Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain

Published: 08 March 2024 Publication History

Abstract

With the wide application of Internet of Things (IoT) technology, large volumes of multimodal data are collected and analyzed for various diagnoses, analyses, and predictions to help in decision-making and management. However, the research on protecting data integrity and privacy is quite limited, while the lack of proper protection for sensitive data may have significant impacts on the benefits and gains of data owners. In this research, we propose a protection solution for data integrity and privacy. Specifically, our system protects data integrity through distributed systems and blockchain technology. Meanwhile, our system guarantees data privacy using differential privacy and Machine Learning (ML) techniques. Our system aims to maintain the usability of the data for further data analytical tasks of data users, while encrypting the data according to the requirements of data owners. We implement our solution with smart contracts, distributed file systems, and ML models. The experimental results show that our proposed solution can effectively encrypt source IoT data according to the requirements of data users while data integrity can be protected under the blockchain.

References

[1]
Osama Elsherbiny, Lei Zhou, Yong He, and Zhengjun Qiu. 2022. A novel hybrid deep network for diagnosing water status in wheat crop using IoT-based multimodal data. Computers and Electronics in Agriculture 203 (2022), 107453.
[2]
Jianbang Dai, Xiaolong Xu, and Fu Xiao. 2023. GLADS: A global-local attention data selection model for multimodal multitask encrypted traffic classification of IoT. Computer Networks 225 (2023), 109652.
[3]
Rahul Dagar, Subhranil Som, and Sunil Kumar Khatri. 2018. Smart farming - IoT in agriculture. In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA’18). 1052–1056. DOI:
[4]
Elsayed Said Mohamed, A. A. Belal, Sameh Kotb Abd-Elmabod, Mohammed A. El-Shirbeny, A. Gad, and Mohamed B. Zahran. 2021. Smart farming for improving agricultural management. Egyptian Journal of Remote Sensing and Space Science 24, 3 (2021), 971–981.
[5]
J. Efrim Boritz. 2005. IS practitioners’ views on core concepts of information integrity. International Journal of Accounting Information Systems 6, 4 (2005), 260–279.
[6]
Edoardo Gaetani, Leonardo Aniello, Roberto Baldoni, Federico Lombardi, Andrea Margheri, and Vladimiro Sassone. 2017. Blockchain-based database to ensure data integrity in cloud computing environments. In Italian Conference on Cybersecurity (ITASEC), Venice, Italy, 10 pp.
[7]
Leanne Wiseman, Jay Sanderson, Airong Zhang, and Emma Jakku. 2019. Farmers and their data: An examination of farmers’ reluctance to share their data through the lens of the laws impacting smart farming. NJAS-Wageningen Journal of Life Sciences 90 (2019), 100301.
[8]
Shangping Wang, Yinglong Zhang, and Yaling Zhang. 2018. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems. IEEE Access 6 (2018), 38437–38450.
[9]
Nabil Rifi, Elie Rachkidi, Nazim Agoulmine, and Nada Chendeb Taher. 2017. Towards using blockchain technology for eHealth data access management. In 2017 Fourth International Conference on Advances in Biomedical Engineering (ICABME’17). IEEE, 1–4.
[10]
Ahmed El Ouadrhiri and Ahmed Abdelhadi. 2022. Differential privacy for deep and federated learning: A survey. IEEE Access 10 (2022), 22359–22380.
[11]
Ahmed Afif Monrat, Olov Schelén, and Karl Andersson. 2019. A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 7 (2019), 117134–117151.
[12]
Nouhaila El Akrami, Mohamed Hanine, Emmanuel Soriano Flores, Daniel Gavilanes Aray, and Imran Ashraf. 2023. Unleashing the potential of blockchain and machine learning: Insights and emerging trends from bibliometric analysis. IEEE Access 11 (2023), 78879–78903.
[13]
Arunima Ghosh, Shashank Gupta, Amit Dua, and Neeraj Kumar. 2020. Security of cryptocurrencies in blockchain technology: State-of-art, challenges and future prospects. Journal of Network and Computer Applications 163 (2020), 102635.
[14]
Dejan Vujičić, Dijana Jagodić, and Siniša Ranđić. 2018. Blockchain technology, bitcoin, and ethereum: A brief overview. In 2018 17th International Symposium Infoteh-jahorina (Infoteh’18). IEEE, 1–6.
[15]
Satpal Singh Kushwaha, Sandeep Joshi, Dilbag Singh, Manjit Kaur, and Heung-No Lee. 2022. Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access 10 (2022), 6605–6621.
[16]
Juan Benet. 2014. IPFS-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561.
[17]
Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 308–318.
[18]
Ying Zhao and Jinjun Chen. 2022. A survey on differential privacy for unstructured data content. ACM Computing Surveys (CSUR) 54, 10s (2022), 1–28.
[19]
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference. Springer, 265–284.
[20]
Quan Geng and Pramod Viswanath. 2015. The optimal noise-adding mechanism in differential privacy. IEEE Transactions on Information Theory 62, 2 (2015), 925–951.
[21]
Ya-Nan Cao, Yujue Wang, Yong Ding, Zhenwei Guo, Qianhong Wu, and Hai Liang. 2022. Blockchain-empowered security and privacy protection technologies for smart grid. Computer Standards & Interfaces 85 (2022), 103708.
