Privacy protection framework for face recognition in edge-based Internet of Things
-
Published:2022-11-17
Issue:
Volume:
Page:
-
ISSN:1386-7857
-
Container-title:Cluster Computing
-
language:en
-
Short-container-title:Cluster Comput
Author:
Xie YunORCID, Li Peng, Nedjah Nadia, Gupta Brij B., Taniar David, Zhang Jindan
Abstract
AbstractEdge computing (EC) gets the Internet of Things (IoT)-based face recognition systems out of trouble caused by limited storage and computing resources of local or mobile terminals. However, data privacy leak remains a concerning problem. Previous studies only focused on some stages of face data processing, while this study focuses on the privacy protection of face data throughout its entire life cycle. Therefore, we propose a general privacy protection framework for edge-based face recognition (EFR) systems. To protect the privacy of face images and training models transmitted between edges and the remote cloud, we design a local differential privacy (LDP) algorithm based on the proportion difference of feature information. In addition, we also introduced identity authentication and hash technology to ensure the legitimacy of the terminal device and the integrity of the face image in the data acquisition phase. Theoretical analysis proves the rationality and feasibility of the scheme. Compared with the non-privacy protection situation and the equal privacy budget allocation method, our method achieves the best balance between availability and privacy protection in the numerical experiment.
Funder
Six Talent Peaks Project in Jiangsu Province Graduate Research and Innovation Projects of Jiangsu Province Natural Science Research Project in Colleges and Universities of Jiangsu Province the National Natural Science Foundation of P. R. China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference40 articles.
1. Ren, P., Xiao, Y., Chang, X., Huang, P.-Y., Li, Z., Chen, X., Wang, X.: A comprehensive survey of neural architecture search: challenges and solutions. ACM Comput. Surv. 54(4), 1–34 (2021) 2. Fan, T., Xu, J.: Image classification of crop diseases and pests based on deep learning and fuzzy system. Int. J. Data Wareh. Min. 16(2), 34–47 (2020) 3. Ali, M.U., Ahmed, S., Ferzund, J., Mehmood, A., Rehman, A.: Using PCA and factor analysis for dimensionality reduction of bio-informatics data. Int. J. Adv. Comput. Sci. Appl. 08(5), 415–426 (2017) 4. Alsmirat, M.A., Al-Alem, F., Al-Ayyoub, M., Jararweh, Y., Gupta, B.: Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed. Tools Appl. 78(3), 3649–3688 (2019) 5. Mousavi, M., Rezazadeh, J., Sianaki, O.A.: Machine learning applications for fog computing in IoT: a survey. Int. J. Web Grid Serv. 17(4), 293–320 (2021)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Quaternion-based 2D-DOST and stacked principal component analysis network for multimodal face recognition;Applied Soft Computing;2024-11 2. Ethical AI Development and Deployment;Advances in Computational Intelligence and Robotics;2024-08-30 3. Privacy-Preserving Techniques and User Anonymity in the Metaverse;Advances in Information Security, Privacy, and Ethics;2024-08-21 4. Foundations of Cybersecurity;Advances in Information Security, Privacy, and Ethics;2024-08-21 5. Delving Into the Metaverse;Advances in Information Security, Privacy, and Ethics;2024-08-21
|
|