2021
DOI: 10.1155/2021/7776193
|View full text |Cite
|
Sign up to set email alerts
|

Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT

Abstract: The emergence of edge computing has improved the real time and efficiency of the Industrial Internet of Things. In order to achieve safe and efficient data collection and application in the Industrial Internet of Things, a lot of computing and bandwidth resources are usually sacrificed. From the perspective of low computing and communication overhead, this paper proposes an efficient privacy protection layered data aggregation scheme for edge computing assisted IIoT by combining the Chinese Remainder Theorem (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…Anonymization and pseudonymization techniques are utilized to remove or replace personally identifiable information (PII) from data sets, preventing the identification of individuals while allowing for data analysis [21,22]. Data minimization strategies such as aggregation and summarization help reduce the amount of data processed at the edge, minimizing privacy risks [16,23]. Privacy-preserving machine learning techniques such as federated learning [24,25] and secure model aggregation [26] allow for training machine learning models on distributed edge devices without exposing raw data.…”
Section: Security and Privacymentioning
confidence: 99%
“…Anonymization and pseudonymization techniques are utilized to remove or replace personally identifiable information (PII) from data sets, preventing the identification of individuals while allowing for data analysis [21,22]. Data minimization strategies such as aggregation and summarization help reduce the amount of data processed at the edge, minimizing privacy risks [16,23]. Privacy-preserving machine learning techniques such as federated learning [24,25] and secure model aggregation [26] allow for training machine learning models on distributed edge devices without exposing raw data.…”
Section: Security and Privacymentioning
confidence: 99%
“…The Industrial Internet of Things provides a secure and risk-free environment for data collection and analysis. 6 It was possible to demonstrate a layered data aggregation system that protects users' privacy and is enabled by edge computing for the Internet of Industrial Things using the Chinese Remainder Theorem (CRT), an upgraded paillier homomorphic algorithm, and hash chain technology. This technique guards against tampering and pollution attacks by utilizing improved paillier encryption and hash chains, preserving data integrity and allowing it to accept flaws.…”
Section: Authentication and Integritymentioning
confidence: 99%
“…As a result, there is a greater risk of intermediate data being targeted via node and link attacks; as a result, edge-cloud platform availability [3][4][5] must be guaranteed. However, providing security to workflow execution in an edge-cloud platform is difficult, 6 requiring QoS such as reduced time and energy consumption and significant dependencies between sub-tasks. 7 The Multi-Layer Security and Quality Aware (MLSQA) workflow is intended to address research issues 8 by developing a solid and efficient approach for carrying out extensive data processes.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation