Skip to main content
Top

2022 | OriginalPaper | Chapter

4. Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential Privacy

Authors : Youyang Qu, Longxiang Gao, Shui Yu, Yong Xiang

Published in: Privacy Preservation in IoT: Machine Learning Approaches

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The cyber-physical social system (CPSS), as an extension of Internet of Things (IoT), maps human social interaction from cyberspace to the physical world by data sharing and posting, such as publishing spatial-temporal data, images, videos, etc. The published data contains individual’s sensitive information, and thereby leads to continues attacks on it. Nowadays, most existing research assumes that the privacy protection should be uniform that all parties share a same privacy protection level. This impractical assumption results in data degradation due to over-protection or privacy leakage due to under-protection.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference S. Ho, Y. Qu, L. Gao, J. Li, and Y. Xiang, Generative adversarial nets enhanced continual data release using differential privacy, in International Conference on Algorithms and Architectures for Parallel Processing. Springer, pp. 418–426 (2019) S. Ho, Y. Qu, L. Gao, J. Li, and Y. Xiang, Generative adversarial nets enhanced continual data release using differential privacy, in International Conference on Algorithms and Architectures for Parallel Processing. Springer, pp. 418–426 (2019)
2.
go back to reference G. Ács, L. Melis, C. Castelluccia, E.D. Cristofaro, Differentially private mixture of generative neural networks, in 2017 IEEE International Conference on Data Mining, ICDM 2017, New Orleans, LA, USA, November 18-21, 2017, pp. 715–720 (2017) G. Ács, L. Melis, C. Castelluccia, E.D. Cristofaro, Differentially private mixture of generative neural networks, in 2017 IEEE International Conference on Data Mining, ICDM 2017, New Orleans, LA, USA, November 18-21, 2017, pp. 715–720 (2017)
3.
go back to reference Q. Youyang, Z. Jingwen, L. Ruidong, Z. Xiaoning, Z. Xuemeng, Y. Shui, Generative adversarial networks enhanced location privacy in 5g networks. Sci China Inform Sci Q. Youyang, Z. Jingwen, L. Ruidong, Z. Xiaoning, Z. Xuemeng, Y. Shui, Generative adversarial networks enhanced location privacy in 5g networks. Sci China Inform Sci
4.
go back to reference Y. Qu, S. Yu, J. Zhang, H.T.T. Binh, L. Gao, W. Zhou, Gan-dp: generative adversarial net driven differentially privacy-preserving big data publishing, in ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, pp. 1–6 (2019) Y. Qu, S. Yu, J. Zhang, H.T.T. Binh, L. Gao, W. Zhou, Gan-dp: generative adversarial net driven differentially privacy-preserving big data publishing, in ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, pp. 1–6 (2019)
5.
go back to reference Y. Qu, S. Yu, W. Zhou, Y. Tian, Gan-driven personalized spatial-temporal private data sharing in cyber-physical social systems. IEEE Transa. Netw. Sci. Eng. 7(4), 2576–2586 (2020)MathSciNetCrossRef Y. Qu, S. Yu, W. Zhou, Y. Tian, Gan-driven personalized spatial-temporal private data sharing in cyber-physical social systems. IEEE Transa. Netw. Sci. Eng. 7(4), 2576–2586 (2020)MathSciNetCrossRef
6.
go back to reference L. Cui, Y. Qu, G. Xie, D. Zeng, R. Li, S. Shen, S. Yu, Security and privacy-enhanced federated learning for anomaly detection in iot infrastructures. IEEE Trans. Indus. Inform. (2021) L. Cui, Y. Qu, G. Xie, D. Zeng, R. Li, S. Shen, S. Yu, Security and privacy-enhanced federated learning for anomaly detection in iot infrastructures. IEEE Trans. Indus. Inform. (2021)
7.
go back to reference Y. Wan, Y. Qu, L. Gao, Y. Xiang, Differentially privacy-preserving federated learning using wasserstein generative adversarial network, in 2021 IEEE Symposium on Computers and Communications (ISCC). IEEE, pp. 1–6 (2021) Y. Wan, Y. Qu, L. Gao, Y. Xiang, Differentially privacy-preserving federated learning using wasserstein generative adversarial network, in 2021 IEEE Symposium on Computers and Communications (ISCC). IEEE, pp. 1–6 (2021)
8.
