scispace - formally typeset
Journal ArticleDOI

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT

Reads0
Chats0
TLDR
A personalized privacy protection (PERIO) framework based on game theory and data encryption, which is then combined with game theory to construct a rational uploading strategy and a privacy-preserving data aggregation scheme to ensure data confidentiality, integrity, and real-timeness.
Abstract
With the rapid digitalization of various industries, mobile crowdsensing (MCS), an intelligent data collection and processing paradigm of the industrial Internet of Things, has provided a promising opportunity to construct powerful industrial systems and provide industrial services. The existing unified privacy strategy for all sensing data results in excessive or insufficient protection and low quality of crowdsensing services (QoCS) in MCS. To tackle this issue, in this article we propose a personalized privacy protection (PERIO) framework based on game theory and data encryption. Initially, we design a personalized privacy measurement algorithm to calculate users’ privacy level, which is then combined with game theory to construct a rational uploading strategy. Furthermore, we propose a privacy-preserving data aggregation scheme to ensure data confidentiality, integrity, and real-timeness. Theoretical analysis and ample simulations with real trajectory dataset indicate that the PERIO scheme is effective and makes a reasonable balance between retaining high QoCS and privacy.

read more

Citations
More filters
Journal ArticleDOI

Federated Learning in Smart City Sensing: Challenges and Opportunities.

TL;DR: An overview of smart city sensing and its current challenges followed by the potential of Federated Learning in addressing those challenges is presented and clear insights on open issues, challenges, and opportunities are provided as guidance for the researchers studying this subject matter.
Journal ArticleDOI

A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs

TL;DR: A blockchain-based secure key management scheme (BC-EKM) is proposed, where stake blockchain as a trust machine replaces the majority functions of the BS and a secure cluster formation and secure node movement algorithm are designed to implement key management.
Journal ArticleDOI

An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT

TL;DR: An artificial intelligence (AI)-enabled three-party game (ATG) framework for guaranteed data privacy in the MECS of IoT is proposed, based on the random forest classifier and the $k$-anonymity algorithm, that effectively guarantees the privacy of sensitive data.
Journal ArticleDOI

Lightweight Searchable Encryption Protocol for Industrial Internet of Things

TL;DR: A light searchable ABE scheme (namely LSABE) that can significantly reduce the computing cost of IoT devices with the provision of multiple-keyword searching for data users and is extended to multiauthority scenarios so as to effectively generate and manage the public/secret keys in the distributed IoT environment.
Journal ArticleDOI

Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments

TL;DR: In this paper, a blockchain-based eHealth system called BCES is proposed to ensure that the manipulation of EHRs can be audited and any entity that had an illegal manipulation ofEHRs will be held accountable to the evidence of the constructed Proof-Chain.
References
More filters
Journal ArticleDOI

Internet of Things in Industries: A Survey

TL;DR: This review paper summarizes the current state-of-the-art IoT in industries systematically and identifies research trends and challenges.
Journal Article

GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory.

TL;DR: A social networking service, called GeoLife, is introduced, which aims to understand trajectories, locations and users, and mine the correlation between users and locations in terms of usergenerated GPS trajectories.
Journal ArticleDOI

A survey of computational location privacy

TL;DR: This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information, which includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data.
Proceedings ArticleDOI

Efficient aggregation of encrypted data in wireless sensor networks

TL;DR: This paper proposes a simple and provably secure additively homomorphic stream cipher that allows efficient aggregation of encrypted data and shows that aggregation based on this cipher can be used to efficiently compute statistical values such as mean, variance and standard deviation of sensed data, while achieving significant bandwidth gain.
Journal ArticleDOI

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions

TL;DR: The architecture and features of fog computing are reviewed and critical roles of fog nodes are studied, including real-time services, transient storage, data dissemination and decentralized computation, which are expected to draw more attention and efforts into this new architecture.
Related Papers (5)