Optimized and federated soft-impute for privacy-preserving tensor completion in cyber-physical-social systems

被引:6
|
作者
Yang, Jia [1 ,2 ]
Fu, Cai [1 ,2 ]
Lu, Hongwei [1 ,2 ]
机构
[1] Huazhong Univ Sci & Technol, Cyber Sci & Engn Sch, Luoyu Rd 1037, Wuhan, Hubei, Peoples R China
[2] Hubei Engn Res Ctr Big Data Secur, Luoyu Rd 1037, Wuhan, Hubei, Peoples R China
关键词
Tensor completion; Differential privacy; Federated learning; Optimized soft-impute; Cyber-physical-social systems; DECOMPOSITION; MODEL;
D O I
10.1016/j.ins.2021.02.028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, an increasing amount of computing resources is distributed in social spaces. Each smart device or individual computing terminal in physical spaces is connected to cyber spaces, and they also have a relationship in social spaces. Cyber-physical-social systems (CPSSs) integrate physical space, cyber space, and social space. CPSSs need to process largescale multi-source data, which are used to recommend, predict, cluster, etc. In a CPSS, data are distributed in different locations, where each local part preserves their own data. For example, many individual medical research groups have their own health disorders data held in a smart healthcare system. A credible personalized privacy model in a CPSS mainly contains a user privacy framework, which aims to achieve the balance among service usability, user manage usability, and privacy protection [47]. Tensors are widely and effectively used for big data analysis in a CPSS [43]. Tensor decomposition and tensor completion Cyber-physical-social systems (CPSSs) handle large-scale multi-source data in different application areas, and the collected data usually contain personal private information and uncompleted information, which are typically distributed in different locations. Tensor completion has been widely used for recovering the missing entries in scale multidimensional data, and has proven to be an effective method. Privacy-preserving tensor completion in CPSSs, however, faces challenging issues, such as scalability, scatter, and security. In this paper, we propose a privacy-preserving tensor completion method that uses the optimized federated soft-impute algorithm with a differentially private guarantee. Moreover, we theoretically analyzed the privacy guarantee and utility guarantee. We evaluated the proposed algorithms on both synthetic data and real-world data. The results show that our algorithm performed better and provided strong privacy protection under a federated learning framework. Our method significantly saved space and time for privacy-preserving tensor completion in a CPSS. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:103 / 123
页数:21
相关论文
共 42 条
  • [31] Lightweight privacy-preserving authentication mechanism in 5G-enabled industrial cyber physical systems
    Xiang, Xinyin
    Cao, Jin
    Fan, Weiguo
    Information Sciences, 2024, 666
  • [32] Lightweight privacy-preserving authentication mechanism in 5G-enabled industrial cyber physical systems
    Xiang, Xinyin
    Cao, Jin
    Fan, Weiguo
    INFORMATION SCIENCES, 2024, 666
  • [33] Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems
    Chi, Po-Wen
    Wang, Ming-Hung
    SENSORS, 2019, 19 (24)
  • [34] A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical Systems
    Liu, Hanxiao
    Zou, Jiaying
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) : 1221 - 1225
  • [35] Blockchain-enabled Tensor-based Conditional Deep Convolutional GAN for Cyber-physical-Social Systems
    Feng, Jun
    Yang, Laurence T.
    Zhu, Yuxiang
    Gati, Nicholaus J.
    Mo, Yijun
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (02)
  • [36] Efficient Vanilla Split Learning for Privacy-Preserving Collaboration in Resource-Constrained Cyber-Physical Systems
    Azeri, Nabila
    Hioual, Ouided
    Hioual, Ouassila
    Informatica (Slovenia), 2024, 48 (11): : 167 - 180
  • [37] An Efficient Privacy-Preserving Authenticated Key Establishment Protocol for Health Monitoring in Industrial Cyber-Physical Systems
    Shamshad, Salman
    Mahmood, Khalid
    Hussain, Shafiq
    Garg, Sahil
    Das, Ashok Kumar
    Kumar, Neeraj
    Rodrigues, Joel J. P. C.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07) : 5142 - 5149
  • [38] A Privacy-Preserving Distributed Contextual Federated Online Learning Framework with Big Data Support in Social Recommender Systems
    Zhou, Pan
    Wang, Kehao
    Guo, Linke
    Gong, Shimin
    Zheng, Bolong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (03) : 824 - 838
  • [39] Tensor Train-Based Multiple Clusterings for Big Data in Cyber-Physical-Social Systems and Its Efficient Implementations
    Zhao, Yaliang
    Yang, Laurence T.
    Zhang, Yiwen
    Sun, Jiayu
    Wang, Xiaojing
    Zhang, Chunchun
    Zhang, Guangming
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (06): : 3896 - 3908
  • [40] SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems
    Lai, Chengzhe
    Lu, Rongxing
    Zheng, Dong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3854 - 3867