{"title":"Equipment failure data trends focused privacy preserving scheme for Machine-as-a-Service","authors":"Zhengjun Jing , Yongkang Zhu , Quanyu Zhao , Yuanjian Zhou , Chunsheng Gu , Weizhi Meng","doi":"10.1016/j.jisa.2025.104000","DOIUrl":null,"url":null,"abstract":"<div><div>In the Machine-as-a-Service (MaaS) model, enterprises lease equipment from original equipment manufacturer (OEM) to reduce production costs, and share equipment failure data to assist OEM improve equipment quality. However, The failure data trends formed by the frequency of multi-type failure may reveal private information about the enterprises. Most previous studies did not consider the issue of privacy leakage through failure data trends. Therefore, we propose an equipment failure data trends focused privacy preserving scheme for MaaS to prevent the leakage of enterprise privacy data trends. Firstly, our scheme safeguards the multi-dimensional data privacy of equipment through local differential privacy. Secondly, the differential privacy mechanism is integrated into the blockchain to build a fine-grained privacy-preserving categorical query algorithm for enterprise privacy, which decouples the correlation between failure data trends and enterprise privacy. Finally, theoretical analysis proves the privacy preservation capabilities of our scheme. The experimental analysis confirms that our scheme effectively protects data trends privacy, and the results indicate that our scheme has lower computational and time expenditures compared to similar schemes.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 104000"},"PeriodicalIF":3.8000,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000389","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In the Machine-as-a-Service (MaaS) model, enterprises lease equipment from original equipment manufacturer (OEM) to reduce production costs, and share equipment failure data to assist OEM improve equipment quality. However, The failure data trends formed by the frequency of multi-type failure may reveal private information about the enterprises. Most previous studies did not consider the issue of privacy leakage through failure data trends. Therefore, we propose an equipment failure data trends focused privacy preserving scheme for MaaS to prevent the leakage of enterprise privacy data trends. Firstly, our scheme safeguards the multi-dimensional data privacy of equipment through local differential privacy. Secondly, the differential privacy mechanism is integrated into the blockchain to build a fine-grained privacy-preserving categorical query algorithm for enterprise privacy, which decouples the correlation between failure data trends and enterprise privacy. Finally, theoretical analysis proves the privacy preservation capabilities of our scheme. The experimental analysis confirms that our scheme effectively protects data trends privacy, and the results indicate that our scheme has lower computational and time expenditures compared to similar schemes.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.