4.3 Article

A New Edge Perturbation Mechanism for Privacy-Preserving Data Collection in IOT

Journal

CHINESE JOURNAL OF ELECTRONICS
Volume 32, Issue 3, Pages 603-612

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.23919/cje.2021.00.411

Keywords

Internet of things; Edge perturbation; Data privacy; Sensitive attribute; Statistical query

Ask authors/readers for more resources

An increasing amount of data containing users' sensitive information is being collected by smart connected devices in the IoT era, posing privacy concerns. Existing perturbation methods are ineffective for small data sets. To address this issue, we propose a new edge perturbation mechanism based on global sensitivity concept to protect sensitive information in IoT data collection. By utilizing edge servers and a global noise generation algorithm, the proposed mechanism achieves better data utility and minimizes disclosure risk.
A growing amount of data containing the sensitive information of users is being collected by emerging smart connected devices to the center server in Internet of things (IoT) era, which raises serious privacy concerns for millions of users. However, existing perturbation methods are not effective because of increased disclosure risk and reduced data utility, especially for small data sets. To overcome this issue, we propose a new edge perturbation mechanism based on the concept of global sensitivity to protect the sensitive information in IoT data collection. The edge server is used to mask users' sensitive data, which can not only avoid the data leakage caused by centralized perturbation, but also achieve better data utility than local perturbation. In addition, we present a global noise generation algorithm based on edge perturbation. Each edge server utilizes the global noise generated by the center server to perturb users' sensitive data. It can minimize the disclosure risk while ensuring that the results of commonly performed statistical analyses are identical and equal for both the raw and the perturbed data. Finally, theoretical and experimental evaluations indicate that the proposed mechanism is private and accurate for small data sets.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available