go back to reference A. Sheth, P. Anantharam, C. Henson, Physical-cyber-social computing: an early 21st century approach. IEEE Intell. Syst. 28(1), 78–82 (2013)CrossRef A. Sheth, P. Anantharam, C. Henson, Physical-cyber-social computing: an early 21st century approach. IEEE Intell. Syst. 28(1), 78–82 (2013)CrossRef
9.
go back to reference D. Garcia, Leaking privacy and shadow profiles in online social networks. Sci. Adv. 3(8), e1701172 (2017) D. Garcia, Leaking privacy and shadow profiles in online social networks. Sci. Adv. 3(8), e1701172 (2017)
10.
go back to reference A.R. Beresford, F. Stajano, Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)CrossRef A.R. Beresford, F. Stajano, Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)CrossRef
12.
go back to reference Y. Qu, S. Yu, W. Zhou, S. Peng, G. Wang, K. Xiao, Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel. Commun. 25(6), 91–97 (2018)CrossRef Y. Qu, S. Yu, W. Zhou, S. Peng, G. Wang, K. Xiao, Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel. Commun. 25(6), 91–97 (2018)CrossRef
13.
go back to reference S. Yu, Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016)CrossRef S. Yu, Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751–2763 (2016)CrossRef
14.
go back to reference H. Liu, X. Li, H. Li, J. Ma, X. Ma, Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services, in 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1–4, 2017, pp. 1–9 (2017) H. Liu, X. Li, H. Li, J. Ma, X. Ma, Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services, in 2017 IEEE Conference on Computer Communications, INFOCOM 2017, Atlanta, GA, USA, May 1–4, 2017, pp. 1–9 (2017)
15.
go back to reference C. Dwork, Differential privacy, in in Proceedings of ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 1–12 (2006) C. Dwork, Differential privacy, in in Proceedings of ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 1–12 (2006)
16.
go back to reference L.T. Yang, X. Wang, X. Chen, L. Wang, R. Ranjan, X. Chen, M.J. Deen, A multi-order distributed hosvd with its incremental computing for big services in cyber-physical-social systems, IEEE Trans. Big Data (2018) L.T. Yang, X. Wang, X. Chen, L. Wang, R. Ranjan, X. Chen, M.J. Deen, A multi-order distributed hosvd with its incremental computing for big services in cyber-physical-social systems, IEEE Trans. Big Data (2018)
17.
go back to reference M. Arjovsky, S. Chintala, L. Bottou, Wasserstein generative adversarial networks, in Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6–11 August 2017, pp. 214–223 (2017) M. Arjovsky, S. Chintala, L. Bottou, Wasserstein generative adversarial networks, in Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6–11 August 2017, pp. 214–223 (2017)
18.
go back to reference Z. Jorgensen, T. Yu, G. Cormode, Conservative or liberal? personalized differential privacy, in 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015, pp. 1023–1034 (2015) Z. Jorgensen, T. Yu, G. Cormode, Conservative or liberal? personalized differential privacy, in 31st IEEE International Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015, pp. 1023–1034 (2015)
19.
go back to reference Y. Liu, N. Li, Retrieving hidden friends: a collusion privacy attack against online friend search engine. IEEE Trans. Inform. Forensics Secur. 14(4), 833–847 (2019)CrossRef Y. Liu, N. Li, Retrieving hidden friends: a collusion privacy attack against online friend search engine. IEEE Trans. Inform. Forensics Secur. 14(4), 833–847 (2019)CrossRef
20.
go back to reference X. Zheng, Z. Cai, J. Yu, C. Wang, Y. Li, Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Int. Things J. 4(6), 1868–1878 (2017)CrossRef X. Zheng, Z. Cai, J. Yu, C. Wang, Y. Li, Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Int. Things J. 4(6), 1868–1878 (2017)CrossRef
21.
go back to reference Q. Xu, P. Ren, H. Song, Q. Du, Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions. IEEE Int. Things J. 4(6), 1924–1933 (2017)CrossRef Q. Xu, P. Ren, H. Song, Q. Du, Security-aware waveforms for enhancing wireless communications privacy in cyber-physical systems via multipath receptions. IEEE Int. Things J. 4(6), 1924–1933 (2017)CrossRef
22.
go back to reference S. Pierangela, S. Latanya, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, in Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 1–19 (1998) S. Pierangela, S. Latanya, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, in Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 1–19 (1998)
23.
go back to reference A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, L-diversity: privacy beyond k-anonymity. IEEE Trans. Knowl. Data Eng. 1(1) (2007) A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, L-diversity: privacy beyond k-anonymity. IEEE Trans. Knowl. Data Eng. 1(1) (2007)
24.
go back to reference N. Li, T. Li, S. Venkatasubramanian, Closeness: a new privacy measure for data publishing. IEEE Trans. Knowl. Data Eng. 22(7), 943–956 (2010)CrossRef N. Li, T. Li, S. Venkatasubramanian, Closeness: a new privacy measure for data publishing. IEEE Trans. Knowl. Data Eng. 22(7), 943–956 (2010)CrossRef
25.
go back to reference Y. Qu, S. Yu, L. Gao, W. Zhou, S. Peng, A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans. Comput. Soc. Syst. 5(3), 773–784 (2018)CrossRef Y. Qu, S. Yu, L. Gao, W. Zhou, S. Peng, A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans. Comput. Soc. Syst. 5(3), 773–784 (2018)CrossRef
26.
go back to reference A. Jolfaei, K. Kant, H. Shafei, Secure data streaming to untrusted road side units in intelligent transportation system, in 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE 2019, pp. 793–798 (2019) A. Jolfaei, K. Kant, H. Shafei, Secure data streaming to untrusted road side units in intelligent transportation system, in 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE 2019, pp. 793–798 (2019)
27.
go back to reference Y. Gong, C. Zhang, Y. Fang, J. Sun, Protecting location privacy for task allocation in ad hoc mobile cloud computing. IEEE Trans. Emerg. Topics Comput. PP(99), 1–1 (2016) Y. Gong, C. Zhang, Y. Fang, J. Sun, Protecting location privacy for task allocation in ad hoc mobile cloud computing. IEEE Trans. Emerg. Topics Comput. PP(99), 1–1 (2016)
28.
go back to reference W. Wang, Q. Zhang, Privacy preservation for context sensing on smartphone. IEEE/ACM Trans. Netw. 24(6), 3235–3247 (2016)CrossRef W. Wang, Q. Zhang, Privacy preservation for context sensing on smartphone. IEEE/ACM Trans. Netw. 24(6), 3235–3247 (2016)CrossRef
29.
go back to reference S.G. Ezabadi, A. Jolfaei, L. Kulik, R. Kotagiri, Differentially private streaming to untrusted edge servers in intelligent transportation system, in 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).IEEE, pp. 781–786 (2019) S.G. Ezabadi, A. Jolfaei, L. Kulik, R. Kotagiri, Differentially private streaming to untrusted edge servers in intelligent transportation system, in 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).IEEE, pp. 781–786 (2019)
30.
go back to reference A. Jolfaei, K. Kant, Privacy and security of connected vehicles in intelligent transportation system, in 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks–Supplemental Volume (DSN-S). IEEE, pp. 9–10 (2019) A. Jolfaei, K. Kant, Privacy and security of connected vehicles in intelligent transportation system, in 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks–Supplemental Volume (DSN-S). IEEE, pp. 9–10 (2019)
31.
go back to reference D.B. Rawat. K.Z. Ghafoor, Smart Cities Cybersecurity and Privacy. Elsevier (2018) D.B. Rawat. K.Z. Ghafoor, Smart Cities Cybersecurity and Privacy. Elsevier (2018)
32.
go back to reference H. Zhang, Y. Shu, P. Cheng, J. Chen, Privacy and performance trade-off in cyber-physical systems. IEEE Netw. 30(2), 62–66 (2016)CrossRef H. Zhang, Y. Shu, P. Cheng, J. Chen, Privacy and performance trade-off in cyber-physical systems. IEEE Netw. 30(2), 62–66 (2016)CrossRef
33.
go back to reference Y. Qu, L. Gao, T.H. Luan, Y. Xiang, S. Yu, B. Li, G. Zheng, Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Int. Things J. (2020) Y. Qu, L. Gao, T.H. Luan, Y. Xiang, S. Yu, B. Li, G. Zheng, Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Int. Things J. (2020)
34.
