4.7 Article

Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks

期刊

IEEE WIRELESS COMMUNICATIONS LETTERS
卷 9, 期 10, 页码 1633-1637

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/LWC.2020.2999524

关键词

Privacy; Resource management; Differential privacy; Quality of service; Navigation; Sensitivity; Personalized differential privacy; privacy budget allocation; the optimal route; quality of service

资金

  1. National Key Research and Development Project of China [2018YFB1800301, 2018YFB1800304]

向作者/读者索取更多资源

With the development of vehicular network, location-based services (LBSs) provide increasing diversified services for drivers and passengers. When users enjoy the services, users' location needs to be constantly updated to service providers, which causes the location information to be speculated and attacked by attackers. However, existing schemes don't provide differentiated protection for users' different locations, which may lead to the leakage of location information. Therefore, we propose a location privacy protection method to satisfy users' personalized privacy needs with reasonable protection of their privacy. Firstly, we define a normalized decision matrix to describe the efficiency and privacy effects of a route, and establish a multi-attribute utility function to quantify the utility of different routes for route selection. Then, according to users' personalized privacy protection need, we allocate the privacy budget for each query location on the selected route based on the distance between it and his nearest sensitive location. Experimental results demonstrate that compared to existing methods, our scheme can meet the user's service requirements and achieve better service quality under the conditions of reasonable protection of their privacy.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Personalized Individual Semantics Learning to Support a Large-Scale Linguistic Consensus Process

Yucheng Dong, Qin Ran, Xiangrui Chao, Congcong Li, Shui Yu

Summary: In this article, we propose a continual personalized individual semantics learning model to support consensus-reaching in large-scale linguistic group decision making. The model derives personalized numerical scales from linguistic preference data, performs clustering ensemble method for group division and consensus management, and demonstrates its effectiveness through a case study on intelligent route optimization.

ACM TRANSACTIONS ON INTERNET TECHNOLOGY (2023)

Article Computer Science, Theory & Methods

A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning

Zhiyi Tian, Lei Cui, Jie Liang, Shui Yu

Summary: The prosperity of machine learning has led to an increase in attacks on the training process, with poisoning attacks emerging as a significant threat. Defending against these attacks is challenging, and a systematic review from a unified perspective is lacking. This survey provides a comprehensive overview of poisoning attacks and countermeasures in both centralized and federated learning, categorizing attack methods based on goals and analyzing their differences and connections. Countermeasures in different learning frameworks are presented, along with a discussion of the feasibility of poisoning attacks and potential research directions.

ACM COMPUTING SURVEYS (2023)

Article Automation & Control Systems

Boosting Accuracy of Differentially Private Federated Learning in Industrial IoT With Sparse Responses

Laizhong Cui, Jiating Ma, Yipeng Zhou, Shui Yu

Summary: This study proposes a novel differentially private federated learning algorithm with sparse responses (DPFL-SR), which reduces the privacy budget consumption in each global iteration by applying the sparse vector technique. Experimental results demonstrate that DPFL-SR achieves higher model accuracy and privacy protection level in IIoT systems.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Theory & Methods

LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing

Zhuangzhuang Zhang, Libing Wu, Chuanguo Ma, Jianxin Li, Jing Wang, Qian Wang, Shui Yu

Summary: Nowadays, edge computing service providers aim to enhance their models by utilizing the computational power and data of edge nodes without data transmission. The existing privacy-preserving federated learning faces challenges due to the complexity of cryptographic algorithms, the lack of Byzantine robustness while maintaining data privacy, and the limited computing power of edge nodes. To address these issues, a lightweight and secure federated learning scheme LSFL is proposed, which combines privacy preservation and Byzantine robustness. The scheme employs a Lightweight Two-Server Secure Aggregation protocol to ensure secure model aggregation and protect data privacy from Byzantine nodes.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Engineering, Electrical & Electronic

PASTO: Enabling Secure and Efficient Task Offloading in TrustZone-Enabled Edge Clouds

Yuepeng Li, Deze Zeng, Lin Gu, Andong Zhu, Quan Chen, Shui Yu

Summary: This article addresses the security issues of offloading tasks to edge servers and proposes a Priority-aware Secure Task Offloading (PASTO) algorithm based on TrustZone. Experimental results show that PASTO effectively reduces the total task completion time compared to other approaches.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

Efficient Federated DRL-Based Cooperative Caching for Mobile Edge Networks

Aleteng Tian, Bohao Feng, Huachun Zhou, Yunxue Huang, Keshav Sood, Shui Yu, Hongke Zhang

Summary: In this paper, an efficient cooperative caching (FDDL) framework is proposed to address key issues in mobile edge networks. Machine learning techniques are used to improve content placement and reduce computation complexity and communication costs. The framework includes a cache admission algorithm, a lightweight eviction algorithm for fine-grained replacements, and a federated learning-based parameter sharing mechanism. Experimental results show that the proposed FDDL achieves higher cache hit ratio and traffic offloading rate, and effectively reduces communication costs and training time.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Computer Science, Information Systems

