skip to main content
research-article

Practical Privacy-preserving High-order Bi-Lanczos in Integrated Edge-Fog-Cloud Architecture for Cyber-Physical-Social Systems

Authors Info & Claims
Published:28 March 2019Publication History
Skip Abstract Section

Abstract

Smart environments, also referred to as cyber-physical-social systems (CPSSs), are expected to significantly benefit from the integration of edge, fog, and cloud for intelligence service flexibility, efficiency, and cost saving. High-order Bi-Lanczos method has emerged as a powerful tool serving as multi-dimensional data processing, such as prevailing feature extraction, classification, and clustering of high-order data, in CPSSs. However, integrated edge-fog-cloud architecture is open and users have very limited control; how to carry out big data processing without compromising the security and privacy is a challenging issue in edge-fog-cloud-assisted smart applications. In this work, we propose a novel and practical privacy-preserving high-order Bi-Lanczos scheme in integrated edge-fog-cloud architectural paradigm for smart environments. More precisely, we first propose a privacy-preserving big data processing model using the synergy of edge, fog, and cloud. The proposed model enables edge, fog, and cloud to cooperatively complete big data processing without compromising users’ privacy for large-scale tensor data in CPSSs. Subsequently, making use of the model, we present a privacy-preserving high-order Bi-Lanczos scheme. Finally, we theoretically and empirically analyze the security and efficiency of the proposed privacy-preserving high-order Bi-Lanczos scheme based on an intelligent surveillance system case study. And the results demonstrate that the proposed scheme provides a privacy-preserving and efficient way of computations in integrated edge-fog-cloud paradigm for smart environments.

