Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles

被引:15
|
作者
Bi, Renwan [1 ,2 ]
Xiong, Jinbo [1 ,2 ]
Tian, Youliang [3 ]
Li, Qi [4 ,5 ]
Choo, Kim-Kwang Raymond [6 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
[2] Informat Engn Univ, Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Peoples R China
[3] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China
[5] Hangzhou Normal Univ, Key Lab Cryptog Zhejiang Prov, Hangzhou 311121, Peoples R China
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Object detection; Cryptography; Protocols; Servers; Privacy; Computational modeling; Image edge detection; Connected autonomous vehicles (CAVs); edge computing; faster R-convolutional neural network (CNN); object detection; privacy protection; FRAMEWORK;
D O I
10.1109/JIOT.2022.3212464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Connected autonomous vehicles (CAVs) are capable of capturing high-definition images from onboard sensors, which can be used to facilitate the detection of objects in the vicinity. Such images may, however, contain sensitive information (e.g., human faces and license plates) as well as the indirect location of CAVs. To protect the object privacy of images shared by CAVs, this article proposes a privacy-preserving object detection (P2OD) framework. Specifically, we propose multiple secure computing protocols designed to construct a privacy-preserving Faster $R$ -convolutional neural network (CNN) model to securely extract features and bounding-boxes of objects in an image. By leveraging edge computing (with higher performance computation and lower latency, in comparison to cloud-based solutions), CAVs randomly split the captured images and upload them to two noncollusive edge servers. Both servers will then perform the P2OD framework cooperatively to directly detect objects over random image shares without exposing sensitive information. The theoretical analysis demonstrates the security, correctness, and efficiency of the P2OD framework, and the experimental findings show that the P2OD framework can effectively protect the classification and location privacy of image objects for CAVs. Compared with the original Faster R-CNN model, the classification and regression errors of the P2OD framework can be controlled within 10-12 and 10-14, respectively.
引用
收藏
页码:2314 / 2329
页数:16
相关论文
共 50 条
  • [31] Preserving Privacy in the Internet of Connected Vehicles
    Ghane, Soheila
    Jolfaei, Alireza
    Kulik, Lars
    Ramamohanarao, Kotagiri
    Puthal, Deepak
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (08) : 5018 - 5027
  • [32] Achieving privacy-preserving computation on Data Grids
    Yu, Z.
    Zhang, N.
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 1 - 6
  • [33] A Lightweight Privacy-Preserving Authentication Protocol for VANETs
    Li, Xiong
    Liu, Tian
    Obaidat, Mohammad S.
    Wu, Fan
    Vijayakumar, Pandi
    Kumar, Neeraj
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3547 - 3557
  • [34] Achieving Consensus in Privacy-Preserving Decentralized Learning
    Xiang, Liyao
    Wang, Lingdong
    Wang, Shufan
    Li, Baochun
    2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 899 - 909
  • [35] RETRACTED: Lightweight Authenticated Privacy-Preserving Secure Framework for the Internet of Vehicles (Retracted Article)
    Jamjoom, Mona
    Abulkasim, Hussein
    Abbas, Safia
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [36] Feasibility Study - Simulation of Privacy-Preserving AI for Autonomous Fall Detection
    Hutchins, Jeffrey
    Lachance, Sonya
    NURSING RESEARCH, 2024, 73 (03) : E157 - E157
  • [37] TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy
    Wu, Lei
    Qin, Chengyi
    Xu, Zihui
    Guan, Yunguo
    Lu, Rongxing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4006 - 4020
  • [38] Privacy-preserving outlier detection
    Vaidya, J
    Clifton, C
    FOURTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2004, : 233 - 240
  • [39] Privacy-Preserving Routing and Charging Scheduling for Cellular-Connected Unmanned Aerial Vehicles
    Liu, Bin
    Ni, Wei
    Liu, Ren Ping
    Guo, Y. Jay
    Zhu, Hongbo
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (08): : 4929 - 4941
  • [40] Medical Image Object Detection Algorithm for Privacy-Preserving Federated Learning
    Wang S.
    Lu S.
    Cao B.
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2021, 33 (10): : 1553 - 1562