A security-and privacy-preserving approach based on data disturbance for collaborative edge computing in social IoT systems

P Zhang, Y Wang, N Kumar, C Jiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
P Zhang, Y Wang, N Kumar, C Jiang, G Shi
IEEE Transactions on Computational Social Systems, 2021ieeexplore.ieee.org
The Internet of things (IoT) has certainly become one of the hottest technology frameworks of
the year. It is deep in many industries, affecting people's lives in all directions. The rapid
development of the IoT technology accelerates the process of the era of “Internet of
everything” but also changes the role of terminal equipment at the edge of the network. It has
changed from a single data user to a dual role of both producing and using data. And
collaborative edge computing (CEC) has been born in time. CEC itself can not only solve the …
The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people’s lives in all directions. The rapid development of the IoT technology accelerates the process of the era of “Internet of everything” but also changes the role of terminal equipment at the edge of the network. It has changed from a single data user to a dual role of both producing and using data. And collaborative edge computing (CEC) has been born in time. CEC itself can not only solve the problem of computing and storage but also combines with the deep learning (DL) model to make full use of edge computing ability. However, as the core of DL, the robustness of neural network is often not high. In addition, edge devices of CEC are facing a highly dynamic environment, which can easily cause the edge network to be attacked by malicious devices. Therefore, user privacy protection and security issues for CEC deserve more attention. To avoid privacy leakage and security crisis of CEC in social IoT systems, a data protection method based on data disturbance method and adversarial training viewpoint is introduced in this article. Besides, a new adversarial sample generation method based on the firefly algorithm (FA) is proposed. This method reduces the time complexity of traditional by an order for magnitude compared with traditional generative adversarial network (GAN) generation. Since sentences, information on CEC in the IoT system is characterized by a large amount of data, strict confidentiality, and high-security requirements, and they are usually high-risk information on privacy leakage. The proposed method is conducted to the sentence similarity analysis model based on a convolutional neural network (CNN) in the CEC scene to test the feasibility of the method. Compared with the original CNN, the accuracy of the model using the confrontation training method is improved by 4.8%. At the same time, the security value of our model is 2.1% higher than that of the simple CNN model, and it has the best security performance among the four comparison models. Further experiments have demonstrated that the model performs better in its capacity of resisting disturbance and can effectively help multiple organizations to implement data usage and sentence information on the requirements of user privacy protection, data security, and government regulations.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果