References

  1. Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, and Atif Alamri. 2017. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5 (2017), 22313--22328.Google ScholarGoogle ScholarCross RefCross Ref
  2. Vicente Hern Andez, José E. Rom An, and Andr És Tom As. 2008. A robust and efficient parallel SVD solver based on restarted Lanczos bidiagonalization. Electron. Trans. Numer. Anal. 31 (2008), 68--85.Google ScholarGoogle Scholar
  3. Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine learning classification over encrypted data. In Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS’15).Google ScholarGoogle ScholarCross RefCross Ref
  4. Ronald Cramer, Ivan Bjerre Damgård, and Jesper Buus Nielsen. 2015. Secure Multiparty Computation and Secret Sharing. Cambridge University Press. Google ScholarGoogle Scholar
  5. Wenxiu Ding, Zheng Yan, and Robert Deng. 2017. Privacy-preserving data processing with flexible access control. IEEE Trans. Depend. Secure Comput. (2017).Google ScholarGoogle Scholar
  6. Miao Du, Kun Wang, Xiulong Liu, Song Guo, and Yan Zhang. 2016. A differential privacy-based query model for sustainable fog data centers. IEEE Trans. Sustain. Comput. (2016).Google ScholarGoogle Scholar
  7. Jun Feng, Laurence T. Yang, and Ronghao Zhang. 2018. Tensor-based big biometric data reduction in cloud. IEEE Cloud Comput. 5, 4 (2018), 38--46.Google ScholarGoogle ScholarCross RefCross Ref
  8. Jun Feng, Laurence T. Yang, Qing Zhu, and Kim-Kwang Raymond Choo. 2018. Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment. IEEE Trans. Depend. Secure Comput.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Massimo Ficco, Christian Esposito, Xiang Yang, and Francesco Palmieri. 2017. Pseudo-dynamic testing of realistic edge-fog cloud ecosystems. IEEE Commun. Mag. 55, 11 (2017), 98--104.Google ScholarGoogle ScholarCross RefCross Ref
  10. Pengfei Hu, Huansheng Ning, Tie Qiu, Houbing Song, Yanna Wang, and Xuanxia Yao. 2017. Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things. IEEE Internet Things J. 4, 5 (2017), 1143--1155.Google ScholarGoogle ScholarCross RefCross Ref
  11. Pengfei Hu, Huansheng Ning, Tie Qiu, Yanfei Zhang, and Xiong Luo. 2017. Fog computing-based face identification and resolution scheme in internet of things. IEEE Trans. Industr. Info. 13, 4 (2017), 1910--1920.Google ScholarGoogle ScholarCross RefCross Ref
  12. Rong Jiang, Rongxing Lu, and Kim-Kwang Raymond Choo. 2018. Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Gen. Comput. Syst. 78 (2018), 392--401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jiawen Kang, Rong Yu, Xumin Huang, and Yan Zhang. 2018. Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transport. Syst. 19, 8 (2018), 2627--2637.Google ScholarGoogle ScholarCross RefCross Ref
  14. Dongyoung Koo and Junbeom Hur. 2018. Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing. Future Gen. Comput. Syst. 78 (2018), 739--752.Google ScholarGoogle ScholarCross RefCross Ref
  15. Chen Li, Rongxing Lu, Hui Li, Le Chen, and Jie Chen. 2015. PDA: A privacy-preserving dual-functional aggregation scheme for smart grid communications. Secur. Commun. Netw. 8, 15 (2015), 2494--2506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hong Liu, Huansheng Ning, Yan Zhang, Qingxu Xiong, and Laurence T. Yang. 2017. Role-dependent privacy preservation for secure V2G networks in the smart grid. IEEE Trans. Info. Forens. Secur. 9, 2 (2017), 208--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Hong Liu, Huansheng Ning, Yan Zhang, and Laurence T. Yang. 2012. Aggregated-proofs-based privacy-preserving authentication for V2G networks in the smart grid. IEEE Trans. Smart Grid 3, 4 (2012), 1722--1733.Google ScholarGoogle ScholarCross RefCross Ref
  18. Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Amine Ferrag, Nikumani Choudhury, and Vikas Kumar. 2017. Security and privacy in fog computing: Challenges. IEEE Access 5 (2017), 19293--19304.Google ScholarGoogle ScholarCross RefCross Ref
  19. Arslan Munir, Prasanna Kansakar, and Samee U. Khan. 2017. IFCIoT: Integrated fog cloud IoT: A novel architectural paradigm for the future internet of things. IEEE Consum. Electron. Mag. 6, 3 (2017), 74--82.Google ScholarGoogle ScholarCross RefCross Ref
  20. Vijay K Naik, Chuang Liu, Lingyun Yang, and Jonathan Wagner. 2005. Online resource matching for heterogeneous grid environments. In Proceedings of the Annual IEEE/ACM International Symposium in Cluster, Cloud, and Grid Computing (CCGrid’05). IEEE, 607--614. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Huansheng Ning, Hong Liu, Jianhua Ma, Laurence T. Yang, and Runhe Huang. 2015. Cybermatics: Cyber-physical-social-thinking hyperspace-based science and technology. Future Gen. Comput. Syst. 56 (2015), 504--522. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Opeyemi Osanaiye, Shuo Chen, Zheng Yan, Rongxing Lu, Kim-Kwang Raymond Choo, and Mqhele Dlodlo. 2017. From cloud to fog computing: A review and a conceptual live VM migration framework. IEEE Access 5 (2017), 8284--8300.Google ScholarGoogle ScholarCross RefCross Ref
  23. Evangelos E. Papalexakis, Christos Faloutsos, and Nicholas D. Sidiropoulos. 2016. Tensors for data mining and data fusion: Models, applications, and scalable algorithms. ACM Trans. Intell. Syst. Technol. 8, 2 (2016), 16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Namyong Park, Sejoon Oh, and U. Kang. 2017. Fast and scalable distributed boolean tensor factorization. In Proceedings of the IEEE 33rd International Conference on Data Engineering (ICDE’17). 1071--1082.Google ScholarGoogle Scholar
  25. P. Jonathon Phillips, Sudeep Sarkar, Isidro Robledo, Patrick Grother, and Kevin Bowyer. 2002. The gait identification challenge problem: Data sets and baseline algorithm. In Proceedings of the IEEE 16th International Conference on Pattern Recognition (ICPR’02). 385--388. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Bharath K. Samanthula, Yousef Elmehdwi, and Wei Jiang. 2015. K-nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27, 5 (2015), 1261--1273.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Huaqun Wang, Zhiwei Wang, and Josep Domingo-Ferrer. 2018. Anonymous and secure aggregation scheme in fog-based public cloud computing. Future Gen. Comput. Syst. 78 (2018), 712--719. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Tian Wang, Jiandian Zeng, Md Zakirul Alam Bhuiyan, Hui Tian, Yiqiao Cai, Yonghong Chen, and Bineng Zhong. 2017. Trajectory privacy preservation based on a fog structure in cloud location services. IEEE Access 5 (2017), 7692--7701.Google ScholarGoogle ScholarCross RefCross Ref
  29. Xiaokang Wang, Wei Wang, Laurence T. Yang, Siwei Liao, Dexiang Yin, and M. Jamal Deen. 2018. A distributed HOSVD method with its incremental computation for big data in cyber-physical-social systems. IEEE Trans. Comput. Soc. Syst. 5, 2 (2018), 481--492.Google ScholarGoogle ScholarCross RefCross Ref
  30. Zheng Yan, Mingjun Wang, Yuxiang Li, and Athanasios V. Vasilakos. 2016. Encrypted data management with deduplication in cloud computing. IEEE Cloud Comput. 3, 2 (2016), 28--35.Google ScholarGoogle ScholarCross RefCross Ref
  31. Daqiang Zhang, Laurence T. Yang, Min Chen, Shengjie Zhao, Minyi Guo, and Yin Zhang. 2017. Real-time locating systems using active RFID for internet of things. IEEE Syst. J. 10, 3 (2017), 1226--1235.Google ScholarGoogle ScholarCross RefCross Ref
  32. Qingchen Zhang, Laurence T. Yang, Xingang Liu, Zhikui Chen, and Peng Li. 2017. A Tucker deep computation model for mobile multimedia feature learning. ACM Trans. Multimedia Comput., Commun., Appl. 13, 3s (2017), 39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Rui Zhang, Rui Xue, Ting Yu, and Ling Liu. 2016. Dynamic and efficient private keyword search over inverted index-based encrypted data. ACM Trans. Internet Technol. 16, 3 (2016), 21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Yuexin Zhang, Yang Xiang, and Xinyi Huang. 2016. Password-authenticated group key exchange: A cross-layer design. ACM Trans. Internet Technol. 16, 4 (2016), 24. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Practical Privacy-preserving High-order Bi-Lanczos in Integrated Edge-Fog-Cloud Architecture for Cyber-Physical-Social Systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Internet Technology
            ACM Transactions on Internet Technology  Volume 19, Issue 2
            Special Issue on Fog, Edge, and Cloud Integration
            May 2019
            288 pages
            ISSN:1533-5399
            EISSN:1557-6051
            DOI:10.1145/3322882
            • Editor:
            • Ling Liu
            Issue’s Table of Contents

            Copyright © 2019 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 28 March 2019
            • Accepted: 1 May 2018
            • Revised: 1 April 2018
            • Received: 1 December 2017
            Published in toit Volume 19, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format