LSH-based missing value prediction for abnormal traffic sensors with privacy protection in edge computing

被引:0
|
作者
Ailing Gao
Xiaomei Liu
Ying Miao
机构
[1] Weifang University of Science and Technology,Shandong Provincial University Laboratory for Protected Horticulture
[2] Qufu Normal University,School of Computer Science
来源
关键词
Distributed LSH; Privacy-preservation; Traffic flow prediction; Data integrity;
D O I
暂无
中图分类号
学科分类号
摘要
Traffic flow prediction is an important part of intelligent transportation systems (ITS). However, sensor failures or the transmission distortion often occur in the process of data acquisition, which will inevitably cause the loss or abnormality of traffic flow data transmitted to the edge server. In this situation, it is necessary to share traffic flow data among different platforms. However, existing traffic flow prediction methods are facing two challenges in the process of traffic flow data sharing. First, user privacy is often leaked in the process of sharing traffic data on various platforms. Moreover, with the continuous updating of data, the efficiency and scalability of data sharing between different platforms will become lower and lower. In view of the above challenges, in this paper, we propose a novel prediction method for the missing traffic flow data caused by abnormal sensors, named ASMVPdistr-LSH\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ASMVP_{distr-LSH}$$\end{document} based on distributed locality-sensitive hashing (LSH) technique. At last, a case study is presented to illustrate the feasibility and effectiveness of our approach ASMVPdistr-LSH\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ASMVP_{distr-LSH}$$\end{document}.
引用
收藏
页码:5081 / 5091
页数:10
相关论文
共 44 条
  • [31] An improved DDPG-based privacy sensitive level protection computation offloading method in mobile edge computing
    Zhang, Hongxia
    Cao, Luyao
    Kumar, Neeraj
    Zhang, Jianyong
    Zhang, Peiying
    Wang, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 159 : 522 - 532
  • [32] Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
    Zhang, Lejun
    Peng, Minghui
    Su, Shen
    Wang, Weizheng
    Jin, Zilong
    Su, Yansen
    Chen, Huiling
    Guo, Ran
    Sergey, Gataullin
    CHINA COMMUNICATIONS, 2024, 21 (03) : 149 - 159
  • [33] A Triple Real-Time Trajectory Privacy Protection Mechanism Based on Edge Computing and Blockchain in Mobile Crowdsourcing
    Wang, Weilong
    Wang, Yingjie
    Duan, Peiyong
    Liu, Tianen
    Tong, Xiangrong
    Cai, Zhipeng
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (10) : 5625 - 5642
  • [34] Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
    Zhang Lejun
    Peng Minghui
    Su Shen
    Wang Weizheng
    Jin Zilong
    Su Yansen
    Chen Huiling
    Guo Ran
    Sergey Gataullin
    ChinaCommunications, 2024, 21 (03) : 149 - 159
  • [35] Data-Augmentation-Based Cellular Traffic Prediction in Edge-Computing-Enabled Smart City
    Wang, Zi
    Hu, Jia
    Min, Geyong
    Zhao, Zhiwei
    Wang, Jin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) : 4179 - 4187
  • [36] Edge computing-based big data privacy preservation in motion trajectory prediction for martial arts training
    Wang, Xue
    Peng, Xinxin
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [37] Short-Term Traffic State Prediction Based on Mobile Edge Computing in V2X Communication
    Wang, Pangwei
    Liu, Xiao
    Wang, Yunfeng
    Wang, Tianren
    Zhang, Juan
    APPLIED SCIENCES-BASEL, 2021, 11 (23):
  • [38] A short-term traffic flow prediction method based on spatial-temporal correlation using edge computing
    Yu, Xiaojie
    Sun, Lijun
    Yan, Yang
    Liu, Guanfeng
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93
  • [39] Blockchain-Based Cache Poisoning Security Protection and Privacy-Aware Access Control in NDN Vehicular Edge Computing Networks
    Kai Lei
    Junjie Fang
    Qichao Zhang
    Junjun Lou
    Maoyu Du
    Jiyue Huang
    Jianping Wang
    Kuai Xu
    Journal of Grid Computing, 2020, 18 : 593 - 613
  • [40] A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment
    Song, Wenjun
    Liu, Mengqi
    Baker, Thar
    Zhang, Qikun
    Tan, Yu-an
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2023, 33 (05)