Abstract
Smart environments, also referred to as cyber-physical-social systems (CPSSs), are expected to significantly benefit from the integration of edge, fog, and cloud for intelligence service flexibility, efficiency, and cost saving. High-order Bi-Lanczos method has emerged as a powerful tool serving as multi-dimensional data processing, such as prevailing feature extraction, classification, and clustering of high-order data, in CPSSs. However, integrated edge-fog-cloud architecture is open and users have very limited control; how to carry out big data processing without compromising the security and privacy is a challenging issue in edge-fog-cloud-assisted smart applications. In this work, we propose a novel and practical privacy-preserving high-order Bi-Lanczos scheme in integrated edge-fog-cloud architectural paradigm for smart environments. More precisely, we first propose a privacy-preserving big data processing model using the synergy of edge, fog, and cloud. The proposed model enables edge, fog, and cloud to cooperatively complete big data processing without compromising users’ privacy for large-scale tensor data in CPSSs. Subsequently, making use of the model, we present a privacy-preserving high-order Bi-Lanczos scheme. Finally, we theoretically and empirically analyze the security and efficiency of the proposed privacy-preserving high-order Bi-Lanczos scheme based on an intelligent surveillance system case study. And the results demonstrate that the proposed scheme provides a privacy-preserving and efficient way of computations in integrated edge-fog-cloud paradigm for smart environments.
- Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, and Atif Alamri. 2017. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5 (2017), 22313--22328.Google ScholarCross Ref
- Vicente Hern Andez, José E. Rom An, and Andr És Tom As. 2008. A robust and efficient parallel SVD solver based on restarted Lanczos bidiagonalization. Electron. Trans. Numer. Anal. 31 (2008), 68--85.Google Scholar
- Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine learning classification over encrypted data. In Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS’15).Google ScholarCross Ref
- Ronald Cramer, Ivan Bjerre Damgård, and Jesper Buus Nielsen. 2015. Secure Multiparty Computation and Secret Sharing. Cambridge University Press. Google Scholar
- Wenxiu Ding, Zheng Yan, and Robert Deng. 2017. Privacy-preserving data processing with flexible access control. IEEE Trans. Depend. Secure Comput. (2017).Google Scholar
- Miao Du, Kun Wang, Xiulong Liu, Song Guo, and Yan Zhang. 2016. A differential privacy-based query model for sustainable fog data centers. IEEE Trans. Sustain. Comput. (2016).Google Scholar
- Jun Feng, Laurence T. Yang, and Ronghao Zhang. 2018. Tensor-based big biometric data reduction in cloud. IEEE Cloud Comput. 5, 4 (2018), 38--46.Google ScholarCross Ref
- Jun Feng, Laurence T. Yang, Qing Zhu, and Kim-Kwang Raymond Choo. 2018. Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Trans. Depend. Secure Comput.Google ScholarDigital Library
- Massimo Ficco, Christian Esposito, Xiang Yang, and Francesco Palmieri. 2017. Pseudo-dynamic testing of realistic edge-fog cloud ecosystems. IEEE Commun. Mag. 55, 11 (2017), 98--104.Google ScholarCross Ref
- Pengfei Hu, Huansheng Ning, Tie Qiu, Houbing Song, Yanna Wang, and Xuanxia Yao. 2017. Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J. 4, 5 (2017), 1143--1155.Google ScholarCross Ref
- Pengfei Hu, Huansheng Ning, Tie Qiu, Yanfei Zhang, and Xiong Luo. 2017. Fog computing-based face identification and resolution scheme in internet of things. IEEE Trans. Industr. Info. 13, 4 (2017), 1910--1920.Google ScholarCross Ref
- Rong Jiang, Rongxing Lu, and Kim-Kwang Raymond Choo. 2018. Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Gen. Comput. Syst. 78 (2018), 392--401. Google ScholarDigital Library
- Jiawen Kang, Rong Yu, Xumin Huang, and Yan Zhang. 2018. Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transport. Syst. 19, 8 (2018), 2627--2637.Google ScholarCross Ref
- Dongyoung Koo and Junbeom Hur. 2018. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gen. Comput. Syst. 78 (2018), 739--752.Google ScholarCross Ref
- Chen Li, Rongxing Lu, Hui Li, Le Chen, and Jie Chen. 2015. PDA: A privacy-preserving dual-functional aggregation scheme for smart grid communications. Secur. Commun. Netw. 8, 15 (2015), 2494--2506. Google ScholarDigital Library
- Hong Liu, Huansheng Ning, Yan Zhang, Qingxu Xiong, and Laurence T. Yang. 2017. Role-dependent privacy preservation for secure V2G networks in the smart grid. IEEE Trans. Info. Forens. Secur. 9, 2 (2017), 208--220. Google ScholarDigital Library
- Hong Liu, Huansheng Ning, Yan Zhang, and Laurence T. Yang. 2012. Aggregated-proofs-based privacy-preserving authentication for V2G networks in the smart grid. IEEE Trans. Smart Grid 3, 4 (2012), 1722--1733.Google ScholarCross Ref
- Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Amine Ferrag, Nikumani Choudhury, and Vikas Kumar. 2017. Security and privacy in fog computing: Challenges. IEEE Access 5 (2017), 19293--19304.Google ScholarCross Ref
- Arslan Munir, Prasanna Kansakar, and Samee U. Khan. 2017. IFCIoT: Integrated fog cloud IoT: A novel architectural paradigm for the future internet of things. IEEE Consum. Electron. Mag. 6, 3 (2017), 74--82.Google ScholarCross Ref
- Vijay K Naik, Chuang Liu, Lingyun Yang, and Jonathan Wagner. 2005. Online resource matching for heterogeneous grid environments. In Proceedings of the Annual IEEE/ACM International Symposium in Cluster, Cloud, and Grid Computing (CCGrid’05). IEEE, 607--614. Google ScholarDigital Library
- Huansheng Ning, Hong Liu, Jianhua Ma, Laurence T. Yang, and Runhe Huang. 2015. Cybermatics: Cyber-physical-social-thinking hyperspace-based science and technology. Future Gen. Comput. Syst. 56 (2015), 504--522. Google ScholarDigital Library
- Opeyemi Osanaiye, Shuo Chen, Zheng Yan, Rongxing Lu, Kim-Kwang Raymond Choo, and Mqhele Dlodlo. 2017. From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access 5 (2017), 8284--8300.Google ScholarCross Ref
- Evangelos E. Papalexakis, Christos Faloutsos, and Nicholas D. Sidiropoulos. 2016. Tensors for data mining and data fusion: Models, applications, and scalable algorithms. ACM Trans. Intell. Syst. Technol. 8, 2 (2016), 16. Google ScholarDigital Library
- Namyong Park, Sejoon Oh, and U. Kang. 2017. Fast and scalable distributed boolean tensor factorization. In Proceedings of the IEEE 33rd International Conference on Data Engineering (ICDE’17). 1071--1082.Google Scholar
- P. Jonathon Phillips, Sudeep Sarkar, Isidro Robledo, Patrick Grother, and Kevin Bowyer. 2002. The gait identification challenge problem: Data sets and baseline algorithm. In Proceedings of the IEEE 16th International Conference on Pattern Recognition (ICPR’02). 385--388. Google ScholarDigital Library
- Bharath K. Samanthula, Yousef Elmehdwi, and Wei Jiang. 2015. K-nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27, 5 (2015), 1261--1273.Google ScholarDigital Library
- Huaqun Wang, Zhiwei Wang, and Josep Domingo-Ferrer. 2018. Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gen. Comput. Syst. 78 (2018), 712--719. Google ScholarDigital Library
- Tian Wang, Jiandian Zeng, Md Zakirul Alam Bhuiyan, Hui Tian, Yiqiao Cai, Yonghong Chen, and Bineng Zhong. 2017. Trajectory privacy preservation based on a fog structure in cloud location services. IEEE Access 5 (2017), 7692--7701.Google ScholarCross Ref
- Xiaokang Wang, Wei Wang, Laurence T. Yang, Siwei Liao, Dexiang Yin, and M. Jamal Deen. 2018. A distributed HOSVD method with its incremental computation for big data in cyber-physical-social systems. IEEE Trans. Comput. Soc. Syst. 5, 2 (2018), 481--492.Google ScholarCross Ref
- Zheng Yan, Mingjun Wang, Yuxiang Li, and Athanasios V. Vasilakos. 2016. Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput. 3, 2 (2016), 28--35.Google ScholarCross Ref
- Daqiang Zhang, Laurence T. Yang, Min Chen, Shengjie Zhao, Minyi Guo, and Yin Zhang. 2017. Real-time locating systems using active RFID for internet of things. IEEE Syst. J. 10, 3 (2017), 1226--1235.Google ScholarCross Ref
- Qingchen Zhang, Laurence T. Yang, Xingang Liu, Zhikui Chen, and Peng Li. 2017. A Tucker deep computation model for mobile multimedia feature learning. ACM Trans. Multimedia Comput., Commun., Appl. 13, 3s (2017), 39. Google ScholarDigital Library
- Rui Zhang, Rui Xue, Ting Yu, and Ling Liu. 2016. Dynamic and efficient private keyword search over inverted index-based encrypted data. ACM Trans. Internet Technol. 16, 3 (2016), 21. Google ScholarDigital Library
- Yuexin Zhang, Yang Xiang, and Xinyi Huang. 2016. Password-authenticated group key exchange: A cross-layer design. ACM Trans. Internet Technol. 16, 4 (2016), 24. Google ScholarDigital Library
Index Terms
- Practical Privacy-preserving High-order Bi-Lanczos in Integrated Edge-Fog-Cloud Architecture for Cyber-Physical-Social Systems
Recommendations
Privacy-preserving big data analytics for cyber-physical systems
AbstractCyber-physical systems (CPS) generate big data collected from combining physical and digital entities, but the challenge of CPS privacy-preservation demands further research to protect CPS sensitive information from unauthorized access. Data ...
Privacy-Preserving Layer over MapReduce on Cloud
CGC '12: Proceedings of the 2012 Second International Conference on Cloud and Green ComputingCloud computing provides powerful and economical infrastructural resources for cloud users to handle everincreasing Big Data with data-processing frameworks such as MapReduce. Based on cloud computing, the MapReduce framework has been widely adopted to ...
An effective value swapping method for privacy preserving data publishing
Privacy is an important concern in the society, and it has been a fundamental issue when to analyze and publish data involving human individual's sensitive information. Recently, the slicing method has been popularly used for privacy preservation in ...
Comments