Implementing adaptive dragonfly optimization for privacy preservation in IoT

被引:3
|
作者
Apare, Ravindra S. [1 ]
Gujar, Satish N. [2 ]
机构
[1] JJT Univ, Jhunjhunu, Rajasthan, India
[2] BSCOER, Pune, Maharashtra, India
关键词
Internet of Things; sensitive data; privacy preservation; Improved Dragonfly Algorithm; SECURITY; INTERNET; ALGORITHM; THINGS; FRAMEWORK; ARCHITECTURE; CHALLENGES; PROTOCOLS; SERVICES;
D O I
10.3233/JHS-190619
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT (Internet of Things) is a sophisticated analytics and automation system that utilizes networks, big data, artificial intelligence, and sensing technology, and is controlled by an embedded module. It allows one to use affordable wireless technology and transmits the data into the cloud at a component level. It also provides a place to save the data - however, the significant challenges in IoT relay on security restrictions related with device cost. Moreover, the increasing amount of devices further generate opportunities for attacks. Hence, to overcome this issue, this paper intends to develop a promising methodology associated with data privacy preservation for handling the IoT network. It is obvious that the IoT devices often generate time series data, where the range of respective time series data can be vast. Under such circumstances, proper information extraction through effective analysis and relevant privacy preservation of sensitive data from IoT is challenging. In this paper, the problem that occurred in the data preservation is formulated as a non-linear objective model. To solve this objective model, an improved, optimized Dragonfly Algorithm (DA) is adopted, which is termed the Improved DA (IDA) algorithm. Here, the proposed model focused on preserving the physical activity of human monitoring data in the IoT sector. Moreover, the proposed IDA algorithm is compared with conventional schemes such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Bee Colony (ABC), Firefly (FF) and DA and the outcomes prove that the suggested scheme is highly used for preserving the sensitive information uploaded in IoT.
引用
收藏
页码:331 / 348
页数:18
相关论文
共 50 条
  • [21] Enabling Privacy-Preservation in Decentralized Optimization
    Zhang, Chunlei
    Wang, Yongqiang
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (02): : 679 - 689
  • [22] Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications
    Satyanarayana Pamarthi
    R. Narmadha
    Wireless Personal Communications, 2022, 124 : 349 - 376
  • [23] Adaptive Key Management-Based Cryptographic Algorithm for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications
    Pamarthi, Satyanarayana
    Narmadha, R.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (01) : 349 - 376
  • [24] Toward data privacy preservation with ciphertext update and key rotation for IoT
    Shen, Shuaiyong
    Yang, Yang
    Liu, Ximeng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (20):
  • [25] BCPriPIoT: BlockChain Utilized Privacy-Preservation Mechanism for IoT Devices
    Kashif, Muhammad
    Kalkan, Kubra
    2021 THIRD INTERNATIONAL CONFERENCE ON BLOCKCHAIN COMPUTING AND APPLICATIONS (BCCA), 2021, : 201 - 209
  • [26] Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT
    Yan, Hongyang
    Li, Xuan
    Wang, Yu
    Jia, Chunfu
    SENSORS, 2018, 18 (06)
  • [27] Privacy-Preservation Techniques for IoT Devices: A Systematic Mapping Study
    Torre, Damiano
    Chennamaneni, Anitha
    Rodriguez, Alex
    IEEE ACCESS, 2023, 11 : 16323 - 16345
  • [28] Framework for Privacy preservation in IoT through classification and access control mechanisms
    Kaliya, Neha
    Hussain, Muzzammil
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 430 - 434
  • [29] Multi-sensor Data Privacy Protection with Adaptive Privacy Budget for IoT Systems
    Liu, Xinyi
    Zheng, Ye
    Li, Zhengxiong
    Hu, Yidan
    2024 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS 2024, 2024,
  • [30] Role-Based Programming for Implementing Adaptive IoT Applications
    Lhaksmana, Kemas M.
    Murakami, Yohei
    Ishida, Toru
    2016 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS, AND ITS APPLICATIONS (IC3INA) - RECENT PROGRESS IN COMPUTER, CONTROL, AND INFORMATICS FOR DATA SCIENCE, 2016, : 179 - 184