登录    注册    忘记密码

详细信息

Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes     被引量:9

文献类型:期刊文献

中文题名:Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

作者:Yizhou Shen[1,2];Shigen Shen[3];Qi Li[1];Haiping Zhou[1];Zongda Wu[1];Youyang Qu[4]

机构:[1]Department of Computer Science and Engineering,Shaoxing University,Shaoxing,312000,China;[2]School of Computer Science and Informatics,Cardiff University,Cardiff,CF243AA,United Kingdom;[3]School of Information Engineering,Huzhou University,Huzhou 313000,Zhejiang,China;[4]School of Information Technology,Deakin University,Burwood,VIC,3125,Australia

年份:2023

卷号:9

期号:4

起止页码:906

中文期刊名:数字通信与网络:英文版

外文期刊名:Digital Communications and Networks

收录:Scopus、CSCD2023_2024、CSCD、PubMed

基金:supported in part by Zhejiang Provincial Natural Science Foundation of China under Grant nos.LZ22F020002 and LY22F020003;National Natural Science Foundation of China under Grant nos.61772018 and 62002226;the key project of Humanities and Social Sciences in Colleges and Universities of Zhejiang Province under Grant no.2021GH017.

语种:英文

中文关键词:Privacy preservation;Internet of things;Evolutionary game;Data sharing;Edge computing

中文摘要:The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high frequency.Thus,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes.To address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme.In particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the game.IoT devices may make malicious requests to achieve their goals of stealing privacy.Accordingly,edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed.They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.Built upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning strategy.Furthermore,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme.Therefore,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared.

参考文献:

正在载入数据...

版权所有©绍兴文理学院 重庆维普资讯有限公司 渝B2-20050021-8
渝公网安备 50019002500408号 违法和不良信息举报中心