go back to reference J. Yu, K. Wang, D. Zeng, C. Zhu, S. Guo, Privacy-preserving data aggregation computing in cyber-physical social systems. ACM Trans. Cyberphys. Syst. 3(1), 8:1–8:23 (2019) J. Yu, K. Wang, D. Zeng, C. Zhu, S. Guo, Privacy-preserving data aggregation computing in cyber-physical social systems. ACM Trans. Cyberphys. Syst. 3(1), 8:1–8:23 (2019)
35.
go back to reference T. Um, G.M. Lee, J.K. Choi, Strengthening trust in the future social-cyber-physical infrastructure: an ITU-T perspective. IEEE Commun. Mag. 54(9), 36–42 (2016)CrossRef T. Um, G.M. Lee, J.K. Choi, Strengthening trust in the future social-cyber-physical infrastructure: an ITU-T perspective. IEEE Commun. Mag. 54(9), 36–42 (2016)CrossRef
36.
go back to reference I.J. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A.C. Courville, Y. Bengio, Generative adversarial nets, in Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada, pp. 2672–2680 (2014) I.J. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A.C. Courville, Y. Bengio, Generative adversarial nets, in Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada, pp. 2672–2680 (2014)
37.
go back to reference C. Li, T. Xu, J. Zhu, B. Zhang, Triple generative adversarial nets, in Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 4–9 December 2017, Long Beach, CA, USA, pp. 4091–4101 (2017) C. Li, T. Xu, J. Zhu, B. Zhang, Triple generative adversarial nets, in Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 4–9 December 2017, Long Beach, CA, USA, pp. 4091–4101 (2017)
38.
go back to reference S. Song, K. Chaudhuri, A.D. Sarwate, Stochastic gradient descent with differentially private updates, in IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013, Austin, TX, USA, December 3–5, 2013, pp. 245–248 (2013) S. Song, K. Chaudhuri, A.D. Sarwate, Stochastic gradient descent with differentially private updates, in IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013, Austin, TX, USA, December 3–5, 2013, pp. 245–248 (2013)
39.
go back to reference C. Dwork, V. Feldman, M. Hardt, T. Pitassi, O. Reingold, A. Roth, The reusable holdout: preserving validity in adaptive data analysis. Science 349(6248), 636–638 (2015)MathSciNetCrossRef C. Dwork, V. Feldman, M. Hardt, T. Pitassi, O. Reingold, A. Roth, The reusable holdout: preserving validity in adaptive data analysis. Science 349(6248), 636–638 (2015)MathSciNetCrossRef
40.
go back to reference M. Abadi, A. Chu, I.J. Goodfellow, H.B. McMahan, I. Mironov, K. Talwar, L. Zhang, Deep learning with differential privacy, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24–28, 2016, pp. 308–318 (2016) M. Abadi, A. Chu, I.J. Goodfellow, H.B. McMahan, I. Mironov, K. Talwar, L. Zhang, Deep learning with differential privacy, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24–28, 2016, pp. 308–318 (2016)
41.
go back to reference R. Shokri, V. Shmatikov, Privacy-preserving deep learning, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12–16, 2015, pp. 1310–1321 (2015) R. Shokri, V. Shmatikov, Privacy-preserving deep learning, in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12–16, 2015, pp. 1310–1321 (2015)
42.
go back to reference Y. Qu, M.R. Nosouhi, L. Cui, S. Yu, Privacy preservation in smart cities, in Smart Cities Cybersecurity and Privacy. Elsevier, pp. 75–88 (2019) Y. Qu, M.R. Nosouhi, L. Cui, S. Yu, Privacy preservation in smart cities, in Smart Cities Cybersecurity and Privacy. Elsevier, pp. 75–88 (2019)
43.
go back to reference Y. Qu, S. Yu, W. Zhou, S. Peng, G. Wang, K. Xiao, Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel. Commun. 25(6), 91–97 (2018)CrossRef Y. Qu, S. Yu, W. Zhou, S. Peng, G. Wang, K. Xiao, Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel. Commun. 25(6), 91–97 (2018)CrossRef
44.
go back to reference J. Yu, K. Wang, D. Zeng, C. Zhu, S. Guo, Privacy-preserving data aggregation computing in cyber-physical social systems. ACM Trans. Cyber-Phys. Syst. 3(1), 1–23 (2018)CrossRef J. Yu, K. Wang, D. Zeng, C. Zhu, S. Guo, Privacy-preserving data aggregation computing in cyber-physical social systems. ACM Trans. Cyber-Phys. Syst. 3(1), 1–23 (2018)CrossRef
45.
