Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Differentially Private Tensor Train Deep Computation for Internet of Multimedia Things

Published: 31 December 2020 Publication History

Abstract

The significant growth of the Internet of Things (IoT) takes a key and active role in healthcare, smart homes, smart manufacturing, and wearable gadgets. Due to complexness and difficulty in processing multimedia data, the IoT based scheme, namely Internet of Multimedia Things (IoMT) exists that is specialized for services and applications based on multimedia data. However, IoMT generated data are facing major processing and privacy issues. Therefore, tensor-based deep computation models proved a better platform to process IoMT generated data. A differentially private deep computation method working in the tensor space can attest to its efficacy for IoMT. Nevertheless, the deep computation model comprises a multitude of parameters; thus, it requires large units of memory and expensive computing units with higher performance levels, which hinders its performance for IoMT. Motivated by this, therefore, the paper proposes a deep private tensor train autoencoder (dPTTAE) technique to deal with IoMT generated data. Notably, the compression of weight tensors to manageable tensor train format is achieved through Tensor Train (TT) network. Moreover, TT format parameters are trained through higher-order back-propagation and gradient descent. We applied dPTTAE on three representative datasets. Comprehensive experimental evaluations and theoretical analysis show that dPTTAE enhances training time efficiency, and greatly improve memory utilization efficiency, attesting its potential for IoMT.

References

[1]
Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 308--318.
[2]
Rakesh Agrawal and Ramakrishnan Srikant. 2000. Privacy-preserving data mining. In ACM Sigmod Record, Vol. 29. ACM, 439--450.
[3]
Sheeraz A. Alvi, Bilal Afzal, Ghalib A. Shah, Luigi Atzori, and Waqar Mahmood. 2015. Internet of multimedia things: Vision and challenges. Ad Hoc Networks 33 (2015), 87--111.
[4]
Asra Aslam and Edward Curry. 2018. Towards a generalized approach for deep neural network based event processing for the internet of multimedia things. IEEE Access 6 (2018), 25573--25587.
[5]
Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The internet of things: A survey. Computer Networks 54, 15 (2010), 2787--2805.
[6]
Yoshua Bengio, et al. 2009. Learning deep architectures for AI. Foundations and Trends® in Machine Learning 2, 1 (2009), 1--127.
[7]
Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation learning: A review and new perspectives. IEEE Transactions on Pattern Analysis and Machine Intelligence 35, 8 (2013), 1798--1828.
[8]
Wenlin Chen, James Wilson, Stephen Tyree, Kilian Weinberger, and Yixin Chen. 2015. Compressing neural networks with the hashing trick. In International Conference on Machine Learning. 2285--2294.
[9]
Xue-Wen Chen and Xiaotong Lin. 2014. Big data deep learning: Challenges and perspectives. IEEE Access 2 (2014), 514--525.
[10]
Andrzej Cichocki. 2014. Era of big data processing: A new approach via tensor networks and tensor decompositions. arXiv preprint arXiv:1403.2048 (2014).
[11]
Adam Coates, Andrew Ng, and Honglak Lee. 2011. An analysis of single-layer networks in unsupervised feature learning. In Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics. 215--223.
[12]
Cynthia Dwork. 2008. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation. Springer, 1--19.
[13]
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference. Springer, 265--284.
[14]
Jun Feng, Laurence T. Yang, Xingang Liu, and Ronghao Zhang. 2018. Privacy-preserving tensor analysis and processing models for wireless Internet of Things. IEEE Wireless Communications 25, 6 (2018), 98--103.
[15]
Jun Feng, Laurence T. Yang, Xin Nie, and Nicholaus J. Gati. 2020. Edge-cloud-aided differentially private tucker decomposition for cyber-physical-social systems. IEEE Internet of Things Journal (2020).
[16]
Jun Feng, Laurence T. Yang, and Ronghao Zhang. 2019. Practical privacy-preserving high-order bi-lanczos in integrated edge-fog-cloud architecture for cyber-physical-social systems. ACM Transactions on Internet Technology 19, 2 (2019), 26.
[17]
Jun Feng, Laurence T. Yang, Ronghao Zhang, and Benard S. Gavuna. 2020. Privacy preserving tucker train decomposition over blockchain-based encrypted industrial IoT data. IEEE Transactions on Industrial Informatics (2020).
[18]
Jun Feng, Laurence T. Yang, Ronghao Zhang, Weizhong Qiang, and Jinjun Chen. 2020. Privacy preserving high-order bi-lanczos in cloud-fog computing for industrial applications. IEEE Transactions on Industrial Informatics (2020).
[19]
Jun Feng, Laurence T. Yang, Qing Zhu, and Kim-Kwang Raymond Choo. 2018. Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Transactions on Dependable and Secure Computing (2018).
[20]
Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, and Laurence T. Yang. 2012. Security analysis and improvement of a secure and distributed reprogramming protocol for wireless sensor networks. IEEE Transactions on Industrial Electronics 60, 11 (2012), 5348--5354.
[21]
Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Michele Maasberg, and Kim-Kwang Raymond Choo. 2018. Multimedia big data computing and Internet of Things applications: A taxonomy and process model. Journal of Network and Computer Applications 124 (2018), 169--195.
[22]
Yehuda Lindell and Benny Pinkas. 2000. Privacy preserving data mining. In Annual International Cryptology Conference. Springer, 36--54.
[23]
Yang Liu, Yan Liu, and Keith C. C. Chan. 2010. Tensor distance based multilinear locality-preserved maximum information embedding. IEEE Transactions on Neural Networks 21, 11 (2010), 1848--1854.
[24]
Changqing Luo, Shengyong Guo, Song Guo, Laurence T. Yang, Geyong Min, and Xia Xie. 2014. Green communication in energy renewable wireless mesh networks: Routing, rate control, and power allocation. IEEE Transactions on Parallel and Distributed Systems 25, 12 (2014), 3211--3220.
[25]
Frank McSherry and Ratul Mahajan. 2011. Differentially-private network trace analysis. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 123--134.
[26]
Alexander Novikov, Dmitrii Podoprikhin, Anton Osokin, and Dmitry P. Vetrov. 2015. Tensorizing neural networks. In Advances in Neural Information Processing Systems. 442--450.
[27]
Eric K. Patterson, Sabri Gurbuz, Zekeriya Tufekci, and John N. Gowdy. 2002. CUAVE: A new audio-visual database for multimodal human-computer interface research. In 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 2. IEEE, II--2017.
[28]
NhatHai Phan, Yue Wang, Xintao Wu, and Dejing Dou. 2016. Differential privacy preservation for deep auto-encoders: An application of human behavior prediction. In Thirtieth AAAI Conference on Artificial Intelligence.
[29]
Shalli Rani, Syed Hassan Ahmed, Rajneesh Talwar, Jyoteesh Malhotra, and Houbing Song. 2017. IoMT: A reliable cross layer protocol for internet of multimedia things. IEEE Internet of Things Journal 4, 3 (2017), 832--839.
[30]
Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). ACM, New York, NY, USA, 1310--1321.
[31]
Jun Zhang, Zhenjie Zhang, Xiaokui Xiao, Yin Yang, and Marianne Winslett. 2012. Functional mechanism: Regression analysis under differential privacy. Proceedings of the VLDB Endowment 5, 11 (2012), 1364--1375.
[32]
Qingchen Zhang, Man Lin, Laurence T. Yang, Zhikui Chen, and Peng Li. 2017. Energy-efficient scheduling for real-time systems based on deep Q-learning model. IEEE Transactions on Sustainable Computing 4, 1 (2017), 132--141.
[33]
Qingchen Zhang, Laurence T. Yang, Zhikui Chen, and Peng Li. 2018. A tensor-train deep computation model for industry informatics big data feature learning. IEEE Transactions on Industrial Informatics 14, 7 (2018), 3197--3204.

