登录    注册    忘记密码

详细信息

Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes  ( SCI-EXPANDED收录 EI收录)   被引量:44

文献类型:期刊文献

英文题名:Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

作者:Shen, Yizhou[1,2];Shen, Shigen[3];Li, Qi[1];Zhou, Haiping[1];Wu, Zongda[1];Qu, Youyang[4]

机构:[1]Shaoxing Univ, Dept Comp Sci & Engn, Shaoxing 312000, Peoples R China;[2]Cardiff Univ, Sch Comp Sci & Informat, Cardiff CF24 3AA, Wales;[3]Huzhou Univ, Sch Informat Engn, Huzhou 313000, Zhejiang, Peoples R China;[4]Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia

年份:2023

卷号:9

期号:4

起止页码:906

外文期刊名:DIGITAL COMMUNICATIONS AND NETWORKS

收录:SCI-EXPANDED(收录号:WOS:001075088900001)、、EI(收录号:20241015711764)、Scopus(收录号:2-s2.0-85153035840)、WOS

基金:This work was supported in part by Zhejiang Provincial Natural Science Foundation of China under Grant nos. LZ22F020002 and LY22F020003, National Natural Science Foundation of China under Grant nos. 61772018 and 62002226, and the key project of Humanities and Social Sciences in Colleges and Universities of Zhejiang Province under Grant no. 2021GH017.

语种:英文

外文关键词:Privacy preservation; Internet of things; Evolutionary game; Data sharing; Edge computing

外文摘要:The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive volumes of data explosion. The generated data is collected and shared using edge-based IoT structures at a considerably high frequency. Thus, the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes. To address the identified issue, we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme. In particular, we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes, where IoT devices and edge nodes are two parties of the game. IoT devices may make malicious requests to achieve their goals of stealing privacy. Accordingly, edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed. They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs. Built upon a developed application framework to illustrate the concrete data sharing architecture, a novel algorithm is proposed that can derive the optimal evolutionary learning strategy. Furthermore, we numerically simulate evolutionarily stable strategies, and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme. Therefore, the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared.

参考文献:

正在载入数据...

版权所有©绍兴文理学院 重庆维普资讯有限公司 渝B2-20050021-8
渝公网安备 50019002500408号 违法和不良信息举报中心