Optimized and federated soft-impute for privacy-preserving tensor completion in cyber-physical-social systems

被引:6
|
作者
Yang, Jia [1 ,2 ]
Fu, Cai [1 ,2 ]
Lu, Hongwei [1 ,2 ]
机构
[1] Huazhong Univ Sci & Technol, Cyber Sci & Engn Sch, Luoyu Rd 1037, Wuhan, Hubei, Peoples R China
[2] Hubei Engn Res Ctr Big Data Secur, Luoyu Rd 1037, Wuhan, Hubei, Peoples R China
关键词
Tensor completion; Differential privacy; Federated learning; Optimized soft-impute; Cyber-physical-social systems; DECOMPOSITION; MODEL;
D O I
10.1016/j.ins.2021.02.028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, an increasing amount of computing resources is distributed in social spaces. Each smart device or individual computing terminal in physical spaces is connected to cyber spaces, and they also have a relationship in social spaces. Cyber-physical-social systems (CPSSs) integrate physical space, cyber space, and social space. CPSSs need to process largescale multi-source data, which are used to recommend, predict, cluster, etc. In a CPSS, data are distributed in different locations, where each local part preserves their own data. For example, many individual medical research groups have their own health disorders data held in a smart healthcare system. A credible personalized privacy model in a CPSS mainly contains a user privacy framework, which aims to achieve the balance among service usability, user manage usability, and privacy protection [47]. Tensors are widely and effectively used for big data analysis in a CPSS [43]. Tensor decomposition and tensor completion Cyber-physical-social systems (CPSSs) handle large-scale multi-source data in different application areas, and the collected data usually contain personal private information and uncompleted information, which are typically distributed in different locations. Tensor completion has been widely used for recovering the missing entries in scale multidimensional data, and has proven to be an effective method. Privacy-preserving tensor completion in CPSSs, however, faces challenging issues, such as scalability, scatter, and security. In this paper, we propose a privacy-preserving tensor completion method that uses the optimized federated soft-impute algorithm with a differentially private guarantee. Moreover, we theoretically analyzed the privacy guarantee and utility guarantee. We evaluated the proposed algorithms on both synthetic data and real-world data. The results show that our algorithm performed better and provided strong privacy protection under a federated learning framework. Our method significantly saved space and time for privacy-preserving tensor completion in a CPSS. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:103 / 123
页数:21
相关论文
共 42 条
  • [1] Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives
    Zhao, Yaliang
    Tarus, Samwel K.
    Yang, Laurence T.
    Sun, Jiayu
    Ge, Yunfei
    Wang, Jinke
    INFORMATION SCIENCES, 2020, 515 : 132 - 155
  • [2] Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives
    Feng, Jun
    Yang, Laurence T.
    Gati, Nicholaus J.
    Xie, Xia
    Gavuna, Benard S.
    INFORMATION SCIENCES, 2020, 527 : 341 - 355
  • [3] Tensor-based ranking-hiding privacy-preserving scheme for cloud-fog-edge cooperative cyber-physical-social systems
    Yu, Jing
    Xiao, Yan
    Chi, Lianhua
    Zhang, Shunli
    Cui, Zongmin
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 238
  • [4] Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems
    Yang, Laurence T.
    Zhao, Ruonan
    Liu, Debin
    Lu, Wanli
    Deng, Xianjun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (03): : 1909 - 1940
  • [5] Accelerating privacy-preserving momentum federated learning for industrial cyber-physical systems
    Zhang, Linlin
    Zhang, Zehui
    Guan, Cong
    COMPLEX & INTELLIGENT SYSTEMS, 2021, 7 (06) : 3289 - 3301
  • [6] Accelerating privacy-preserving momentum federated learning for industrial cyber-physical systems
    Linlin Zhang
    Zehui Zhang
    Cong Guan
    Complex & Intelligent Systems, 2021, 7 : 3289 - 3301
  • [7] Privacy-preserving Data Aggregation Computing in Cyber-Physical Social Systems
    Yu, Jiahui
    Wang, Kun
    Zeng, Deze
    Zhu, Chunsheng
    Guo, Song
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2019, 3 (01)
  • [8] Cyber-Physical-Social Aware Privacy Preserving in Location-Based Service
    Zhu, Konglin
    Yan, Wenke
    Zhao, Wenqi
    Chen, Liyang
    Zhang, Lin
    Oki, Eiji
    IEEE ACCESS, 2018, 6 : 54167 - 54176
  • [9] Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems
    Mahmud, Syeda Aunanya
    Islam, Nazmul
    Islam, Zahidul
    Rahman, Ziaur
    Mehedi, Sk. Tanzir
    MATHEMATICS, 2024, 12 (20)
  • [10] Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries
    Ramasubramanian, Bhaskar
    Niu, Luyao
    Clark, Andrew
    Bushnell, Linda
    Poovendran, Radha
    2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 3785 - 3792