Cited By

View all
  • (2024)Exploring Hardware Fault Impacts on Different Real Number Representations of the Structural Resilience of TCUs in GPUsElectronics10.3390/electronics1303057813:3(578)Online publication date: 31-Jan-2024
  • (2024)Sparse Bayesian Tensor Completion for Data Recovery in Intelligent IoT SystemsIEEE Internet of Things Journal10.1109/JIOT.2024.337820211:15(25682-25693)Online publication date: 1-Aug-2024
  • (2024)Multimodal High-Order Relationship Inference Network for Fashion Compatibility Modeling in Internet of Multimedia ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.328560111:1(353-365)Online publication date: 1-Jan-2024
  • Show More Cited By

Index Terms

  1. Differentially Private Tensor Train Deep Computation for Internet of Multimedia Things

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 16, Issue 3s
      Special Issue on Privacy and Security in Evolving Internet of Multimedia Things and Regular Papers
      October 2020
      190 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3444536
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 December 2020
      Accepted: 01 August 2020
      Revised: 01 August 2020
      Received: 01 April 2019
      Published in TOMM Volume 16, Issue 3s

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. ɛ-differential privacy
      2. IoMT
      3. Tensor train auto-encoder
      4. cyber-physical-social systems
      5. deep computation
      6. deep learning
      7. privacy

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)21
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Exploring Hardware Fault Impacts on Different Real Number Representations of the Structural Resilience of TCUs in GPUsElectronics10.3390/electronics1303057813:3(578)Online publication date: 31-Jan-2024
      • (2024)Sparse Bayesian Tensor Completion for Data Recovery in Intelligent IoT SystemsIEEE Internet of Things Journal10.1109/JIOT.2024.337820211:15(25682-25693)Online publication date: 1-Aug-2024
      • (2024)Multimodal High-Order Relationship Inference Network for Fashion Compatibility Modeling in Internet of Multimedia ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.328560111:1(353-365)Online publication date: 1-Jan-2024
      • (2022)Efficient and scalable patients clustering based on medical big data in cloud platformJournal of Cloud Computing10.1186/s13677-022-00324-311:1Online publication date: 24-Sep-2022
      • (2022)Effective College English Teaching Based on Teacher-student Interactive ModelACM Transactions on Asian and Low-Resource Language Information Processing10.1145/348667622:3(1-17)Online publication date: 24-Mar-2022
      • (2022)Online shopping behavior analysis for smart business using big data analytics and blockchain securityInternational Journal of Modeling, Simulation, and Scientific Computing10.1142/S179396232250053213:04Online publication date: 28-Mar-2022
      • (2022)A Text Classification Algorithm for Power Equipment Defects Based on Random ForestInternational Journal of Reliability, Quality and Safety Engineering10.1142/S021853932240001029:05Online publication date: 17-Jun-2022
      • (2022)Multimedia Teaching for Applied Linguistic Smart Education SystemInternational Journal of Human–Computer Interaction10.1080/10447318.2022.212211139:1(272-281)Online publication date: 15-Sep-2022
      • (2022)A new hybrid encryption in fog–cloud environment for secure medical data-sharingIran Journal of Computer Science10.1007/s42044-022-00129-2Online publication date: 19-Dec-2022
      • (2022)A fuzzy rule based machine intelligence model for cherry red spot disease detection of human eyes in IoMTWireless Networks10.1007/s11276-022-03122-6Online publication date: 10-Sep-2022
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media