A Hybrid Approach With Gan and Dp for Privacy Preservation of Iiot Data

dc.contributor.author Hindistan, Yavuz Selim
dc.contributor.author Yetkin, E. Fatih
dc.date.accessioned 2023-10-19T15:11:54Z
dc.date.available 2023-10-19T15:11:54Z
dc.date.issued 2023
dc.description.abstract There are emerging trends to use the Industrial Internet of Things (IIoT) in manufacturing and related industries. Machine Learning (ML) techniques are widely used to interpret the collected IoT data for improving the company's operational excellence and predictive maintenance. In general, ML applications require high computational resource allocation and expertise. Manufacturing companies usually transfer their IIoT data to an ML-enabled third party or a cloud system. ML applications need decrypted data to perform ML tasks efficiently. Therefore, the third parties may have unacceptable access rights during the data processing to the content of IIoT data that contains a portrait of the production process. IIoT data may include hidden sensitive features, creating information leakage for the companies. All these concerns prevent companies from sharing their IIoT data with third parties. This paper proposes a novel method based on the hybrid usage of Generative Adversarial Networks (GAN) and Differential Privacy (DP) to preserve sensitive data in IIoT operations. We aim to sustain IIoT data privacy with minimal accuracy loss without adding high additional computational costs to the overall data processing scheme. We demonstrate the efficiency of our approach with publicly available data sets and a realistic IIoT data set collected from a confectionery production process. We employed well-known privacy six assessment metrics from the literature and measured the efficiency of the proposed technique. We showed, with the help of experiments, that the proposed method preserves the privacy of the data while keeping the Linear Regression (LR) algorithms stable in terms of the R-Squared accuracy metric. The model also ensures privacy protection for hidden sensitive data. In this way, the method prevents the production of hidden sensitive data from the sub-feature sets. en_US
dc.identifier.citationcount 3
dc.identifier.doi 10.1109/ACCESS.2023.3235969 en_US
dc.identifier.issn 2169-3536
dc.identifier.scopus 2-s2.0-85147297422 en_US
dc.identifier.uri https://doi.org/10.1109/ACCESS.2023.3235969
dc.identifier.uri https://hdl.handle.net/20.500.12469/5268
dc.khas 20231019-WoS en_US
dc.language.iso en en_US
dc.publisher IEEE-Inst Electrical Electronics Engineers Inc en_US
dc.relation.ispartof Ieee Access en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Industrial Internet of Things en_US
dc.subject Data privacy en_US
dc.subject Cloud computing en_US
dc.subject Production en_US
dc.subject Privacy en_US
dc.subject Data models en_US
dc.subject Security en_US
dc.subject Generative adversarial networks en_US
dc.subject differential privacy en_US
dc.subject generative adversarial networks en_US
dc.subject IIoT en_US
dc.subject privacy metrics en_US
dc.title A Hybrid Approach With Gan and Dp for Privacy Preservation of Iiot Data en_US
dc.type Article en_US
dspace.entity.type Publication
gdc.author.id Hindistan, Yavuz Selim/0000-0001-9031-8167
gdc.author.id Yetkin, E. Fatih/0000-0003-1115-4454
gdc.author.institutional Yetkin, Emrullah Fatih
gdc.bip.impulseclass C4
gdc.bip.influenceclass C5
gdc.bip.popularityclass C4
gdc.coar.access open access
gdc.coar.type text::journal::journal article
gdc.description.departmenttemp [Hindistan, Yavuz Selim; Yetkin, E. Fatih] Kadir Has Univ, Dept Management Informat Syst, Istanbul, Turkiye en_US
gdc.description.endpage 5849 en_US
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality Q1
gdc.description.startpage 5837 en_US
gdc.description.volume 11 en_US
gdc.description.wosquality Q2
gdc.identifier.openalex W4315630685
gdc.identifier.wos WOS:000920558800001 en_US
gdc.oaire.accesstype GOLD
gdc.oaire.diamondjournal false
gdc.oaire.impulse 9.0
gdc.oaire.influence 3.0169172E-9
gdc.oaire.isgreen true
gdc.oaire.keywords Generative adversarial networks
gdc.oaire.keywords Data models
gdc.oaire.keywords Production
gdc.oaire.keywords TK1-9971
gdc.oaire.keywords Industrial Internet of Things
gdc.oaire.keywords Privacy
gdc.oaire.keywords differential privacy
gdc.oaire.keywords privacy metrics
gdc.oaire.keywords Security
gdc.oaire.keywords Cloud computing
gdc.oaire.keywords IIoT
gdc.oaire.keywords Electrical engineering. Electronics. Nuclear engineering
gdc.oaire.keywords generative adversarial networks
gdc.oaire.keywords Data privacy
gdc.oaire.popularity 1.0974379E-8
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 02 engineering and technology
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.openalex.fwci 5.085
gdc.openalex.normalizedpercentile 1.0
gdc.openalex.toppercent TOP 1%
gdc.opencitations.count 13
gdc.plumx.crossrefcites 8
gdc.plumx.mendeley 44
gdc.plumx.scopuscites 26
gdc.scopus.citedcount 26
gdc.wos.citedcount 19
relation.isAuthorOfPublication 81114204-31da-4513-a19f-b5446f8a3a08
relation.isAuthorOfPublication.latestForDiscovery 81114204-31da-4513-a19f-b5446f8a3a08
relation.isOrgUnitOfPublication c10ffc80-6da5-4b86-b481-aae660325ae5
relation.isOrgUnitOfPublication b20623fc-1264-4244-9847-a4729ca7508c
relation.isOrgUnitOfPublication.latestForDiscovery c10ffc80-6da5-4b86-b481-aae660325ae5

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
5268.pdf
Size:
2.41 MB
Format:
Adobe Portable Document Format
Description:
Tam Metin / Full Text