Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Practical Privacy-preserving High-order Bi-Lanczos in Integrated Edge-Fog-Cloud Architecture for Cyber-Physical-Social Systems

Published: 28 March 2019 Publication History

Abstract

Smart environments, also referred to as cyber-physical-social systems (CPSSs), are expected to significantly benefit from the integration of edge, fog, and cloud for intelligence service flexibility, efficiency, and cost saving. High-order Bi-Lanczos method has emerged as a powerful tool serving as multi-dimensional data processing, such as prevailing feature extraction, classification, and clustering of high-order data, in CPSSs. However, integrated edge-fog-cloud architecture is open and users have very limited control; how to carry out big data processing without compromising the security and privacy is a challenging issue in edge-fog-cloud-assisted smart applications. In this work, we propose a novel and practical privacy-preserving high-order Bi-Lanczos scheme in integrated edge-fog-cloud architectural paradigm for smart environments. More precisely, we first propose a privacy-preserving big data processing model using the synergy of edge, fog, and cloud. The proposed model enables edge, fog, and cloud to cooperatively complete big data processing without compromising users’ privacy for large-scale tensor data in CPSSs. Subsequently, making use of the model, we present a privacy-preserving high-order Bi-Lanczos scheme. Finally, we theoretically and empirically analyze the security and efficiency of the proposed privacy-preserving high-order Bi-Lanczos scheme based on an intelligent surveillance system case study. And the results demonstrate that the proposed scheme provides a privacy-preserving and efficient way of computations in integrated edge-fog-cloud paradigm for smart environments.

References

[1]
Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, and Atif Alamri. 2017. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5 (2017), 22313--22328.
[2]
Vicente Hern Andez, José E. Rom An, and Andr És Tom As. 2008. A robust and efficient parallel SVD solver based on restarted Lanczos bidiagonalization. Electron. Trans. Numer. Anal. 31 (2008), 68--85.
[3]
Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine learning classification over encrypted data. In Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS’15).
[4]
Ronald Cramer, Ivan Bjerre Damgård, and Jesper Buus Nielsen. 2015. Secure Multiparty Computation and Secret Sharing. Cambridge University Press.
[5]
Wenxiu Ding, Zheng Yan, and Robert Deng. 2017. Privacy-preserving data processing with flexible access control. IEEE Trans. Depend. Secure Comput. (2017).
[6]
Miao Du, Kun Wang, Xiulong Liu, Song Guo, and Yan Zhang. 2016. A differential privacy-based query model for sustainable fog data centers. IEEE Trans. Sustain. Comput. (2016).
[7]
Jun Feng, Laurence T. Yang, and Ronghao Zhang. 2018. Tensor-based big biometric data reduction in cloud. IEEE Cloud Comput. 5, 4 (2018), 38--46.
[8]
Jun Feng, Laurence T. Yang, Qing Zhu, and Kim-Kwang Raymond Choo. 2018. Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Trans. Depend. Secure Comput.
[9]
Massimo Ficco, Christian Esposito, Xiang Yang, and Francesco Palmieri. 2017. Pseudo-dynamic testing of realistic edge-fog cloud ecosystems. IEEE Commun. Mag. 55, 11 (2017), 98--104.
[10]
Pengfei Hu, Huansheng Ning, Tie Qiu, Houbing Song, Yanna Wang, and Xuanxia Yao. 2017. Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J. 4, 5 (2017), 1143--1155.
[11]
Pengfei Hu, Huansheng Ning, Tie Qiu, Yanfei Zhang, and Xiong Luo. 2017. Fog computing-based face identification and resolution scheme in internet of things. IEEE Trans. Industr. Info. 13, 4 (2017), 1910--1920.
[12]
Rong Jiang, Rongxing Lu, and Kim-Kwang Raymond Choo. 2018. Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Gen. Comput. Syst. 78 (2018), 392--401.
[13]
Jiawen Kang, Rong Yu, Xumin Huang, and Yan Zhang. 2018. Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transport. Syst. 19, 8 (2018), 2627--2637.
[14]
Dongyoung Koo and Junbeom Hur. 2018. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gen. Comput. Syst. 78 (2018), 739--752.
[15]
Chen Li, Rongxing Lu, Hui Li, Le Chen, and Jie Chen. 2015. PDA: A privacy-preserving dual-functional aggregation scheme for smart grid communications. Secur. Commun. Netw. 8, 15 (2015), 2494--2506.
[16]
Hong Liu, Huansheng Ning, Yan Zhang, Qingxu Xiong, and Laurence T. Yang. 2017. Role-dependent privacy preservation for secure V2G networks in the smart grid. IEEE Trans. Info. Forens. Secur. 9, 2 (2017), 208--220.
[17]
Hong Liu, Huansheng Ning, Yan Zhang, and Laurence T. Yang. 2012. Aggregated-proofs-based privacy-preserving authentication for V2G networks in the smart grid. IEEE Trans. Smart Grid 3, 4 (2012), 1722--1733.
[18]
Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Amine Ferrag, Nikumani Choudhury, and Vikas Kumar. 2017. Security and privacy in fog computing: Challenges. IEEE Access 5 (2017), 19293--19304.
[19]
Arslan Munir, Prasanna Kansakar, and Samee U. Khan. 2017. IFCIoT: Integrated fog cloud IoT: A novel architectural paradigm for the future internet of things. IEEE Consum. Electron. Mag. 6, 3 (2017), 74--82.
[20]
Vijay K Naik, Chuang Liu, Lingyun Yang, and Jonathan Wagner. 2005. Online resource matching for heterogeneous grid environments. In Proceedings of the Annual IEEE/ACM International Symposium in Cluster, Cloud, and Grid Computing (CCGrid’05). IEEE, 607--614.
[21]
Huansheng Ning, Hong Liu, Jianhua Ma, Laurence T. Yang, and Runhe Huang. 2015. Cybermatics: Cyber-physical-social-thinking hyperspace-based science and technology. Future Gen. Comput. Syst. 56 (2015), 504--522.
[22]
Opeyemi Osanaiye, Shuo Chen, Zheng Yan, Rongxing Lu, Kim-Kwang Raymond Choo, and Mqhele Dlodlo. 2017. From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access 5 (2017), 8284--8300.
[23]
Evangelos E. Papalexakis, Christos Faloutsos, and Nicholas D. Sidiropoulos. 2016. Tensors for data mining and data fusion: Models, applications, and scalable algorithms. ACM Trans. Intell. Syst. Technol. 8, 2 (2016), 16.
[24]
Namyong Park, Sejoon Oh, and U. Kang. 2017. Fast and scalable distributed boolean tensor factorization. In Proceedings of the IEEE 33rd International Conference on Data Engineering (ICDE’17). 1071--1082.
[25]
P. Jonathon Phillips, Sudeep Sarkar, Isidro Robledo, Patrick Grother, and Kevin Bowyer. 2002. The gait identification challenge problem: Data sets and baseline algorithm. In Proceedings of the IEEE 16th International Conference on Pattern Recognition (ICPR’02). 385--388.
[26]
Bharath K. Samanthula, Yousef Elmehdwi, and Wei Jiang. 2015. K-nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27, 5 (2015), 1261--1273.
[27]
Huaqun Wang, Zhiwei Wang, and Josep Domingo-Ferrer. 2018. Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gen. Comput. Syst. 78 (2018), 712--719.
[28]
Tian Wang, Jiandian Zeng, Md Zakirul Alam Bhuiyan, Hui Tian, Yiqiao Cai, Yonghong Chen, and Bineng Zhong. 2017. Trajectory privacy preservation based on a fog structure in cloud location services. IEEE Access 5 (2017), 7692--7701.
[29]
Xiaokang Wang, Wei Wang, Laurence T. Yang, Siwei Liao, Dexiang Yin, and M. Jamal Deen. 2018. A distributed HOSVD method with its incremental computation for big data in cyber-physical-social systems. IEEE Trans. Comput. Soc. Syst. 5, 2 (2018), 481--492.
[30]
Zheng Yan, Mingjun Wang, Yuxiang Li, and Athanasios V. Vasilakos. 2016. Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput. 3, 2 (2016), 28--35.
[31]
Daqiang Zhang, Laurence T. Yang, Min Chen, Shengjie Zhao, Minyi Guo, and Yin Zhang. 2017. Real-time locating systems using active RFID for internet of things. IEEE Syst. J. 10, 3 (2017), 1226--1235.
[32]
Qingchen Zhang, Laurence T. Yang, Xingang Liu, Zhikui Chen, and Peng Li. 2017. A Tucker deep computation model for mobile multimedia feature learning. ACM Trans. Multimedia Comput., Commun., Appl. 13, 3s (2017), 39.
[33]
Rui Zhang, Rui Xue, Ting Yu, and Ling Liu. 2016. Dynamic and efficient private keyword search over inverted index-based encrypted data. ACM Trans. Internet Technol. 16, 3 (2016), 21.
[34]
Yuexin Zhang, Yang Xiang, and Xinyi Huang. 2016. Password-authenticated group key exchange: A cross-layer design. ACM Trans. Internet Technol. 16, 4 (2016), 24.

Cited By

View all
  • (2024)Secure Low-complexity Compressive Sensing with Preconditioning Prior Regularization ReconstructionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363530820:4(1-22)Online publication date: 11-Jan-2024
  • (2024)The survey on multi-source data fusion in cyber-physical-social systems: Foundational infrastructure for industrial metaverses and industries 5.0Information Fusion10.1016/j.inffus.2024.102321107(102321)Online publication date: Jul-2024
  • (2023)Behavioral Modeling and Prediction in Social Perception and Computing: A SurveyIEEE Transactions on Computational Social Systems10.1109/TCSS.2022.323021110:4(2008-2021)Online publication date: Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 19, Issue 2
Special Issue on Fog, Edge, and Cloud Integration
May 2019
288 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3322882
  • Editor:
  • Ling Liu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 March 2019
Accepted: 01 May 2018
Revised: 01 April 2018
Received: 01 December 2017
Published in TOIT Volume 19, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Smart environments
  2. cyber-physical-social systems
  3. edge-fog-cloud computing
  4. high-order Bi-Lanczos
  5. privacy preservation
  6. tensor

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Shenzhen Fundamental Research Program
  • Fundamental Research Funds for the Central Universities
  • National Key Research 8 Development Plan of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)2
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Secure Low-complexity Compressive Sensing with Preconditioning Prior Regularization ReconstructionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/363530820:4(1-22)Online publication date: 11-Jan-2024
  • (2024)The survey on multi-source data fusion in cyber-physical-social systems: Foundational infrastructure for industrial metaverses and industries 5.0Information Fusion10.1016/j.inffus.2024.102321107(102321)Online publication date: Jul-2024
  • (2023)Behavioral Modeling and Prediction in Social Perception and Computing: A SurveyIEEE Transactions on Computational Social Systems10.1109/TCSS.2022.323021110:4(2008-2021)Online publication date: Aug-2023
  • (2023)Analysis of multi-dimensional Industrial IoT (IIoT) data in Edge–Fog–Cloud based architectural frameworks : A survey on current state and research challengesJournal of Industrial Information Integration10.1016/j.jii.2023.10050435(100504)Online publication date: Oct-2023
  • (2023)Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directionsArray10.1016/j.array.2023.10029319(100293)Online publication date: Sep-2023
  • (2022)Privacy Preserving High-Order Bi-Lanczos in Cloud–Fog Computing for Industrial ApplicationsIEEE Transactions on Industrial Informatics10.1109/TII.2020.299808618:10(7009-7018)Online publication date: Oct-2022
  • (2022)Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber–Physical SystemsIEEE Internet of Things Journal10.1109/JIOT.2021.30814569:22(22375-22388)Online publication date: 15-Nov-2022
  • (2022)Edge-Fog-Cloud Secure Storage with Deep-Learning-Assisted Digital TwinsIEEE Internet of Things Magazine10.1109/IOTM.002.21001455:2(36-40)Online publication date: Jun-2022
  • (2022)An ensemble of random decision trees with local differential privacy in edge computingNeurocomputing10.1016/j.neucom.2021.01.145485(181-195)Online publication date: May-2022
  • (2022)Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectivesInternet of Things10.1016/j.iot.2021.10049218(100492)Online publication date: May-2022
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media