A Hybrid Approach With Gan and Dp for Privacy Preservation of Iiot Data

Loading...
Thumbnail Image

Date

2023

Authors

Hindistan, Yavuz Selim
Yetkin, E. Fatih

Journal Title

Journal ISSN

Volume Title

Publisher

IEEE-Inst Electrical Electronics Engineers Inc

Open Access Color

GOLD

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Top 10%
Influence
Average
Popularity
Top 10%

Research Projects

Journal Issue

Abstract

There are emerging trends to use the Industrial Internet of Things (IIoT) in manufacturing and related industries. Machine Learning (ML) techniques are widely used to interpret the collected IoT data for improving the company's operational excellence and predictive maintenance. In general, ML applications require high computational resource allocation and expertise. Manufacturing companies usually transfer their IIoT data to an ML-enabled third party or a cloud system. ML applications need decrypted data to perform ML tasks efficiently. Therefore, the third parties may have unacceptable access rights during the data processing to the content of IIoT data that contains a portrait of the production process. IIoT data may include hidden sensitive features, creating information leakage for the companies. All these concerns prevent companies from sharing their IIoT data with third parties. This paper proposes a novel method based on the hybrid usage of Generative Adversarial Networks (GAN) and Differential Privacy (DP) to preserve sensitive data in IIoT operations. We aim to sustain IIoT data privacy with minimal accuracy loss without adding high additional computational costs to the overall data processing scheme. We demonstrate the efficiency of our approach with publicly available data sets and a realistic IIoT data set collected from a confectionery production process. We employed well-known privacy six assessment metrics from the literature and measured the efficiency of the proposed technique. We showed, with the help of experiments, that the proposed method preserves the privacy of the data while keeping the Linear Regression (LR) algorithms stable in terms of the R-Squared accuracy metric. The model also ensures privacy protection for hidden sensitive data. In this way, the method prevents the production of hidden sensitive data from the sub-feature sets.

Description

Keywords

Industrial Internet of Things, Data privacy, Cloud computing, Production, Privacy, Data models, Security, Generative adversarial networks, differential privacy, generative adversarial networks, IIoT, privacy metrics, Generative adversarial networks, Data models, Production, TK1-9971, Industrial Internet of Things, Privacy, differential privacy, privacy metrics, Security, Cloud computing, IIoT, Electrical engineering. Electronics. Nuclear engineering, generative adversarial networks, Data privacy

Turkish CoHE Thesis Center URL

Fields of Science

02 engineering and technology, 0202 electrical engineering, electronic engineering, information engineering

Citation

WoS Q

Q2

Scopus Q

Q1
OpenCitations Logo
OpenCitations Citation Count
13

Source

Ieee Access

Volume

11

Issue

Start Page

5837

End Page

5849
PlumX Metrics
Citations

CrossRef : 8

Scopus : 31

Captures

Mendeley Readers : 47

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
7.91872952

Sustainable Development Goals

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

13

CLIMATE ACTION
CLIMATE ACTION Logo

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo