Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Key Technologies of Data Security and Privacy Protection in the Internetof- Things Group Intelligence Perception

Author(s): Hao Wu, Jyoti Bhola*, Rahul Neware and Sathyapriya Eswaran

Volume 16, Issue 2, 2023

Published on: 20 October, 2022

Page: [135 - 142] Pages: 8

DOI: 10.2174/2352096515666220926112723

Price: $65

Abstract

Aim: To study the key technology of privacy protection and data security in the Internet of Things group intelligence perception, a cryptographic-based technology was proposed.

Background: First, the background of group intelligence perception and three existing problems were briefly introduced, and the inherent contradictions among the three problems, which led to some challenges in this study, were reported.

Objective: A network model, a security model, and design goals were constructed, and a solution based on cryptography-related technology was proposed.

Methods: The security and cost complexity of the proposed solution was theoretically analysed. The calculation cost of mobile phone measurement verified the practical feasibility of the scheme.

Results: When ɛ was considerably small, both false positive (FP) and false negative (FN) were small (close to 0). With an increase in ɛ, the FP rate increased, and the FN rate became 0. When ɛ = 0.5, the FP rate was only 0.1, and the equivalent FN rate was 0 after the user completed 50 tasks. The trust model used was highly accurate.

Conclusion: This study has great significance in promoting safe and reliable application development to ensure the genuineness and trustworthiness of data in the aggregation of intermediate data and back-end data services.

Keywords: Internet of Things, group intelligence perception, cloud computing, privacy protection, data reliability

