{"title":"Privacy-Preserving Learning Model Using Lightweight Encryption for Visual Sensing Industrial IoT Devices","authors":"B D Deebak;Seong Oun Hwang","doi":"10.1109/TETCI.2024.3523771","DOIUrl":null,"url":null,"abstract":"Technological convergence in visual sensing with industrial IoT (VSI-IoT) can bring numerous advances to large-scale crowd management systems like visual crowdsensing. VSI-IoT has significant features, including sensing, computing, analyzing, and storing, to address the issues of bearing failures, such as unplanned outages, increased downtime, and reduced operational efficiency. By contrast, providing privacy to the IIoT environments is a challenging task. Thus, this paper presents a novel privacy-preserving learning (PPL) mechanism that senses the defect rate of bearing failures using lightweight model aggregation at edge computing systems to preserve the privacy features. This convergence model synthesizes shape features comprehensively to transform the feature vectors into predictive functions that examine the categorization models using a two-dimensional convolution neural network (2D-CNN). Using security analysis, we demonstrate that the proposed PPL can achieve better privacy protection and model accuracy to preserve the learning features without additional verifiability. Further, the examination results showed that the proposed 2D-CNN with BN and LN consumed less computation complexity to achieve better detection accuracy <inline-formula><tex-math>$(\\approx 87.91.9\\%$</tex-math></inline-formula> to <inline-formula><tex-math>$\\approx 99.98\\%)$</tex-math></inline-formula> and communication cost <inline-formula><tex-math>$ (\\approx 21.09MB$</tex-math></inline-formula> to <inline-formula><tex-math>$ 23.92MB)$</tex-math></inline-formula> over three bearing datasets (i.e., IMS-Rexnord, CWRU, and Paderborn) than other state-of-the-art approaches. Above all, the privacy preserving based AlexNet was implemented using CryptoNet and LoLa to show different sets of efficiencies such as processing time, privacy, and integrity checks to preserve system performance following time-sensitive application scenarios like supply-chain optimization.","PeriodicalId":13135,"journal":{"name":"IEEE Transactions on Emerging Topics in Computational Intelligence","volume":"9 4","pages":"3039-3056"},"PeriodicalIF":5.3000,"publicationDate":"2025-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Emerging Topics in Computational Intelligence","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10833739/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Technological convergence in visual sensing with industrial IoT (VSI-IoT) can bring numerous advances to large-scale crowd management systems like visual crowdsensing. VSI-IoT has significant features, including sensing, computing, analyzing, and storing, to address the issues of bearing failures, such as unplanned outages, increased downtime, and reduced operational efficiency. By contrast, providing privacy to the IIoT environments is a challenging task. Thus, this paper presents a novel privacy-preserving learning (PPL) mechanism that senses the defect rate of bearing failures using lightweight model aggregation at edge computing systems to preserve the privacy features. This convergence model synthesizes shape features comprehensively to transform the feature vectors into predictive functions that examine the categorization models using a two-dimensional convolution neural network (2D-CNN). Using security analysis, we demonstrate that the proposed PPL can achieve better privacy protection and model accuracy to preserve the learning features without additional verifiability. Further, the examination results showed that the proposed 2D-CNN with BN and LN consumed less computation complexity to achieve better detection accuracy $(\approx 87.91.9\%$ to $\approx 99.98\%)$ and communication cost $ (\approx 21.09MB$ to $ 23.92MB)$ over three bearing datasets (i.e., IMS-Rexnord, CWRU, and Paderborn) than other state-of-the-art approaches. Above all, the privacy preserving based AlexNet was implemented using CryptoNet and LoLa to show different sets of efficiencies such as processing time, privacy, and integrity checks to preserve system performance following time-sensitive application scenarios like supply-chain optimization.
期刊介绍:
The IEEE Transactions on Emerging Topics in Computational Intelligence (TETCI) publishes original articles on emerging aspects of computational intelligence, including theory, applications, and surveys.
TETCI is an electronics only publication. TETCI publishes six issues per year.
Authors are encouraged to submit manuscripts in any emerging topic in computational intelligence, especially nature-inspired computing topics not covered by other IEEE Computational Intelligence Society journals. A few such illustrative examples are glial cell networks, computational neuroscience, Brain Computer Interface, ambient intelligence, non-fuzzy computing with words, artificial life, cultural learning, artificial endocrine networks, social reasoning, artificial hormone networks, computational intelligence for the IoT and Smart-X technologies.