Enhancing Trajectory Recovery From Gradients via Mobility Prior Knowledge

Kaiyue Zhang, Zipei Fan, Xuan Song, Shui Yu

Summary: This article proposes a DLGMP algorithm based on deep leakage from gradients and mobility prior knowledge to solve the problem of trajectory data attacks. The algorithm utilizes spatiotemporal structural information as prior mobility knowledge, greatly reducing the difficulty of recovery, and improves the accuracy and reasonableness of trajectory recovery by adding an easily extensible regularization term and an adversarial loss of Wasserstein GAN.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Efficient Federated Learning for AIoT Applications Using Knowledge Distillation

Tian Liu, Jun Xia, Zhiwei Ling, Xin Fu, Shui Yu, Mingsong Chen

Summary: This article presents a distillation-based federated learning (DFL) method that efficiently and accurately handles federated learning for AIoT applications by using knowledge distillation and local model gradients for aggregation and dispatching.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Toward Large-Scale Graph-Based Traffic Forecasting: A Data-Driven Network Partitioning Approach

Chenhan Zhang, Shuyu Zhang, Xiexin Zou, Shui Yu, James J. Q. Yu

Summary: This article proposes a network partitioning approach to improve the performance of graph convolutional network-based predictors on large-scale transportation networks. The approach uses both topological features and traffic speed observations for partitioning, and employs a data-parallel training strategy for parallel training. Case studies on real-world datasets show that the proposed approach can improve the accuracy and training efficiency of the predictors.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Artificial Intelligence

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

Shigen Shen, Xiaoping Wu, Panjun Sun, Haiping Zhou, Zongda Wu, Shui Yu

Summary: This study proposes a signaling game approach for privacy preservation in edge-computing-based IoT networks. It addresses the issue of malicious IoT nodes requesting private data from an IoT cloud storage system across edge nodes. The optimal privacy preservation strategies for edge nodes are derived and a signaling Q-learning algorithm is designed to achieve convergent equilibrium and game parameters. Simulation results show that the proposed algorithm effectively decreases the optimal probability of malicious requests, enhancing privacy preservation in edge-computing-based IoT cloud storage systems.

EXPERT SYSTEMS WITH APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

The SRVM: A Similarity-Based Relevance Vector Machine for Remaining Useful Lifetime Prediction in the Industrial Internet of Things

Guorui Li, Yajun Wu, Cong Wang, Sancheng Peng, Jianwei Niu, Shui Yu

Summary: In this article, a similarity-based relevance vector machine (SRVM) is proposed to address the challenges of insufficient failure data and low confidence in remaining useful lifetime (RUL) prediction results. The relationship among latent variables is learned adaptively through similarity computations to fully utilize the limited degradation data, and the internal variables in SRVM are treated as time-varying variables and re-estimated dynamically to provide reliable confidence for RUL prediction. Experimental results demonstrate that SRVM achieves higher prediction accuracy compared to other baseline methods.

IEEE INTELLIGENT SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

Disjoint Paths Construction and Fault-Tolerant Routing in BCube of Data Center Networks

Weibei Fan, Fu Xiao, Hui Cai, Xiaobai Chen, Shui Yu

Summary: This paper studies fault-tolerant routings in BCube data center network. A fault-tolerant routing algorithm based on node disjoint multi-paths is proposed, which has stronger fault tolerance. An effective fault-tolerant routing algorithm based on routing capabilities for BCube is investigated, which has higher fault tolerance and success rate. An adaptive path finding algorithm is presented to establish virtual links in BCube, which can shorten the diameter. Extensive simulations show that the proposed routing scheme outperforms existing algorithms, achieving significant improvements in throughput, packet arrival rate, and latency.

IEEE TRANSACTIONS ON COMPUTERS (2023)

Article Engineering, Electrical & Electronic

NFLCS: An Service Function Chain Path Optimization Strategy Based on Network-Functional Layout Clustering

Youxiang Duan, Yuxi Lu, Shigen Shen, Shui Yu, Peiying Zhang, Wei Zhang, Kostromitin Konstantin Igorevich

Summary: This paper proposes an SFC path optimization strategy based on the clustering of network functional layouts. By designing a topological network identification algorithm and a multi-headed attention mechanism, different types of SFC layouts can be optimized in a targeted manner. The experimental results demonstrate the effectiveness of this strategy in optimizing SFC paths and its ability to optimize service function chain paths in future complex network situations.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Telecommunications

VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems

Jiale Zhang, Yue Liu, Di Wu, Shuai Lou, Bing Chen, Shui Yu

Summary: This article introduces the importance of federated learning for edge computing and the challenges of privacy protection. To address the shortcomings of traditional privacy-preserving federated learning schemes, a verifiable privacy-preserving federated learning scheme is proposed. It combines the Distributed Selective Stochastic Gradient Descent (DSSGD) method with the Paillier homomorphic cryptosystem to achieve distributed encryption functionality and presents an online/offline signature method for lightweight gradient integrity verification.

DIGITAL COMMUNICATIONS AND NETWORKS (2023)

Article Computer Science, Theory & Methods

Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things

Shigen Shen, Lanlan Xie, Yanchun Zhang, Guowen Wu, Hong Zhang, Shui Yu

Summary: This paper proposes a two-layer malware spread-patch model based on IIoT and designs a new algorithm suitable for suppressing the spread of malware. The effectiveness of the model and algorithm is verified through in-depth analysis and numerous comparative experiments.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

暂无数据