Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes  被引量:9

在线阅读下载全文

作  者:Yizhou Shen Shigen Shen Qi Li Haiping Zhou Zongda Wu Youyang Qu 

机构地区:[1]Department of Computer Science and Engineering,Shaoxing University,Shaoxing,312000,China [2]School of Computer Science and Informatics,Cardiff University,Cardiff,CF243AA,United Kingdom [3]School of Information Engineering,Huzhou University,Huzhou 313000,Zhejiang,China [4]School of Information Technology,Deakin University,Burwood,VIC,3125,Australia

出  处:《Digital Communications and Networks》2023年第4期906-919,共14页数字通信与网络(英文版)

基  金:supported in part by Zhejiang Provincial Natural Science Foundation of China under Grant nos.LZ22F020002 and LY22F020003;National Natural Science Foundation of China under Grant nos.61772018 and 62002226;the key project of Humanities and Social Sciences in Colleges and Universities of Zhejiang Province under Grant no.2021GH017.

摘  要:The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high frequency.Thus,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes.To address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme.In particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the game.IoT devices may make malicious requests to achieve their goals of stealing privacy.Accordingly,edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed.They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.Built upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning strategy.Furthermore,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme.Therefore,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared.

关 键 词:Privacy preservation Internet of things Evolutionary game Data sharing Edge computing 

分 类 号:TN929.5[电子电信—通信与信息系统] TP309[电子电信—信息与通信工程]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象