Jing Yu , Yan Xiao , Lianhua Chi , Shunli Zhang , Zongmin Cui
{"title":"Tensor-based ranking-hiding privacy-preserving scheme for cloud-fog-edge cooperative cyber–physical-social systems","authors":"Jing Yu , Yan Xiao , Lianhua Chi , Shunli Zhang , Zongmin Cui","doi":"10.1016/j.jnca.2025.104167","DOIUrl":null,"url":null,"abstract":"<div><div>Users living in Cyber-Physical-Social Systems (CPSS) generate massive amounts of data every day. The CPSS data may imply some reliable rules that can help CPSS better provide highly reliable services to humans. Nevertheless, the high-level reliable rules are very difficult to be mined and formalized. Therefore, we propose a Cloud-Fog-Edge Cooperative Reliable CPSS (CFECRC) framework for possibly adding reliable rules into CPSS. Ranked data is an important type of data in CPSS. How to design a secure, accurate and efficient ranking-hiding privacy-preserving scheme is a key challenge in CFECRC framework. However, existing privacy-preserving methods still have various shortcomings in the trade-off among privacy-preserving, analytic accuracy, and computational efficiency for ranking-hiding. To address the shortcomings, we propose a Tensor-based Ranking-Hiding Privacy-Preserving scheme (TRHPP) for CFECRC framework. First, we construct a set of 5th-order tensors to synthetically model item, user, location, time and weather as a whole to enhance analytic accuracy. Second, we obfuscate CPSS data and hide data ranking based on the obfuscated data to strengthen privacy-preserving and decrease computational overhead. The experimental results show that our scheme significantly outperforms existing classical schemes in privacy-preserving, analytic accuracy and computational efficiency simultaneously. This further verifies the feasibility of our framework.</div></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"238 ","pages":"Article 104167"},"PeriodicalIF":7.7000,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Network and Computer Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1084804525000645","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
Users living in Cyber-Physical-Social Systems (CPSS) generate massive amounts of data every day. The CPSS data may imply some reliable rules that can help CPSS better provide highly reliable services to humans. Nevertheless, the high-level reliable rules are very difficult to be mined and formalized. Therefore, we propose a Cloud-Fog-Edge Cooperative Reliable CPSS (CFECRC) framework for possibly adding reliable rules into CPSS. Ranked data is an important type of data in CPSS. How to design a secure, accurate and efficient ranking-hiding privacy-preserving scheme is a key challenge in CFECRC framework. However, existing privacy-preserving methods still have various shortcomings in the trade-off among privacy-preserving, analytic accuracy, and computational efficiency for ranking-hiding. To address the shortcomings, we propose a Tensor-based Ranking-Hiding Privacy-Preserving scheme (TRHPP) for CFECRC framework. First, we construct a set of 5th-order tensors to synthetically model item, user, location, time and weather as a whole to enhance analytic accuracy. Second, we obfuscate CPSS data and hide data ranking based on the obfuscated data to strengthen privacy-preserving and decrease computational overhead. The experimental results show that our scheme significantly outperforms existing classical schemes in privacy-preserving, analytic accuracy and computational efficiency simultaneously. This further verifies the feasibility of our framework.
期刊介绍:
The Journal of Network and Computer Applications welcomes research contributions, surveys, and notes in all areas relating to computer networks and applications thereof. Sample topics include new design techniques, interesting or novel applications, components or standards; computer networks with tools such as WWW; emerging standards for internet protocols; Wireless networks; Mobile Computing; emerging computing models such as cloud computing, grid computing; applications of networked systems for remote collaboration and telemedicine, etc. The journal is abstracted and indexed in Scopus, Engineering Index, Web of Science, Science Citation Index Expanded and INSPEC.