scispace - formally typeset
Open AccessJournal ArticleDOI

Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

TLDR
Zhang et al. as discussed by the authors proposed an evolutionary privacy preservation learning strategy for an edge computing-based IoT data sharing scheme, where edge nodes dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.
About
This article is published in Digital Communications and Networks.The article was published on 2022-05-01 and is currently open access. It has received 13 citations till now. The article focuses on the topics: Computer science & Enhanced Data Rates for GSM Evolution.

read more

Citations
More filters
Journal ArticleDOI

How to ensure the confidentiality of electronic medical records on the cloud: A technical perspective

TL;DR: In this article , the authors proposed an effective confidential management solution on the cloud, whose basic idea is to deploy a trusted local server between the untrusted cloud and each trusted client of a medical information management system, responsible for running an EMR cloud hierarchical storage model and an eMR cloud segmentation query model.
Proceedings ArticleDOI

A Confusion Method for the Protection of User Topic Privacy in Chinese Keyword-based Book Retrieval

TL;DR: Wang et al. as mentioned in this paper proposed a client-based framework for the privacy protection of book search, and then a privacy model to formulate the constraints in terms of accuracy, efficiency, and security, which the cover queries generated based on a user query sequence should meet.
Journal ArticleDOI

STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things

TL;DR: Zhang et al. as discussed by the authors proposed a novel virus spread model (STSIR) based on an epidemic theory's analysis framework and individual-group game theory, which more reasonably describes viruses spread among devices considering people behavior.
Journal ArticleDOI

Stimulating trust cooperation in edge services: An evolutionary tripartite game

TL;DR: In this paper , a new tripartite game model of monitors, edge service providers and users is proposed to enhance trust and cooperation among service participants, and the ideal stable state point (active monitoring, honesty, trust) is obtained by calculating the value of an eigenvalue less than zero in the Jacobian matrix.
References
More filters
Journal ArticleDOI

Differential Privacy Techniques for Cyber Physical Systems: A Survey

TL;DR: This paper surveys the application and implementation of differential privacy in four major applications of CPSs named as energy systems, transportation systems, healthcare and medical systems, and industrial Internet of things (IIoT).
Journal ArticleDOI

IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network

TL;DR: The major purpose of this work is to create a novel and secure cache decision system (CDS) in a wireless network that operates over an SB, which will offer the users safer and efficient environment for browsing the Internet, sharing and managing large-scale data in the fog.
Journal ArticleDOI

Game Theory for Cyber Security and Privacy

TL;DR: This survey demonstrates how to employ game-theoretic approaches to security and privacy but also encourages researchers to employgame theory to establish a comprehensive understanding of emergingSecurity and privacy problems in cyberspace and potential solutions.
Journal ArticleDOI

Security and privacy in 6G networks: New areas and new challenges

TL;DR: This survey discusses four key aspects of 6G networks – real-time intelligent edge computing, distributed artificial intelligence, intelligent radio, and 3D intercoms – and some promising emerging technologies in each area, along with the relevant security and privacy issues.
Posted Content

Security, Privacy, and Access Control in Information-Centric Networking: A Survey

TL;DR: In this article, the authors survey the existing literature in security and privacy sub-space in ICN and explore three broad areas: security threats, privacy risks, and access control enforcement mechanisms.
Related Papers (5)