OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city

Abstract IoT devices generate data over time, which is going to be shared with other parties to provide high-level services. Smart City is one of its applications which aims to manage cities automatically. Because of the large number of devices, three critical challenges come up: heterogeneity, privacy-preserving of generated data, and providing high-level services. The existing solutions can not even solve two of the mentioned challenges simultaneously. In this paper, we propose a three-module framework, named “Ontology-Based Privacy-Preserving” (OBPP) to address these issues. The first module includes an ontology, a data storage model, to address the heterogeneity issue while keeping the privacy information of IoT devices. The second one contains semantic reasoning rules to find abnormal patterns while addressing the quality of provided services. The third module provides a privacy rules manager to address the privacy-preserving challenges of IoT devices achieved by dynamically changing privacy behaviors of the devices. Extensive simulations on a synthetic smart city dataset demonstrate the superior performance of our approach compared to the existing solutions while providing affordability and robustness against information leakages. Thus, it can be widely applied to smart cities.

[1]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[2]  Tao Peng,et al.  A Multilevel Access Control Scheme for Data Security in Transparent Computing , 2017, Computing in Science & Engineering.

[3]  Md Zakirul Alam Bhuiyan,et al.  A Dual Privacy Preserving Scheme in Continuous Location-Based Services , 2018, IEEE Internet of Things Journal.

[4]  Ji Zhang,et al.  NSSSD: A new semantic hierarchical storage for sensor data , 2016, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[5]  Eva Blomqvist,et al.  An Ontology-based Context-aware System for Smart Homes: E-care@home , 2017, Sensors.

[6]  Derong Shen,et al.  Private Blocking Technique for Multi-party Privacy-Preserving Record Linkage , 2017, Data Science and Engineering.

[7]  Jing Wang,et al.  Automatic text summarization using fuzzy inference , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).

[8]  M. Hossein Ahmadzadegan,et al.  Security challenges in internet of things: survey , 2017, 2017 IEEE Conference on Wireless Sensors (ICWiSe).

[9]  Francesco Palmieri,et al.  Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes , 2018, Future Gener. Comput. Syst..

[10]  J. Fox Randomized Item Response Theory Models , 2005 .

[11]  Santosh Vempala,et al.  Randomized algorithms in numerical linear algebra , 2017, Acta Numerica.

[12]  Andreas Drexl,et al.  Facility location models for distribution system design , 2005, Eur. J. Oper. Res..

[13]  Osmanbey Uzunkol,et al.  Efficient and verifiable algorithms for secure outsourcing of cryptographic computations , 2015, International Journal of Information Security.

[14]  Augie Widyotriatmo,et al.  WiMAX-based energy efficient intrusion detection system , 2013, 2013 International Conference on Robotics, Biomimetics, Intelligent Computational Systems.

[15]  Kim-Kwang Raymond Choo,et al.  HEPart: A balanced hypergraph partitioning algorithm for big data applications , 2018, Future Gener. Comput. Syst..

[16]  Matthew W. Pennell,et al.  A simple approach for maximizing the overlap of phylogenetic and comparative data , 2015, bioRxiv.

[17]  Amit P. Sheth,et al.  The SSN ontology of the W3C semantic sensor network incubator group , 2012, J. Web Semant..

[18]  Mehdi Gheisari,et al.  Performance analysis of two sensor data storages , 2011 .

[19]  Pasi Tyrväinen,et al.  Towards enabling privacy preserving smart city apps , 2016, 2016 IEEE International Smart Cities Conference (ISC2).

[20]  David Sands,et al.  Sampling and partitioning for differential privacy , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[21]  M. Hossein Ahmadzadegan,et al.  Low-rate false alarm intrustion detection system with genetic algorithm approach , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).

[22]  Lule Ahmedi,et al.  C-SWRL: SWRL for Reasoning over Stream Data , 2017, 2017 IEEE 11th International Conference on Semantic Computing (ICSC).

[23]  Ali A. Ghorbani,et al.  A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.

[24]  M. Elmusrati,et al.  Hybrid security classification approach to attacks in WiMAX , 2013, 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC).

[25]  M. H. Ahmadzadegan,et al.  Technical Performance Simulation of IDS Within IEEE 802.16 , 2015, IEEE Latin America Transactions.

[26]  Henrik Eriksson,et al.  The evolution of Protégé: an environment for knowledge-based systems development , 2003, Int. J. Hum. Comput. Stud..

[27]  Dongqing Xie,et al.  Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges , 2017, IEEE Network.

[28]  Li Li,et al.  Intelligent fusion of information derived from received signal strength and inertial measurements for indoor wireless localization , 2016 .

[29]  Sherali Zeadally,et al.  Securing Internet of Things with Software Defined Networking , 2018, IEEE Communications Magazine.

[30]  Amit P. Sheth,et al.  Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems , 2018, IEEE Internet Computing.

[31]  Zakaria Bousalem,et al.  XMap: A Novel Approach to Store and Retrieve XML Document in Relational Databases , 2015, J. Softw..

[32]  Tapio Fabritius,et al.  A multi-purpose triangular framework for M2M communication security , 2014, 2014 World Congress on Computer Applications and Information Systems (WCCAIS).

[33]  Jin Wang,et al.  Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[34]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[35]  M. Hossein Ahmadzadegan,et al.  Challenges and security issues in cloud computing from two perspectives: Data security and privacy protection , 2015, 2015 2nd International Conference on Knowledge-Based Engineering and Innovation (KBEI).

[36]  Almudena Alcaide,et al.  Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..

[37]  Gautam Srivastava,et al.  ECA: An Edge Computing Architecture for Privacy-Preserving in IoT-Based Smart City , 2019, IEEE Access.

[38]  Guojun Wang,et al.  A Method for Privacy-Preserving in IoT-SDN Integration Environment , 2018, 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom).

[39]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[40]  Mianxiong Dong,et al.  Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes , 2017, Future Gener. Comput. Syst..

[41]  Rongxing Lu,et al.  Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[42]  S. Seuring,et al.  Challenges and opportunities of digital information at the intersection of Big Data Analytics and supply chain management , 2017 .

[43]  Kostas E. Psannis,et al.  Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey , 2017, Int. J. Netw. Manag..

[44]  Hossein Amini Deilami,et al.  Leach-Centric Load Sharing Between Cluster Nodes Based on Network Node Distribution , 2018, 2018 IEEE Conference on Wireless Sensors (ICWiSe).

[45]  Klaus Wehrle,et al.  A comprehensive approach to privacy in the cloud-based Internet of Things , 2016, Future Gener. Comput. Syst..

[46]  Wei Zhang,et al.  MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT , 2017, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC).

[48]  Luigi Logrippo,et al.  Platform for privacy preferences (P3P): Current status and future directions , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.

[49]  Subhas Mukhopadhyay,et al.  WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings , 2015, Sensors.

[50]  Jie Wu,et al.  Effective Query Grouping Strategy in Clouds , 2017, Journal of Computer Science and Technology.

[51]  Guojun Wang,et al.  A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking , 2019, Comput. Secur..

[52]  Jie Wu,et al.  Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..