skip to main content
research-article

A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning

Published:17 April 2023Publication History
Skip Abstract Section

Abstract

Rapid advancement of industrial internet of things (IoT) technology has changed the supply chain network to an open system to meet the high demand for individualized products and provide better customer experiences. However the open-system supply chain has forced many small and midsize enterprises (SMEs) to adopt vertical integration by being divided into smaller companies with a distinctive business for each SME but a central alliance to produce a range of products and gain competencies. Therefore, existing models do not guarantee the protection of data privacy of individual SMEs. Moreover, especially for the IoT environment, collecting data in a secure way and revealing valuable knowledge in an IoT network is difficult. How to share data in a secure framework is of paramount importance in the internet of behavior field. In this article, a privacy-preserving data-mining framework is proposed for joint-venture industrial collaborative activities by combining federated learning and a “pre-large concept” of data-mining techniques. The novelty of the proposed approach is that, while mining high-utility itemsets (HUIs) from multiple datasets, it does not require direct data sharing. In the proposed method, the federated-learning framework can learn from aggregated learning parameters without scanning all data from different sets. The pre-large concept in this approach reduces the amount of scanning into different datasets. Thus, the approach makes it possible to train federated learning more quickly while protecting the privacy of individual data owners. The approach has been tested on real industrial datasets in a collaborative environment. Extensive experimental results show that the approach achieves high accuracy compared with conventional data-mining techniques while preserving the privacy of datasets.

