contract token-based solution for decentralized access control in IIoT systems.Specifically,there are three smart contracts in our system,including the Token Issue Contract(TIC),User Register Contract(URC),and Manage Contract(MC).These three contracts collaboratively supervise and manage various events in IIoT environments.We also utilize the lightweight and post-quantum encryption algorithm-Nth-degree Truncated Polynomial Ring Units(NTRU)to preserve user privacy during the registration process.Subsequently,to evaluate our proposed architecture's performance,we build a prototype platform that connects to the local blockchain.Finally,experiment results show that our scheme has achieved secure and dynamic access control for the IIoT system compared with related research. 展开更多
关键词 Blockchain privacy preservation Smart contract Industrial IoT
下载PDF
A game-theoretic approach for federated learning:A trade-off among privacy,accuracy and energy 被引量:2
19
作者 Lihua Yin Sixin Lin +3 位作者 Zhe Sun Ran Li Yuanyuan He Zhiqiang Hao 《Digital Communications and Networks》 SCIE CSCD 2024年第2期389-403,共15页
Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also ... Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become possible.Distributed devices not only provide adequate training data,but also cause privacy leakage and energy consumption.How to optimize the energy consumption in distributed communication systems,while ensuring the privacy of users and model accuracy,has become an urgent challenge.In this paper,we define the FL as a 3-layer architecture including users,agents and server.In order to find a balance among model training accuracy,privacy-preserving effect,and energy consumption,we design the training process of FL as game models.We use an extensive game tree to analyze the key elements that influence the players’decisions in the single game,and then find the incentive mechanism that meet the social norms through the repeated game.The experimental results show that the Nash equilibrium we obtained satisfies the laws of reality,and the proposed incentive mechanism can also promote users to submit high-quality data in FL.Following the multiple rounds of play,the incentive mechanism can help all players find the optimal strategies for energy,privacy,and accuracy of FL in distributed communication systems. 展开更多
关键词 Federated learning privacy preservation Energy optimization Game theory Distributed communication systems
下载PDF
Reliable and Privacy-Preserving Federated Learning with Anomalous Users
20
作者 ZHANG Weiting LIANG Haotian +1 位作者 XU Yuhua ZHANG Chuan 《ZTE Communications》 2023年第1期15-24,共10页
Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accu... Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accuracy of trained models.Although some existing works manage to solve this problem,they either lack privacy protection for users’sensitive information or introduce a two-cloud model that is difficult to find in reality.A reliable and privacy-preserving FL scheme named reliable and privacy-preserving federated learning(RPPFL)based on a single-cloud model is proposed.Specifically,inspired by the truth discovery technique,we design an approach to identify the user’s reliability and thereby decrease the impact of anomalous users.In addition,an additively homomorphic cryptosystem is utilized to provide comprehensive privacy preservation(user’s local gradient privacy and reliability privacy).We give rigorous theoretical analysis to show the security of RPPFL.Based on open datasets,we conduct extensive experiments to demonstrate that RPPEL compares favorably with existing works in terms of efficiency and accuracy. 展开更多
关键词 federated learning anomalous user privacy preservation reliability homomorphic cryptosystem
下载PDF
上一页 1 2 5 下一页 到第
使用帮助 返回顶部