EfficientNet B7 Convolutional Neural Network-Based Security and Privacy Preserving Method for Social IOT Environments
International Journal of Electronics and Communication Engineering |
© 2024 by SSRG - IJECE Journal |
Volume 11 Issue 8 |
Year of Publication : 2024 |
Authors : C. Maniveena, R. Kalaiselvi |
How to Cite?
C. Maniveena, R. Kalaiselvi, "EfficientNet B7 Convolutional Neural Network-Based Security and Privacy Preserving Method for Social IOT Environments," SSRG International Journal of Electronics and Communication Engineering, vol. 11, no. 8, pp. 22-30, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I8P103
Abstract:
This year, one of the most widely used technical frameworks lacks a specific Internet of Things (IoT). Focusing on communication reliability and dependability on IPv6 standards and internet communication technology, the EfficientNet b7 Social IoT network satisfies care and adaptability needs. Despite the high-quality photographs this effort produced, there was some loss during the system's training, which takes time. This work suggested using evolution deep learning to generate EfficientNet b7 feature frameworks for text classification tasks automatically. The proposed approach is tested in the context of an EfficientNet b7-based language similarity analysis model to see if it works. While character-level EfficientNet b7 algorithms have not received much attention for text classification problems, the EfficientNet b7 structures proposed in this research have demonstrated exceptional performance in data classification tasks. A great deal of testing has shown that they are more resilient to disruptions and that they can impact numerous organizations that implement language and information usage policies regarding user privacy protection, framework implications, and legal requirements.
Keywords:
Privacy preserving, EfficientNet b7, Internet of Things, Security, Convolution Neural Network.
References:
[1] Bao Le Nguyen et al., “Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data,” Computers, Materials & Continua, vol. 65, no. 1, pp. 87-107, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Rafik Hamza et al., “A Privacy-Preserving Cryptosystem for IoT E-Healthcare,” Information Sciences, vol. 527, pp. 493-510, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Prabhat Kumar et al., “PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 3, pp. 2326-2341, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Xu Zheng, and Zhipeng Cai, “Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 5, pp. 968-979, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Hua Deng et al., “A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT,” IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11601-11611, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Mehdi Gheisari et al., “OBPP: An Ontology-Based Framework for Privacy-Preserving in IoT-Based Smart City,” Future Generation Computer Systems, vol. 123, pp. 1-13, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Yi Sun et al., “PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare”, IEEE Transactions on Industrial Informatics, vol. 18, no. 3, pp. 1981-1990, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Lei Cui et al., “Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures,” IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 3492-3500, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Omar A. Alzubi et al., “Blockchain and Artificial Intelligence Enabled Privacy‐Preserving Medical Data Transmission in Internet of Things,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 12, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Huiying Xu et al., “Privacy-Preserving Incentive Mechanism for Multi-Leader Multi-Follower IoT-Edge Computing Market: A Reinforcement Learning Approach,” Journal of Systems Architecture, vol. 114, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Awais Abdul Khaliq et al., “A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential Privacy,” IEEE Access, vol. 10, pp. 56410-56426, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Zhangyi Shen et al., “A Privacy-Preserving Social Computing Framework for Health Management Using Federated Learning,” IEEE Transactions on Computational Social Systems, vol. 10, no. 4, pp. 1666-1678, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Yizhou Shen et al., “Evolutionary Privacy-Preserving Learning Strategies for Edge-Based IoT Data Sharing Schemes,” Digital Communications and Networks, vol. 9, no. 4, pp. 906-919, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Nahla El-Haggar et al., “The Effectiveness and Privacy Preservation of IoT on Ubiquitous Learning: Modern Learning Paradigm to Enhance Higher Education,” Applied Sciences, vol. 13, no. 15, pp. 1-21, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Mohit Kumar et al., “A Smart Privacy Preserving Framework for Industrial IoT Using Hybrid Meta-Heuristic Algorithm,” Scientific Reports, vol. 13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] P. Satyanarayana et al., “Comparative Analysis of New Meta-Heuristic-Variants for Privacy Preservation in Wireless Mobile Adhoc Networks for IoT Applications,” Computer Communications, vol. 198, pp. 262-281, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Ashutosh Kumar Singh, and Jatinder Kumar, “A Secure and Privacy-Preserving Data Aggregation and Classification Model for Smart Grid,” Multimedia Tools and Applications, vol. 82, no. 15, pp. 22997-23015, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Prashant Kumar Shukla et al., “Effective Privacy Preserving Model Based on Adversarial CNN with IBOA in the Social IoT Systems for CEC,” International Journal of Communication Systems, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Kavitha Guda, K. Kavitha, and B. Sujatha, “A Hybrid Multi-Client Filter Based Feature Clustering and Privacy Preserving Classification Framework on High Dimensional Databases,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 8s, pp. 93-107, 2024.
[CrossRef] [Publisher Link]
[20] G. Sathish Kumar et al., “Differential Privacy Scheme Using Laplace Mechanism and Statistical Method Computation in Deep Neural Network for Privacy Preservation,” Engineering Applications of Artificial Intelligence, vol. 128, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] B. K. Tripathy, Deboleena Dutta, and Chido Tazivazvino, On the Research and Development of Social Internet of Things, Internet of Things (IoT) in 5G Mobile Technologies, Springer, Cham, pp. 153-173, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Antonio M. Ortiz et al., “The Cluster Between Internet of Things and Social Networks: Review and Research Challenges,” IEEE Internet of Things Journal, vol. 1, no. 3, pp. 206-215, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Jieun Kim, Xiangmin Fan, and Daniel Mossé, “Empowering End Users for Social Internet of Things,” IoTDI '17: Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 71-82, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Luigi Atzori, Antonio Iera, and Giacomo Morabito, “SIot: Giving a Social Structure to the Internet of Things,” IEEE Communications Letters, vol. 15, no. 11, 1193-1195, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Nancy Gulati, and Pankaj Deep Kaur, “When Things Become Friends: A Semantic Perspective on the Social Internet of Things,” Proceedings of ICSICCS 2017 Smart Innovations in Communication and Computational Sciences, Singapore, vol. 2, pp. 149-159, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Nancy Gulati, and Pankaj Deep Kaur, “Towards Socially Enabled Internet of Industrial Things: Architecture, Semantic Model and Relationship Management”, Ad Hoc Networks, vol. 91, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Orfefs Voutyras et al., “An Architecture Supporting Knowledge Flow in Social Internet of Things Systems,” 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 100-105, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Jens Groth, “On the Size of Pairing-Based Non-Interactive Arguments,” Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, pp. 305-326, 2016.
[CrossRef] [Google Scholar] [Publisher Link]