skip to main content
research-article

Privacy-Enhanced Cooperative Storage Scheme for Contact-Free Sensory Data in AIoT with Efficient Synchronization

Published: 11 May 2024 Publication History

Abstract

The growing popularity of contact-free smart sensing has contributed to the development of the Artificial Intelligence of Things (AIoT). The contact-free sensory data has great potential to mine and analyze the hidden information for AIoT-enabled applications. However, due to the limited storage resource of contact-free smart sensing devices, data is naturally stored in the cloud, which is at risk of privacy leakage. Cloud storage is generally considered insecure. On one hand, the openness of the cloud environment makes the data easy to be attacked, and the complex AIoT environment also makes the data transmission process vulnerable to the third party. On the other hand, the Cloud Service Provider (CSP) is untrusted. In this article, to ensure the security of data from contact-free smart sensing devices, a Cloud-Edge-End cooperative storage scheme is proposed, which takes full advantage of the differences in the cloud, edge, and end. Firstly, the processed sensory data is stored separately in the three layers by utilizing well-designed data partitioning strategy. This scheme can increase the difficulty of privacy leakage in the transmission process and avoid internal and external attacks. Besides, the contact-free sensory data is highly time-dependent. Therefore, combined with the Cloud-Edge-End cooperation model, this article proposes a delta-based data update method and extends it into a hybrid update mode to improve the synchronization efficiency. Theoretical analysis and experimental results show that the proposed cooperative storage method can resist various security threats in bad situations and outperform other update methods in synchronization efficiency, significantly reducing the synchronization overhead in AIoT.