[1]
X. Lin, J. Lin, Z. Su, and C. Lin, "Research on key technologies of power internet of things based on artificial intelligence technology", IOP Conf. Ser. Earth Environ. Sci., vol. 714, no. 4, p. 42067, 2021.
[http://dx.doi.org/10.1088/1755-1315/714/4/042067]
[2]
B. Li, D. He, and Y. Jiang, "Research on the application of artificial intelligence and computational intelligence in the internet of things", J. Phys. Conf. Ser., vol. 1915, no. 4, p. 42020, 2021.
[http://dx.doi.org/10.1088/1742-6596/1915/4/042020]
[3]
G. Kou, S. Wang, and G. Tang, "Research on key technologies of network security situational awareness for attack tracking prediction", Chin. J. Electron., vol. 28, no. 01, pp. 166-175, 2019.
[http://dx.doi.org/10.1049/cje.2018.10.007]
[4]
M. Wang, Z. Zhang, K. Li, Z. Zhang, Y. Sheng, and S. Liu, "Research on key technologies of fault diagnosis and early warning for high-end equipment based on intelligent manufacturing and internet of things", Int. J. Adv. Manuf. Technol., vol. 107, no. 3, pp. 1039-1048, 2020.
[http://dx.doi.org/10.1007/s00170-019-04289-7]
[5]
Y. Zhang, H. Huang, L.X. Yang, Y. Xiang, and M. Li, "Serious challenges and potential solutions for the industrial internet of things with edge intelligence", IEEE Netw., vol. 33, no. 5, pp. 41-45, 2019.
[http://dx.doi.org/10.1109/MNET.001.1800478]
[6]
L.Q. Song, P. Jiang, Q.M. Wang, and L. Yang, "Research on key technologies for installation and maintenance of reflector of fast", Res. Astron. Astrophys., vol. 20, no. 05, pp. 43-48, 2020.
[7]
J. Wu, Z. Hong, and H. Cai, "Intelligence-oriented industrial internet of things: Architecture, key technologies and challenges", Int. J. Auton. Adapt. Commun. Syst., vol. 14, no. 3, p. 1, 2021.
[http://dx.doi.org/10.1504/IJAACS.2021.10034573]
[8]
M. Yan, H. Huang, and J. Li, "Research on key technologies of industrial internet data security", J. Phys. Conf. Ser..
vol. 1883, no. 1, p. 012087, 2021. [http://dx.doi.org/10.1088/1742-6596/1883/1/012087]
[9]
Y. Yuan, Y. Zhang, and H. Ding, "Research on key technology of industrial artificial intelligence and its application in predictive maintenance", Zidonghua Xuebao/Acta Automatica Sinica. vol. 46, no. 10, pp. 2013-2030, 2020.
[10]
W. Chun, and C. Li, "Research on privacy protection based on block chain in internet of things network", J. Phys. Conf. Ser..
vol. 1883, no. 1, pp. 012063, 2021. [http://dx.doi.org/10.1088/1742-6596/1883/1/012063]
[11]
X. Gao, Q. Li, and F. Liu, "Research on the new normal technology and application of artificial intelligence in the internet of things", J. Phy. Conf. Ser., vol. 1865, no. 4, p. 42062, 2021.
[http://dx.doi.org/10.1088/1742-6596/1865/4/042062]
[12]
M. Moradi, "Importance of Internet of Things (IoT) in marketing research and its ethical and data privacy challenges", Bus. Ethics Lead., vol. 5, no. 1, pp. 22-30, 2021.
[http://dx.doi.org/10.21272/bel.5(1).22-30.2021]
[13]
F.M. Bublitz, A. Oetomo, K.S. Sahu, A. Kuang, L.X. Fadrique, P.E. Velmovitsky, R.M. Nobrega, and P.P. Morita, "Disruptive technologies for environment and health research: An overview of artificial intelligence, blockchain, and internet of things", Int. J. Environ. Res. Public Health, vol. 16, no. 20, p. 3847, 2019.
[http://dx.doi.org/10.3390/ijerph16203847] [PMID: 31614632]
[14]
Y. Qian, D. Wu, W. Bao, and P. Lorenz, "The internet of things for smart cities: Technologies and applications", IEEE Netw., vol. 33, no. 2, pp. 4-5, 2019.
[http://dx.doi.org/10.1109/MNET.2019.8675165]
[15]
H. Han, Z. Liu, X. Wang, and S. Li, "Research of the relations among cloud computing, internet of things, big data, artificial intelligence, block chain and their application in maritime field", J. Phys. Conf. Ser..
vol. 1927, no. 1, pp. 012026, 2021. [http://dx.doi.org/10.1088/1742-6596/1927/1/012026]
[16]
F. Shi, H. Ning, W. Huangfu, F. Zhang, and M. Daneshmand, "Recent progress on the convergence of the internet of things and artificial intelligence", IEEE Netw., vol. 34, no. 5, pp. 8-15, 2020.
[http://dx.doi.org/10.1109/MNET.011.2000009]
[17]
S. Hodgkins, "“Cyber-physical production networks: Artificial intelligence data-driven internet of things systems, smart manufacturing technologies, and real-time process monitoring”, J. Self-Govern", Manag. Eco., vol. 8, no. 1, pp. 114-120, 2020.
[http://dx.doi.org/10.22381/JSME8120204]
[18]
G.H. Qiu, Y. Wang, C. Zhou, Y. Xia, N. Me, and Z. Zhang, "Research on the intelligent agricultural closed-loop system under the internet of things architecture", J. Phys. Conf. Ser..
vol. 1684, no. 1, pp. 012020, 2020. [http://dx.doi.org/10.1088/1742-6596/1684/1/012020]
[19]
D. Hansaraj, S. Wankhede, N.V. Gowri, and P. Sharma, "An internet of things for prevention of security attack on cloud medical data using artifical intelligence", Int. J. Grid Distrib. Comput., vol. 14, no. 1, pp. 1143-1161, 2021.
[20]
Z. Jie, "Research on communication scheduling algorithm for smart home in internet of things under cloud computing", J. Adv. Comput. Intell. Intell. Inform., vol. 23, no. 1, pp. 124-128, 2019.
[http://dx.doi.org/10.20965/jaciii.2019.p0124]
[21]
C. Stracener, Q. Samelson, J. Mackie, and M. Ihaza, "The internet of things grows artificial intelligence and data sciences", IT Prof., vol. 21, no. 3, pp. 55-62, 2019.
[http://dx.doi.org/10.1109/MITP.2019.2912729]
[22]
I. Jamal, Z. Ghaffar, A. Alshahrani, M. Fayaz, and A.M. Alghamdi, "A topical review on machine learning, software defined networking, internet of things applications: Research limitations and challenges", Electronics, vol. 10, no. 8, p. 880, 2021.
[http://dx.doi.org/10.3390/electronics10080880]
[23]
Y. Yuan, X. Zhang, and J. Tang, "Guest editorial special issue on privacy and security in computational intelligence", IEEE Trans. Emerg. Top. Comput. Intell., vol. 4, no. 5, pp. 590-592, 2020.
[http://dx.doi.org/10.1109/TETCI.2020.3020197]
[24]
K.M. Botcha, "Anurag and V.V.S.S.S. Chakravarthy, “Concep-tualization of data security in internet of things (iot) using blockchain principles”", Far East J. Elect. Commun., vol. 20, no. 1, pp. 9-19, 2019.
[http://dx.doi.org/10.17654/EC020010009]
[25]
G.K. Durbhak, and B. Selvaraj, "Convergence of artificial intelligence and internet of things in predictive maintenance systems – a review", Turkish J. Comput. Math. Educ., vol. 12, no. 11, pp. 205-214, 2021.
[26]
H.A. Naman, N.A. Hussien, M.L. Al-Dabag, and H.T.S. Alrikabi, "“Monitoring the consuming of electrical energy based on the internet of things applications” has been accepted for publishing after double blind review", Int. J. Interact. Mob. Technol., vol. 15, no. 2, pp. 172-183, 2021.
[http://dx.doi.org/10.3991/ijim.v15i02.19869]
[27]
J. Bhola, S. Soni, and G.K. Cheema, "Recent trends for security applications in wireless sensor networks – A technical review,", In 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), 13-15 Mar, 2019, New Delhi, India, pp. 707-712, 2019.
[28]
T. Alsboui, Y. Qin, H. Richard, and H. Al-Aqrabi, "Distributed intelligence in the internet of things: Challenges and opportunities", SN Comput. Sci., vol. 2, no. 4, p. 277, 2021.
[29]
J. Bhola, M. Shabaz, G. Dhiman, S. Vimal, P. Subbulakshmi, and S.K. Soni, "Performance evaluation of multilayer clustering network using distributed energy efficient clustering with enhanced threshold protocol", Wirel. Pers. Commun., vol. 126, no. 3, pp. 2175-2189, 2022.
[http://dx.doi.org/10.1007/s11277-021-08780-x] [PMID: 34456513]
[30]
S. Afzal, A. Faisal, I. Siddique, and M. Afzal, "Internet of Things (IoT) security: Issues, challenges and solutions", Int. J. Sci. Eng. Res., vol. 12, no. 6, p. 52, 2021.
[31]
Y. Gahi, I. El Alaoui, and M. Guennoun, "An End to End Cloud Computing Privacy Framework Using Blind Processing", Research Anthology on Privatizing and Securing Data. IGI Global, pp. 406-427, 2021.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy