Abstract
Aim: To study the key technology of privacy protection and data security in the Internet
of Things group intelligence perception, a cryptographic-based technology was proposed.
Background: First, the background of group intelligence perception and three existing problems
were briefly introduced, and the inherent contradictions among the three problems, which led to
some challenges in this study, were reported.
Objective: A network model, a security model, and design goals were constructed, and a solution
based on cryptography-related technology was proposed.
Methods: The security and cost complexity of the proposed solution was theoretically analysed. The
calculation cost of mobile phone measurement verified the practical feasibility of the scheme.
Results: When ɛ was considerably small, both false positive (FP) and false negative (FN) were
small (close to 0). With an increase in ɛ, the FP rate increased, and the FN rate became 0. When ɛ =
0.5, the FP rate was only 0.1, and the equivalent FN rate was 0 after the user completed 50 tasks.
The trust model used was highly accurate.
Conclusion: This study has great significance in promoting safe and reliable application development
to ensure the genuineness and trustworthiness of data in the aggregation of intermediate data
and back-end data services.
Keywords:
Internet of things, group intelligence perception, cloud computing, privacy protection, data reliability, false positive.
[6]
L.Q. Song, P. Jiang, Q.M. Wang, and L. Yang, "Research on key technologies for installation and maintenance of reflector of fast", Res. Astron. Astrophys., vol. 20, no. 05, pp. 43-48, 2020.
[9]
Y. Yuan, Y. Zhang, and H. Ding, "Research on key technology of industrial artificial intelligence and its application in predictive maintenance", Zidonghua Xuebao/Acta Automatica Sinica. vol. 46, no. 10, pp. 2013-2030, 2020.
[19]
D. Hansaraj, S. Wankhede, N.V. Gowri, and P. Sharma, "An internet of things for prevention of security attack on cloud medical data using artifical intelligence", Int. J. Grid Distrib. Comput., vol. 14, no. 1, pp. 1143-1161, 2021.
[25]
G.K. Durbhak, and B. Selvaraj, "Convergence of artificial intelligence and internet of things in predictive maintenance systems – a review", Turkish J. Comput. Math. Educ., vol. 12, no. 11, pp. 205-214, 2021.
[27]
J. Bhola, S. Soni, and G.K. Cheema, "Recent trends for security applications in wireless sensor networks – A technical review,", In 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), 13-15 Mar, 2019, New Delhi, India, pp. 707-712, 2019.
[28]
T. Alsboui, Y. Qin, H. Richard, and H. Al-Aqrabi, "Distributed intelligence in the internet of things: Challenges and opportunities", SN Comput. Sci., vol. 2, no. 4, p. 277, 2021.
[30]
S. Afzal, A. Faisal, I. Siddique, and M. Afzal, "Internet of Things (IoT) security: Issues, challenges and solutions", Int. J. Sci. Eng. Res., vol. 12, no. 6, p. 52, 2021.
[31]
Y. Gahi, I. El Alaoui, and M. Guennoun, "An End to End Cloud Computing Privacy Framework Using Blind Processing", Research Anthology on Privatizing and Securing Data. IGI Global, pp. 406-427, 2021.