References

[1]
S. B. Balaji, M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, Birenjith Sasidharan, and P. Vijay Kumar. 2018. Erasure coding for distributed storage: An overview. Science China Information Sciences 61, 100301 (2018), 1–45.
[2]
Astrid Battermann and Matthias Heinkenschloss. 1998. Preconditioners for Karush-Kuhn-Tucker matrices arising in the optimal control of distributed systems. In Control and Estimation of Distributed Parameter Systems: International Series of Numerical Mathematics, W. Desch, F. Kappel, K. Kunisch (Eds.). Birkhäuser Basel, 15–32.
[3]
S. Boyd, L. Vandenberghe, and L. Faybusovich. 2006. Convex optimization. IEEE Transactions on Automatic Control 51, 11 (2006), 1859–1859.
[4]
Keyan Cao, Yefan Liu, Gongjie Meng, and Qimeng Sun. 2020. An overview on edge computing research. IEEE Access 8 (2020), 85714–85728.
[5]
Helen H. W. Chan, Yongkun Li, Patrick P. C. Lee, and Yinlong Xu. 2018. Elastic parity logging for SSD RAID arrays: Design, analysis, and implementation. IEEE Transactions on Parallel and Distributed Systems 29, 10 (2018), 2241–2253.
[6]
Jeremy C. W. Chan, Qian Ding, Patrick P. C. Lee, and Helen H. W. Chan. 2014. Parity logging with reserved space: Towards efficient updates and recovery in erasure-coded clustered storage. In Proceedings of the 12th USENIX Conference on File and Storage Technologies. USENIX Association, 163–176.
[7]
Lili Chen, Jie Xiong, Xiaojiang Chen, Sunghoon Ivan Lee, Kai Chen, Dianhe Han, Dingyi Fang, Zhanyong Tang, and Zheng Wang. 2019. WideSee: Towards wide-area contactless wireless sensing. In Proceedings of the 17th Conference on Embedded Networked Sensor Systems. ACM, 258–270.
[8]
Joan-Josep Climent, Diego Napp, Carmen Perea, and Raquel Pinto. 2015. Maximum distance separable 2D convolutional codes. IEEE Transactions on Information Theory 62, 2 (2015), 669–680.
[9]
Tie-Jun Cui, Shuo Liu, and Lian-Lin Li. 2016. Information entropy of coding metasurface. Light Science & Applications 5, 11 (2016), e16172.
[10]
Hoang Dau, Iwan M. Duursma, Han Mao Kiah, and Olgica Milenkovic. 2018. Repairing Reed–Solomon codes with multiple erasures. IEEE Transactions on Information Theory 64, 10 (2018), 6567–6582.
[11]
Jun-Song Fu, Yun Liu, Han-Chieh Chao, Bharat K. Bhargava, and Zhen-Jiang Zhang. 2018. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Transactions on Industrial Informatics 14, 10 (2018), 4519–4528.
[12]
Suhyeon Jeon, Jeongho Kwak, and Jihwan P. Choi. 2022. Cross-layer encryption of CFB-AES-TURBO for advanced satellite data transmission security. IEEE Transactions on Aerospace and Electronic Systems 58, 3 (2022), 2192–2205.
[13]
Şefki Kolozali, Daniel Puschmann, Maria Bermudez-Edo, and Payam Barnaghi. 2016. On the effect of adaptive and nonadaptive analysis of time-series sensory data. IEEE Internet of Things Journal 3, 6 (2016), 1084–1098.
[14]
Martijn Koot and Fons Wijnhoven. 2021. Usage impact on data center electricity needs: A system dynamic forecasting model. Applied Energy 291, 116798 (2021), 1–13.
[15]
Chu Li, Dan Feng, Yu Hua, and Fang Wang. 2018. A high-performance and endurable SSD cache for parity-based RAID. Frontiers of Computer Science 13 (2018), 1–19.
[16]
Shijing Li and Tian Lan. 2020. HotDedup: Managing hot data storage at network edge through optimal distributed deduplication. In Proceedings of the IEEE Conference on Computer Communications. IEEE, 247–256.
[17]
Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, and Wei Zhao. 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (2017), 1125–1142.
[18]
Jialin Liu, Dong Li, Lei Wang, Fusang Zhang, and Jie Xiong. 2022. Enabling contact-free acoustic sensing under device motion. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 3 (2022), 1–27.
[19]
Yuyi Mao, Changsheng You, Jun Zhang, Kaibin Huang, and Khaled B. Letaief. 2017. A survey on mobile edge computing: The communication perspective. IEEE Communications Surveys & Tutorials 19, 4 (2017), 2322–2358.
[20]
Yinbin Miao, Qiuyun Tong, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, and Hongwei Li. 2022. Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage. IEEE Transactions on Cloud Computing 10, 2 (2022), 835–848.
[21]
Dinh Nguyen, Zhishu Shen, Jiong Jin, and Atsushi Tagami. 2017. ICN-Fog: An information-centric fog-to-fog architecture for data communications. In Proceedings of the IEEE Global Communications Conference. IEEE, 1–6.
[22]
Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Markakis, Evangelos Pallis, George Mastorakis, Constantinos X. Mavromoustakis, and Ciprian Dobre. 2016. A fog-based emergency system for smart enhanced living environments. IEEE Cloud Computing 3, 6 (2016), 54–62.
[23]
Xiaoqiang Pei, Yijie Wang, Xingkong Ma, and Fangliang Xu. 2016. T-update: A tree-structured update scheme with top-down transmission in erasure-coded systems. In Proceedings of the IEEE Conference on Computer Communications. IEEE, 1–9.
[24]
Xiaoqiang Pei, Yijie Wang, Xingkong Ma, and Fangliang Xu. 2017. Efficient in-place update with grouped and pipelined data transmission in erasure-coded storage systems. Future Generation Computer Systems 69 (2017), 24–40.
[25]
Chao Qiu, Xiaofei Wang, Haipeng Yao, Jianbo Du, F. Richard Yu, and Song Guo. 2020. Networking integrated cloud-edge-end in IoT: A blockchain-assisted collective q-learning approach. IEEE Internet of Things Journal 8, 16 (2020), 12694–12704.
[26]
Jiajie Shen, Kai Zhang, Jiazhen Gu, Yangfan Zhou, and Xin Wang. 2018. Efficient scheduling for multi-block updates in erasure coding based storage systems. IEEE Transactions on Computers 67, 4 (2018), 573–581.
[27]
Zhirong Shen, Patrick P. C. Lee, Jiwu Shu, and Wenzhong Guo. 2019. Correlation-aware stripe organization for efficient writes in erasure-coded storage: Algorithms and evaluation. IEEE Transactions on Parallel and Distributed Systems 30, 7 (2019), 1552–1564.
[28]
Weisong Shi, Jie Cao, Quan Zhang, Youhuizi Li, and Lanyu Xu. 2016. Edge computing: Vision and challenges. IEEE Internet of Things Journal 3, 5 (2016), 637–646.
[29]
Ye Shu, Mianxiong Dong, Kaoru Ota, Jun Wu, and Siyi Liao. 2018. Binary Reed–Solomon coding based distributed storage scheme in information-centric fog networks. In Proceedings of the 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks. IEEE, 1–5.
[30]
Jan Stanek and Lukas Kencl. 2018. Enhanced secure thresholded data deduplication scheme for cloud storage. IEEE Transactions on Dependable and Secure Computing 15, 4 (2018), 694–707.
[31]
Ivan Stojmenovic and Sheng Wen. 2014. The fog computing paradigm: Scenarios and security issues. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems. IEEE, 1–8.
[32]
Jun Tang, Yong Cui, Qi Li, Kui Ren, Jiangchuan Liu, and Rajkumar Buyya. 2016. Ensuring security and privacy preservation for cloud data services. ACM Computing Surveys 49, 1 (2016), 1–39.
[33]
Tian Wang, Yuzhu Liang, Xuewei Shen, Xi Zheng, Adnan Mahmood, and Quan Z. Sheng. 2023. Edge computing and sensor-cloud: Overview, solutions, and directions. ACM Computing Surveys 55, 13s (2023), 1–37. DOI:
[34]
Tian Wang, Yucheng Lu, Jianhuang Wang, Hong-Ning Dai, Xi Zheng, and Weijia Jia. 2021. EIHDP: Edge-intelligent hierarchical dynamic pricing based on cloud-edge-client collaboration for IoT systems. IEEE Transactions on Computers 70, 8 (2021), 1285–1298.
[35]
Tian Wang, Bing Sun, Liang Wang, Xi Zheng, and Weijia Jia. 2023. EIDLS: An edge-intelligence-based distributed learning system over internet of things. IEEE Transactions on Systems, Man, and Cybernetics: Systems 53, 7 (2023), 3966–3978. DOI:
[36]
Tian Wang, Quan Yang, Xuewei Shen, Thippa Reddy Gadekallu, Weizheng Wang, and Kapal Dev. 2022. A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Transactions on Industrial Informatics 18, 7 (2022), 4981–4989.
[37]
Tian Wang, Yilin Zhang, Neal N. Xiong, Shaohua Wan, Shigen Shen, and Shuqiang Huang. 2022. An effective edge-intelligent service placement technology for 5G-and-beyond industrial IoT. IEEE Transactions on Industrial Informatics 18, 6 (2022), 4148–4157.
[38]
Tian Wang, Jiyuan Zhou, Xinlei Chen, Guojun Wang, Anfeng Liu, and Yang Liu. 2018. A three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing. IEEE Transactions on Emerging Topics in Computational Intelligence 2, 1 (2018), 3–12.
[39]
Suzhen Wu, Bo Mao, Xiaolan Chen, and Hong Jiang. 2016. LDM: Log disk mirroring with improved performance and reliability for SSD-based disk arrays. ACM Transactions on Storage 12, 4 (2016), 1–21.
[40]
Mangang Xie, Qianfan Wang, Jie Gong, and Xiao Ma. 2020. Age and energy analysis for LDPC coded status update with and without ARQ. IEEE Internet of Things Journal 7, 10 (2020), 10388–10400.
[41]
Zuobin Ying, Wenjie Jiang, Ximeng Liu, Shengmin Xu, and Robert H. Deng. 2022. Reliable policy updating under efficient policy hidden fine-grained access control framework for cloud data sharing. IEEE Transactions on Services Computing 15, 6 (2022), 3485–3498.
[42]
Chunsheng Zhu, Hai Wang, Xiulong Liu, Lei Shu, Laurence T. Yang, and Victor C. M. Leung. 2016. A novel sensory data processing framework to integrate sensor networks with mobile cloud. IEEE Systems Journal 10, 3 (2016), 1125–1136.

