Skip to main content
Top
Published in: Optical and Quantum Electronics 1/2024

01-01-2024

Research on key technologies of data security and privacy protection in Internet of Things group intelligence

Authors: Yadong Liu, Yahui Hua, Qingrong Chen

Published in: Optical and Quantum Electronics | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the increasing scale and complexity of IoT swarm intelligence applications, data security and privacy protection have become important factors restricting the development of IoT swarm intelligence. This paper explores the key technologies of data security and privacy protection in IoT swarm intelligence to improve the security and trustworthiness of IoT swarm intelligence applications. Using the method of literature research and empirical analysis, the data security and privacy protection in the swarm intelligence of the Internet of Things are deeply analyzed and studied. The data security risks in the Internet of Things are identified and classified, and the corresponding security requirements are proposed. According to different security requirements, a series of data security and privacy protection technologies are proposed. Finally, through empirical research, the effectiveness and feasibility of the proposed key technologies are verified. The research results show that these technologies and methods can provide guarantees for the security and trustworthiness of IoT swarm intelligence applications, contributing to the healthy development of the IoT industry. However, further research and improvements are still needed to address new security and privacy challenges that continue to emerge.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abowd, J.M., Schmutte, I.M.: An economic analysis of privacy protection and statistical accuracy as social choices. Am. Econ. Rev. 109(1), 171–202 (2019)CrossRef Abowd, J.M., Schmutte, I.M.: An economic analysis of privacy protection and statistical accuracy as social choices. Am. Econ. Rev. 109(1), 171–202 (2019)CrossRef
go back to reference Choi, J., Sung, W., Choi, C., Kim, P.: Personal information leakage detection method using the inference-based access control model on the android platform. Pervasive Mob. Comput. 24, 138–149 (2015)CrossRef Choi, J., Sung, W., Choi, C., Kim, P.: Personal information leakage detection method using the inference-based access control model on the android platform. Pervasive Mob. Comput. 24, 138–149 (2015)CrossRef
go back to reference Dong, J., Roth, A., Su, W.J.: Gaussian differential privacy. J. R. Stat. Soc. Ser. B Stat Methodol. 84(1), 3–37 (2022)MathSciNetCrossRef Dong, J., Roth, A., Su, W.J.: Gaussian differential privacy. J. R. Stat. Soc. Ser. B Stat Methodol. 84(1), 3–37 (2022)MathSciNetCrossRef
go back to reference Elkoumy, G., Fahrenkrog-Petersen, S.A., Sani, M.F., et al.: Privacy and confidentiality in process mining: threats and research challenges. ACM Trans. Manag. Inf. Syst. (TMIS) 13(1), 1–17 (2021) Elkoumy, G., Fahrenkrog-Petersen, S.A., Sani, M.F., et al.: Privacy and confidentiality in process mining: threats and research challenges. ACM Trans. Manag. Inf. Syst. (TMIS) 13(1), 1–17 (2021)
go back to reference Feng, X., Yan, F., Liu, X.: Study of wireless communication technologies on internet of things for precision agriculture. Wireless Pers. Commun. 108(3), 1785–1802 (2019a)CrossRef Feng, X., Yan, F., Liu, X.: Study of wireless communication technologies on internet of things for precision agriculture. Wireless Pers. Commun. 108(3), 1785–1802 (2019a)CrossRef
go back to reference Feng, Q., He, D., Zeadally, S., et al.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45–58 (2019b)CrossRef Feng, Q., He, D., Zeadally, S., et al.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45–58 (2019b)CrossRef
go back to reference Ju, C., Gu, Q., Wu, G., Zhang, S.: Local differential privacy protection of high-dimensional perceptual data by the refined Bayes network. Sensors 20(9), 208–216 (2020)CrossRefPubMedPubMedCentralADS Ju, C., Gu, Q., Wu, G., Zhang, S.: Local differential privacy protection of high-dimensional perceptual data by the refined Bayes network. Sensors 20(9), 208–216 (2020)CrossRefPubMedPubMedCentralADS
go back to reference Paul, A., Jeyaraj, R.: Internet of Things: a primer. Human Behav. Emerg. Technol. 1(1), 37–47 (2019)CrossRef Paul, A., Jeyaraj, R.: Internet of Things: a primer. Human Behav. Emerg. Technol. 1(1), 37–47 (2019)CrossRef
go back to reference Ray, P.P.: A survey on internet of things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018) Ray, P.P.: A survey on internet of things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)
go back to reference Shuman, E., Saguy, T., van Zomeren, M., Halperin, E.: Disrupting the system constructively: testing the effectiveness of nonnormative nonviolent collective action. J. Pers. Soc. Psychol. 121(4), 785–796 (2021)CrossRefPubMed Shuman, E., Saguy, T., van Zomeren, M., Halperin, E.: Disrupting the system constructively: testing the effectiveness of nonnormative nonviolent collective action. J. Pers. Soc. Psychol. 121(4), 785–796 (2021)CrossRefPubMed
go back to reference Sugiura, G., Ito, K., Kashima, K.: Bayesian differential privacy for linear dynamical systems. IEEE Control Syst Lett 6, 896–901 (2021)MathSciNetCrossRef Sugiura, G., Ito, K., Kashima, K.: Bayesian differential privacy for linear dynamical systems. IEEE Control Syst Lett 6, 896–901 (2021)MathSciNetCrossRef
go back to reference Sun, P.: Security and privacy protection in cloud computing: discussions and challenges. J. Netw. Comput. Appl. 160, 5434–5439 (2020)CrossRef Sun, P.: Security and privacy protection in cloud computing: discussions and challenges. J. Netw. Comput. Appl. 160, 5434–5439 (2020)CrossRef
go back to reference Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: a survey. IEEE Access 8, 131723–131740 (2020)CrossRef Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: a survey. IEEE Access 8, 131723–131740 (2020)CrossRef
go back to reference Yu, K., Guo, Z., Shen, Y., et al.: Secure artificial intelligence of things for implicit group recommendations. IEEE Internet Things J. 9(4), 2698–2707 (2021)CrossRef Yu, K., Guo, Z., Shen, Y., et al.: Secure artificial intelligence of things for implicit group recommendations. IEEE Internet Things J. 9(4), 2698–2707 (2021)CrossRef
go back to reference Zhao, Y., Chen, J.: A survey on differential privacy for unstructured data content. ACM Comput. Surv. (CSUR) 54(10s), 1–28 (2022)CrossRef Zhao, Y., Chen, J.: A survey on differential privacy for unstructured data content. ACM Comput. Surv. (CSUR) 54(10s), 1–28 (2022)CrossRef
Metadata
Title
Research on key technologies of data security and privacy protection in Internet of Things group intelligence
Authors
Yadong Liu
Yahui Hua
Qingrong Chen
Publication date
01-01-2024
Publisher
Springer US
Published in
Optical and Quantum Electronics / Issue 1/2024
Print ISSN: 0306-8919
Electronic ISSN: 1572-817X
DOI
https://doi.org/10.1007/s11082-023-05691-y

Other articles of this Issue 1/2024

Optical and Quantum Electronics 1/2024 Go to the issue