go back to reference L. Cui, G. Xie, Y. Qu, L. Gao, Y. Yang, Security and privacy in smart cities: challenges and opportunities. IEEE Access 6,46 134–46 145 (2018) L. Cui, G. Xie, Y. Qu, L. Gao, Y. Yang, Security and privacy in smart cities: challenges and opportunities. IEEE Access 6,46 134–46 145 (2018)
46.
go back to reference L. Cui, Y. Qu, L. Gao, G. Xie, S. Yu, Detecting false data attacks using machine learning techniques in smart grid: a survey, J. Netw. Comput. Appl., 102808 (2020) L. Cui, Y. Qu, L. Gao, G. Xie, S. Yu, Detecting false data attacks using machine learning techniques in smart grid: a survey, J. Netw. Comput. Appl., 102808 (2020)
47.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Privacy-Preserving in Edge Computing (Springer, Wireless Networks, 2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Privacy-Preserving in Edge Computing (Springer, Wireless Networks, 2021)
48.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Blockchain based decentralized privacy preserving in edge computing, in Privacy-Preserving in Edge Computing. Springer, pp. 83–109 (2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Blockchain based decentralized privacy preserving in edge computing, in Privacy-Preserving in Edge Computing. Springer, pp. 83–109 (2021)
49.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Context-aware privacy preserving in edge computing, in Privacy-Preserving in Edge Computing. Springer, pp. 35–63 (2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Context-aware privacy preserving in edge computing, in Privacy-Preserving in Edge Computing. Springer, pp. 35–63 (2021)
50.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, An introduction to edge computing, in Privacy-Preserving in Edge Computing. Springer, pp. 1–14 (2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, An introduction to edge computing, in Privacy-Preserving in Edge Computing. Springer, pp. 1–14 (2021)
51.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Privacy issues in edge computing, in Privacy-Preserving in Edge Computing. Springer, pp. 15–34 (2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Privacy issues in edge computing, in Privacy-Preserving in Edge Computing. Springer, pp. 15–34 (2021)
52.
go back to reference Y. Qu, L. Gao, Y. Xiang, Blockchain-driven privacy-preserving machine learning, Blockchains for Network Security: Principles, Technologies and Applications, pp. 189–200 (2020) Y. Qu, L. Gao, Y. Xiang, Blockchain-driven privacy-preserving machine learning, Blockchains for Network Security: Principles, Technologies and Applications, pp. 189–200 (2020)
53.
go back to reference Y. Qu, M.R. Nosouhi, L. Cui, S. Yu, Personalized privacy protection in big data Y. Qu, M.R. Nosouhi, L. Cui, S. Yu, Personalized privacy protection in big data
54.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Existing privacy protection solutions, in Personalized Privacy Protection in Big Data. Springer, pp. 5–13 (2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Existing privacy protection solutions, in Personalized Privacy Protection in Big Data. Springer, pp. 5–13 (2021)
55.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Future research directions, in Personalized Privacy Protection in Big Data. Springer, pp. 131–136 (2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Future research directions, in Personalized Privacy Protection in Big Data. Springer, pp. 131–136 (2021)
56.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Leading attacks in privacy protection domain, in Personalized Privacy Protection in Big Data. Springer, pp. 15–21 (2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Leading attacks in privacy protection domain, in Personalized Privacy Protection in Big Data. Springer, pp. 15–21 (2021)
57.
go back to reference L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Personalized privacy protection solutions, in Personalized Privacy Protection in Big Data. Springer, pp. 23–130 (2021) L. Gao, T.H. Luan, B. Gu, Y. Qu, Y. Xiang, Personalized privacy protection solutions, in Personalized Privacy Protection in Big Data. Springer, pp. 23–130 (2021)
58.
go back to reference J. Yoon, J. Jordon, M. van der Schaar, PATE-GAN: Generating synthetic data with differential privacy guarantees, in International Conference on Learning Representations (2019) J. Yoon, J. Jordon, M. van der Schaar, PATE-GAN: Generating synthetic data with differential privacy guarantees, in International Conference on Learning Representations (2019)
Metadata
Title
Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential Privacy
Authors
Youyang Qu
Longxiang Gao
Shui Yu
Yong Xiang
Copyright Year
2022
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-19-1797-4_4

Premium Partner