REFERENCES

  1. [1] Agarwal Rakesh and Srikant Ramakrishnan. 1994. Fast algorithms for mining association rules. In Proceedings of the 1994 International Conference on Very Large Data Bases. 487499.Google ScholarGoogle Scholar
  2. [2] Agrawal Rakesh, Imieliński Tomasz, and Swami Arun. 1993. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM-SIGMOD International Conference on Management of Data. 207216.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Chen Lili, Gan Wensheng, Lin Qi, Huang Shuqiang, and Chen Chien-Ming. 2022. OHUQI: Mining on-shelf high-utility quantitative itemsets. The Journal of Supercomputing 78 (2022), 125.Google ScholarGoogle Scholar
  4. [4] Deng Zhihong and Wang Zhonghui. 2010. A new fast vertical method for mining frequent patterns. International Journal of Computational Intelligence Systems 3, 6 (2010), 733744.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Deng ZhiHong, Wang ZhongHui, and Jiang JiaJian. 2012. A new algorithm for fast mining frequent itemsets using N-lists. Science China Information Sciences 55, 9 (2012), 20082030.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Deng Zhi Hong. 2016. DiffNodesets: An efficient structure for fast mining frequent itemsets. Applied Soft Computing 41 (2016), 214223.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Deng Zhi Hong and Lv Sheng Long. 2014. Fast mining frequent itemsets using nodesets. Expert Systems with Applications 41, 10 (2014), 45054512.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Essien Aniekan and Giannetti Cinzia. 2020. A deep learning model for smart manufacturing using convolutional LSTM neural network autoencoders. IEEE Transactions on Industrial Informatics 16, 9 (2020), 60696078. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Fournier-Viger Philippe, Lin Jerry Chun-Wei, Gomariz Antonio, Gueniche Ted, Soltani Azadeh, Deng Zhihong, and Lam Hoang Thanh. 2016. The SPMF open-source data mining library version 2. In Proceedings of the Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 3640.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Gan Wensheng, Chen Lili, Wan Shicheng, Chen Jiahui, and Chen Chien-Ming. 2021. Anomaly rule detection in sequence data. IEEE Transactions on Knowledge and Data Engineering (2021).Google ScholarGoogle Scholar
  11. [11] Geyer Robin C., Klein Tassilo, and Nabi Moin. 2017. Differentially private federated learning: A client level perspective. arXiv:1712.07557. Retrieved from https://arxiv.org/abs/1712.07557.Google ScholarGoogle Scholar
  12. [12] Giacomelli Irene, Jha Somesh, Joye Marc, Page C. David, and Yoon Kyonghwan. 2018. Privacy-preserving ridge regression with only linearly-homomorphic encryption. In Proceedings of the International Conference on Applied Cryptography and Network Security. Springer, 243261.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Grahne Gösta and Zhu Jianfei. 2005. Fast algorithms for frequent itemset mining using fp-trees. IEEE Transactions on Knowledge and Data Engineering 17, 10 (2005), 13471362.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Han Jiawei, Pei Jian, and Yin Yiwen. 2000. Mining frequent patterns without candidate generation. ACM SIGMOD Record 29, 2 (2000), 112.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Hardy Stephen, Henecka Wilko, Ivey-Law Hamish, Nock Richard, Patrini Giorgio, Smith Guillaume, and Thorne Brian. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv:1711.10677. Retrieved from https://arxiv.org/abs/1711.10677.Google ScholarGoogle Scholar
  16. [16] Hong Tzung Pei, Chen Hsin Yi, Lin Chun Wei, and Li Sheng Tun. 2009. Maintaining pre-large FUSP trees for record deletion. In Proceedings of the 2009 International Conference on New Trends in Information and Service Science.Google ScholarGoogle Scholar
  17. [17] Hong Tzung Pei, Wang Ching Yao, and Tao Yu Hui. 2001. A new incremental data mining algorithm using pre-large itemsets. Intelligent Data Analysis 5, 2 (2001), 111129.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Jianjia He, Gang Liu, Xiaojun Tan, and Tingting Li. 2021. Research on collaborative recommendation of dynamic medical services based on cloud platforms in the industrial interconnection environment. Technological Forecasting and Social Change 170 (2021), 120895. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Khan Abid, Shahid Furqan, Maple Carsten, Ahmad Awais, and Jeon Gwanggil. 2020. Towards smart manufacturing using spiral digital twin framework and twinchain. IEEE Transactions on Industrial Informatics 18, 2 (2020), 13591366. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Lin Chun Wei, Gan Wensheng, Hong Tzung Pei, and Zhang Jingliang. 2015. Updating the built prelarge fast updated sequential pattern trees with sequence modification. International Journal of Data Warehousing & Mining 11, 1 (2015), 122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Lu Yuqian and Xu Xun. 2019. Cloud-based manufacturing equipment and big data analytics to enable on-demand manufacturing services. Robotics and Computer-Integrated Manufacturing 57 (2019), 92102. DOI:DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Mohassel Payman and Zhang Yupeng. 2017. Secureml: A system for scalable privacy-preserving machine learning. In Proceedings of the 2017 IEEE Symposium on Security and Privacy. IEEE, 1938.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Nock Richard, Hardy Stephen, Henecka Wilko, Ivey-Law Hamish, Patrini Giorgio, Smith Guillaume, and Thorne Brian. 2018. Entity resolution and federated learning get a federated resolution. arXiv:1803.04035. Retrieved from https://arxiv.org/abs/1803.04035.Google ScholarGoogle Scholar
  24. [24] Pan Sinno Jialin and Yang Qiang. 2009. A survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering 22, 10 (2009), 13451359.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Mussomeli Stephen Laaper Rick Burke, Adam. 2021. The Smart Factory: Responsive, Adaptive, Connected Manufacturing- A Deloitte Series on Industry 4.0, Digital Manufacturing Enterprises, and Digital Supply Networks. Technical Report. Deloitte University Press.Google ScholarGoogle Scholar
  26. [26] Shokri Reza and Shmatikov Vitaly. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM-SIGSAC Conference on Computer and Communications Security. 13101321.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Wan Jiafu, Tang Shenglong, Li Di, Imran Muhammad, Zhang Chunhua, Liu Chengliang, and Pang Zhibo. 2019. Reconfigurable smart factory for drug packing in healthcare industry 4.0. IEEE Transactions on Industrial Informatics 15, 1 (2019), 507516. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Wang Junliang, Xu Chuqiao, Zhang Jie, Bao Jingsong, and Zhong Ray. 2020. A collaborative architecture of the industrial internet platform for manufacturing systems. Robotics and Computer-Integrated Manufacturing 61 (2020), 101854. DOI:DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Wang Junliang, Zheng Peng, Lv Youlong, Bao Jingsong, and Zhang Jie. 2019. Fog-IBDIS: Industrial big data integration and sharing with fog computing for manufacturing systems. Engineering 5, 4 (2019), 662670. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Wang Ke, Chen Chien-Ming, Tie Zhuoyu, Shojafar Mohammad, Kumar Sachin, and Kumari Saru. 2021. Forward privacy preservation in IoT-enabled healthcare systems. IEEE Transactions on Industrial Informatics 18, 3 (2021), 19911999.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Woon Yew Kwong, Ng Wee Keong, and Lim Ee Peng. 2004. A support-ordered trie for fast frequent itemset discovery. IEEE Transactions on Knowledge and Data Engineering 16, 7 (2004), 875879.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] YU Chao, LI Qing, LIU Kui, CHEN Yuwen, and WEI Hailong. 2021. Industrial Design and Development Software System Architecture Based on Model-Based Systems Engineering and Cloud Computing Annual Reviews in Control 51 (2021), 401–423. DOI:DOI:Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Yun Unil, Kim Heonho, Ryu Taewoog, Baek Yoonji, and Pedrycz Witold. 2021. Pre-large based utility-oriented data analytics for transaction modifications in Internet of Things. IEEE Internet of Things Journal PP, 99 (2021), 11.Google ScholarGoogle Scholar

Index Terms

  1. A Privacy Frequent Itemsets Mining Framework for Collaboration in IoT Using Federated Learning

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Sensor Networks
          ACM Transactions on Sensor Networks  Volume 19, Issue 2
          May 2023
          599 pages
          ISSN:1550-4859
          EISSN:1550-4867
          DOI:10.1145/3575873
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 April 2023
          • Online AM: 5 May 2022
          • Accepted: 13 April 2022
          • Revised: 5 March 2022
          • Received: 6 September 2021
          Published in tosn Volume 19, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format