TY - JOUR
T1 - CAP2M.÷Contingent Anonymity Preserving Privacy Method for the Internet of Things Services
AU - Thota, Chandu
AU - Mavromoustakis, Constandinos
AU - Mastorakis, George
N1 - Publisher Copyright:
© 2023
PY - 2023/4
Y1 - 2023/4
N2 - The Internet of Things (IoT) consists of a collection of inter-connected devices that are used to transmit data. Secure transactions that guarantee user anonymity and privacy are necessary for the data transmission process. One of the major constraints of IoT Healthcare is the issue of maintaining security. These problems are addressed in this study by the Contingent Anonymity-Preserving Privacy Method (CAP2M), which takes into account the various security needs. The CAP2M method uses the session deployment and user requirements to preserve user privacy. The initial and final privacy settings are modified in the session deployment depending on the session interval and the service provider's recommendation. Federated learning is employed for training privacy settings toward the session's final interval. The suggested approach maintains privacy on various sharing intervals with minimum computation complexity. In the privacy-preserving process, two-factor authentication is used for concealing the sharing and shared ends. The performance is validated using the metrics failure, complexity, and latency.
AB - The Internet of Things (IoT) consists of a collection of inter-connected devices that are used to transmit data. Secure transactions that guarantee user anonymity and privacy are necessary for the data transmission process. One of the major constraints of IoT Healthcare is the issue of maintaining security. These problems are addressed in this study by the Contingent Anonymity-Preserving Privacy Method (CAP2M), which takes into account the various security needs. The CAP2M method uses the session deployment and user requirements to preserve user privacy. The initial and final privacy settings are modified in the session deployment depending on the session interval and the service provider's recommendation. Federated learning is employed for training privacy settings toward the session's final interval. The suggested approach maintains privacy on various sharing intervals with minimum computation complexity. In the privacy-preserving process, two-factor authentication is used for concealing the sharing and shared ends. The performance is validated using the metrics failure, complexity, and latency.
KW - Anonymous authentication
KW - Differential privacy
KW - Federated learning
KW - Internet of things
KW - Smart IoT healthcare
KW - Two-factor authentication
UR - http://www.scopus.com/inward/record.url?scp=85149416988&partnerID=8YFLogxK
U2 - 10.1016/j.compeleceng.2023.108640
DO - 10.1016/j.compeleceng.2023.108640
M3 - Article
AN - SCOPUS:85149416988
SN - 0045-7906
VL - 107
JO - Computers and Electrical Engineering
JF - Computers and Electrical Engineering
M1 - 108640
ER -