Index Terms

  1. Privacy-Enhanced Cooperative Storage Scheme for Contact-Free Sensory Data in AIoT with Efficient Synchronization

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Transactions on Sensor Networks
        ACM Transactions on Sensor Networks  Volume 20, Issue 4
        July 2024
        603 pages
        EISSN:1550-4867
        DOI:10.1145/3618082
        • Editor:
        • Wen Hu
        Issue’s Table of Contents

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Journal Family

        Publication History

        Published: 11 May 2024
        Online AM: 02 September 2023
        Accepted: 25 June 2023
        Revised: 31 May 2023
        Received: 20 December 2022
        Published in TOSN Volume 20, Issue 4

        Check for updates

        Author Tags

        1. Artificial intelligence of things
        2. contact-free sensory data
        3. privacy leakage
        4. cloud-edge-end cooperation
        5. data synchronization

        Qualifiers

        • Research-article

        Funding Sources

        • National Key R&D Program of China
        • National Natural Science Foundation of China (NSFC)
        • Beijing Natural Science Foundation
        • Guangdong Provincial Natural Science Foundation
        • Key University Science Research Project of Anhui Province
        • Special Project of Guangdong Provincial Department of Education in Key Fields of Colleges and Universities
        • Joint Project of Production, Teaching and Research of Zhuhai
        • Guangdong Key Lab of AI and Multi-modal Data Processing, BNU-HKBU United International College (UIC), Zhuhai
        • UIC General Project
        • UIC Start-up Research Fund
        • Zhuhai Basic and Applied Basic Research Foundation
        • Joint Project of Production, Teaching and Research of Zhuhai

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 281
          Total Downloads
        • Downloads (Last 12 months)165
        • Downloads (Last 6 weeks)16
        Reflects downloads up to 05 Mar 2025

        Other Metrics

        Citations

        View Options

        Login options

        Full Access

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        Full Text

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media