Optimized and federated soft-impute for privacy-preserving tensor completion in cyber-physical-social systems

被引:6
|
作者
Yang, Jia [1 ,2 ]
Fu, Cai [1 ,2 ]
Lu, Hongwei [1 ,2 ]
机构
[1] Huazhong Univ Sci & Technol, Cyber Sci & Engn Sch, Luoyu Rd 1037, Wuhan, Hubei, Peoples R China
[2] Hubei Engn Res Ctr Big Data Secur, Luoyu Rd 1037, Wuhan, Hubei, Peoples R China
关键词
Tensor completion; Differential privacy; Federated learning; Optimized soft-impute; Cyber-physical-social systems; DECOMPOSITION; MODEL;
D O I
10.1016/j.ins.2021.02.028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, an increasing amount of computing resources is distributed in social spaces. Each smart device or individual computing terminal in physical spaces is connected to cyber spaces, and they also have a relationship in social spaces. Cyber-physical-social systems (CPSSs) integrate physical space, cyber space, and social space. CPSSs need to process largescale multi-source data, which are used to recommend, predict, cluster, etc. In a CPSS, data are distributed in different locations, where each local part preserves their own data. For example, many individual medical research groups have their own health disorders data held in a smart healthcare system. A credible personalized privacy model in a CPSS mainly contains a user privacy framework, which aims to achieve the balance among service usability, user manage usability, and privacy protection [47]. Tensors are widely and effectively used for big data analysis in a CPSS [43]. Tensor decomposition and tensor completion Cyber-physical-social systems (CPSSs) handle large-scale multi-source data in different application areas, and the collected data usually contain personal private information and uncompleted information, which are typically distributed in different locations. Tensor completion has been widely used for recovering the missing entries in scale multidimensional data, and has proven to be an effective method. Privacy-preserving tensor completion in CPSSs, however, faces challenging issues, such as scalability, scatter, and security. In this paper, we propose a privacy-preserving tensor completion method that uses the optimized federated soft-impute algorithm with a differentially private guarantee. Moreover, we theoretically analyzed the privacy guarantee and utility guarantee. We evaluated the proposed algorithms on both synthetic data and real-world data. The results show that our algorithm performed better and provided strong privacy protection under a federated learning framework. Our method significantly saved space and time for privacy-preserving tensor completion in a CPSS. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:103 / 123
页数:21
相关论文
共 42 条
  • [21] Privacy-Preserving Platooning Control of Vehicular Cyber-Physical Systems With Saturated Inputs
    Pan, Dengfeng
    Ding, Derui
    Ge, Xiaohua
    Han, Qing-Long
    Zhang, Xian-Ming
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (04): : 2083 - 2097
  • [22] A Framework for Privacy-Preserving Data Publishing with Enhanced Utility for Cyber-Physical Systems
    Sangogboye, Fisayo Caleb
    Jia, Ruoxi
    Hong, Tianzhen
    Spanos, Costas
    Kjaergaard, Mikkel Baun
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2018, 14 (3-4)
  • [23] Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems
    Zhou, Yian
    Mo, Zhen
    Xiao, Qingjun
    Chen, Shigang
    Yin, Yafeng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (05) : 3749 - 3759
  • [24] Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems
    Keshk, Marwa
    Turnbull, Benjamin
    Sitnikova, Elena
    Vatsalan, Dinusha
    Moustafa, Nour
    IEEE ACCESS, 2021, 9 : 55077 - 55097
  • [25] 2D Federated Learning for Personalized Human Activity Recognition in Cyber-Physical-Social Systems
    Zhou, Xiaokang
    Liang, Wei
    Ma, Jianhua
    Yan, Zheng
    Wang, Kevin I-Kai
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (06): : 3934 - 3944
  • [26] Privacy-preserving ledger for blockchain and Internet of Things-enabled cyber-physical systems
    Singh, Rajani
    Dwivedi, Ashutosh Dhar
    Mukkamala, Raghava Rao
    Alnumay, Waleed S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 103
  • [27] Privacy-Preserving Estimation of k-Persistent Traffic in Vehicular Cyber-Physical Systems
    Sun, Yu-E
    Huang, He
    Chen, Shigang
    Zhou, You
    Han, Kai
    Yang, Wenjian
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8296 - 8309
  • [28] Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems
    Keshk, Marwa
    Moustafa, Nour
    Sitnikova, Elena
    Turnbull, Benjamin
    Vatsalan, Dinusha
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 711 - 717
  • [29] A tensor-network-based big data fusion framework for Cyber-Physical-Social Systems (CPSS)
    Zhang, Shunli
    Yang, Laurence T.
    Feng, Jun
    Wei, Wei
    Cui, Zongmin
    Xie, Xia
    Yan, Peng
    INFORMATION FUSION, 2021, 76 : 337 - 354
  • [30] Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security
    Moulahi, Tarek
    Jabbar, Rateb
    Alabdulatif, Abdulatif
    Abbas, Sidra
    El Khediri, Salim
    Zidi, Salah
    Rizwan, Muhammad
    EXPERT SYSTEMS, 2023, 40 (05)