[22]
Baodong Wen, Yujue Wang, Yong Ding, Haibin Zheng, Bo Qin, and Changsong Yang. 2023. Security and privacy protection technologies in securing blockchain applications. Information Sciences 645 (2023), 119322.
[23]
Li Duan, Wenyao Xu, Wei Ni, and Wei Wang. 2023. BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations. Journal of Systems Architecture 140 (2023), 102897.
[24]
Jingwei Liu, Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, and Mohsen Guizani. 2018. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records. In 2018 IEEE Global Communications Conference (GLOBECOM’18). IEEE, 1–6.
[25]
Caixia Yang, Liang Tan, Na Shi, Bolei Xu, Yang Cao, and Keping Yu. 2020. AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud. IEEE Access 8 (2020), 70604–70615.
[26]
Xinyan Li, Huimin Zhao, and Wu Deng. 2023. BFOD: Blockchain-based privacy protection and security sharing scheme of flight operation data. IEEE Internet of Things Journal 11, 2 (2023), 3392–3401.
[27]
Rathindra Sarathy and Krishnamurty Muralidhar. 2011. Evaluating Laplace noise addition to satisfy differential privacy for numeric data. Transactions on Data Privacy 4, 1 (2011), 1–17.
[28]
Zihao Shan, Kui Ren, Marina Blanton, and Cong Wang. 2018. Practical secure computation outsourcing: A survey. ACM Computing Surveys (CSUR) 51, 2 (2018), 1–40.
[29]
Jaewoo Lee and Chris Clifton. 2012. Differential identifiability. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1041–1049.
[30]
Ninghui Li, Wahbeh Qardaji, Dong Su, Yi Wu, and Weining Yang. 2013. Membership privacy: A unifying framework for privacy definitions. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. 889–900.
[31]
Latanya Sweeney. 2002. k-Anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems 10, 5 (2002), 557–570.
[32]
Junbo Zhang, Yu Zheng, Dekang Qi, Ruiyuan Li, and Xiuwen Yi. 2016. DNN-based prediction model for spatio-temporal data. In Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. 1–4.
[33]
Qingzhi Liu, Tiancong Xia, Long Cheng, Merijn Van Eijk, Tanir Ozcelebi, and Ying Mao. 2021. Deep reinforcement learning for load-balancing aware network control in IoT edge systems. IEEE Transactions on Parallel and Distributed Systems 33, 6 (2021), 1491–1502.
[34]
Qingzhi Liu, Long Cheng, Adele Lu Jia, and Cong Liu. 2021. Deep reinforcement learning for communication flow control in wireless mesh networks. IEEE Network 35, 2 (2021), 112–119.
[35]
Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Alex Graves, Ioannis Antonoglou, Daan Wierstra, and Martin Riedmiller. 2013. Playing Atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602.
[36]
Jianbo Du, Wenjie Cheng, Guangyue Lu, Haotong Cao, Xiaoli Chu, Zhicai Zhang, and Junxuan Wang. 2021. Resource pricing and allocation in MEC enabled blockchain systems: An A3C deep reinforcement learning approach. IEEE Transactions on Network Science and Engineering 9, 1 (2021), 33–44.
[37]
M. Mehdi Afsar, Trafford Crump, and Behrouz Far. 2022. Reinforcement learning based recommender systems: A survey. Computing Surveys 55, 7 (2022), 1–38.
[38]
Yan Ge and Haixia Wu. 2020. Prediction of corn price fluctuation based on multiple linear regression analysis model under big data. Neural Computing and Applications 32 (2020), 16843–16855.
[39]
Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine Learning 20, 3 (1995), 273–297.
[40]
David Katzin, Simon van Mourik, Frank Kempkes, and Eldert J. van Henten. 2020. GreenLight–An open source model for greenhouses with supplemental lighting: Evaluation of heat requirements under LED and HPS lamps. Biosystems Engineering 194 (2020), 61–81.

Cited By

View all
  • (2024)Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of ThingsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/364304020:6(1-4)Online publication date: 8-Mar-2024
  • (2024)Incorporating Part of Speech Information in span representation for Named Entity RecognitionApplied Soft Computing10.1016/j.asoc.2024.111844163:COnline publication date: 1-Sep-2024

Index Terms

  1. Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 6
    June 2024
    715 pages
    EISSN:1551-6865
    DOI:10.1145/3613638
    • Editor:
    • Abdulmotaleb El Saddik
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 March 2024
    Online AM: 06 January 2024
    Accepted: 17 December 2023
    Revised: 19 November 2023
    Received: 02 May 2023
    Published in TOMM Volume 20, Issue 6

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Blockchain
    2. machine learning
    3. Internet of Things
    4. multimodal data
    5. privacy
    6. integrity

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)545
    • Downloads (Last 6 weeks)45
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Introduction to the Special Issue on Integrity of Multimedia and Multimodal Data in Internet of ThingsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/364304020:6(1-4)Online publication date: 8-Mar-2024
    • (2024)Incorporating Part of Speech Information in span representation for Named Entity RecognitionApplied Soft Computing10.1016/j.asoc.2024.111844163:COnline publication date: 1-Sep-2024

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media