Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes
TLDR
Zhang et al. as discussed by the authors proposed an evolutionary privacy preservation learning strategy for an edge computing-based IoT data sharing scheme, where edge nodes dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.About:
This article is published in Digital Communications and Networks.The article was published on 2022-05-01 and is currently open access. It has received 13 citations till now. The article focuses on the topics: Computer science & Enhanced Data Rates for GSM Evolution.read more
Citations
More filters
Journal ArticleDOI
How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective
TL;DR: In this article , the authors proposed an effective confidential management solution on the cloud, whose basic idea is to deploy a trusted local server between the untrusted cloud and each trusted client of a medical information management system, responsible for running an EMR cloud hierarchical storage model and an eMR cloud segmentation query model.
Proceedings ArticleDOI
A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval
TL;DR: Wang et al. as mentioned in this paper proposed a client-based framework for the privacy protection of book search, and then a privacy model to formulate the constraints in terms of accuracy, efficiency, and security, which the cover queries generated based on a user query sequence should meet.
Journal ArticleDOI
STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things
TL;DR: Zhang et al. as discussed by the authors proposed a novel virus spread model (STSIR) based on an epidemic theory's analysis framework and individual-group game theory, which more reasonably describes viruses spread among devices considering people behavior.
Journal ArticleDOI
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems
Journal ArticleDOI
Stimulating trust cooperation in edge services: An evolutionary tripartite game
TL;DR: In this paper , a new tripartite game model of monitors, edge service providers and users is proposed to enhance trust and cooperation among service participants, and the ideal stable state point (active monitoring, honesty, trust) is obtained by calculating the value of an eigenvalue less than zero in the Jacobian matrix.
References
More filters
Journal ArticleDOI
Differential Privacy Techniques for Cyber Physical Systems: A Survey
TL;DR: This paper surveys the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT).
Journal ArticleDOI
IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network
TL;DR: The major purpose of this work is to create a novel and secure cache decision system (CDS) in a wireless network that operates over an SB, which will offer the users safer and efficient environment for browsing the Internet, sharing and managing large-scale data in the fog.
Journal ArticleDOI
Game Theory for Cyber Security and Privacy
Cuong T. Do,Nguyen H. Tran,Choong Seon Hong,Charles A. Kamhoua,Kevin Kwiat,Erik Blasch,Shaolei Ren,Niki Pissinou,S. Sitharama Iyengar +8 more
TL;DR: This survey demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employgame theory to establish a comprehensive understanding of emergingSecurity and privacy problems in cyberspace and potential solutions.
Journal ArticleDOI
Security and privacy in 6G networks: New areas and new challenges
TL;DR: This survey discusses four key aspects of 6G networks – real-time intelligent edge computing, distributed artificial intelligence, intelligent radio, and 3D intercoms – and some promising emerging technologies in each area, along with the relevant security and privacy issues.
Posted Content
Security, Privacy, and Access Control in Information-Centric Networking: A Survey
TL;DR: In this article, the authors survey the existing literature in security and privacy sub-space in ICN and explore three broad areas: security threats, privacy risks, and access control enforcement mechanisms.