Cargando…

Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations

This study provides an in-depth analysis and research on multimedia fusion privacy protection algorithms based on IoT data security in a network regulation environment. Aiming at the problem of collusion and conspiracy to deceive users in the process of outsourced computing and outsourced verificati...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhu, Guicun, Li, Xingguo, Zheng, Changlong, Wang, Linlin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9452945/
https://www.ncbi.nlm.nih.gov/pubmed/36093500
http://dx.doi.org/10.1155/2022/3574812
_version_ 1784785030980042752
author Zhu, Guicun
Li, Xingguo
Zheng, Changlong
Wang, Linlin
author_facet Zhu, Guicun
Li, Xingguo
Zheng, Changlong
Wang, Linlin
author_sort Zhu, Guicun
collection PubMed
description This study provides an in-depth analysis and research on multimedia fusion privacy protection algorithms based on IoT data security in a network regulation environment. Aiming at the problem of collusion and conspiracy to deceive users in the process of outsourced computing and outsourced verification, a safe, reliable, and collusion-resistant scheme based on blockchain is studied for IoT outsourced data computing and public verification, with the help of distributed storage methods, where smart devices encrypt the collected data and upload them to the DHT for storage along with the results of this data given by the cloud server. After testing, the constructed model has a privacy-preserving budget value of 0.6 and the smallest information leakage ratio of multimedia fusion data based on IoT data security when the decision tree depth is 6. After using this model under this condition, the maximum value of the information leakage ratio of multimedia fusion data based on IoT data security is reduced from 0.0865 to 0.003, and the data security is significantly improved. In the consensus verification process, to reduce the consensus time and ensure the operating efficiency of the system, a consensus node selection algorithm is proposed, thereby reducing the time complexity of the consensus. Based on the smart grid application scenario, the security and performance of the proposed model are analyzed. This study proves the correctness of this scheme by using BAN logic and proves the security of this scheme under the stochastic prediction machine model. Finally, this study compares the security aspects and performance aspects of the scheme with some existing similar schemes and shows that the scheme is feasible under IoT.
format Online
Article
Text
id pubmed-9452945
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Hindawi
record_format MEDLINE/PubMed
spelling pubmed-94529452022-09-09 Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations Zhu, Guicun Li, Xingguo Zheng, Changlong Wang, Linlin Comput Intell Neurosci Research Article This study provides an in-depth analysis and research on multimedia fusion privacy protection algorithms based on IoT data security in a network regulation environment. Aiming at the problem of collusion and conspiracy to deceive users in the process of outsourced computing and outsourced verification, a safe, reliable, and collusion-resistant scheme based on blockchain is studied for IoT outsourced data computing and public verification, with the help of distributed storage methods, where smart devices encrypt the collected data and upload them to the DHT for storage along with the results of this data given by the cloud server. After testing, the constructed model has a privacy-preserving budget value of 0.6 and the smallest information leakage ratio of multimedia fusion data based on IoT data security when the decision tree depth is 6. After using this model under this condition, the maximum value of the information leakage ratio of multimedia fusion data based on IoT data security is reduced from 0.0865 to 0.003, and the data security is significantly improved. In the consensus verification process, to reduce the consensus time and ensure the operating efficiency of the system, a consensus node selection algorithm is proposed, thereby reducing the time complexity of the consensus. Based on the smart grid application scenario, the security and performance of the proposed model are analyzed. This study proves the correctness of this scheme by using BAN logic and proves the security of this scheme under the stochastic prediction machine model. Finally, this study compares the security aspects and performance aspects of the scheme with some existing similar schemes and shows that the scheme is feasible under IoT. Hindawi 2022-08-31 /pmc/articles/PMC9452945/ /pubmed/36093500 http://dx.doi.org/10.1155/2022/3574812 Text en Copyright © 2022 Guicun Zhu et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Zhu, Guicun
Li, Xingguo
Zheng, Changlong
Wang, Linlin
Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations
title Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations
title_full Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations
title_fullStr Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations
title_full_unstemmed Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations
title_short Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations
title_sort multimedia fusion privacy protection algorithm based on iot data security under network regulations
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9452945/
https://www.ncbi.nlm.nih.gov/pubmed/36093500
http://dx.doi.org/10.1155/2022/3574812
work_keys_str_mv AT zhuguicun multimediafusionprivacyprotectionalgorithmbasedoniotdatasecurityundernetworkregulations
AT lixingguo multimediafusionprivacyprotectionalgorithmbasedoniotdatasecurityundernetworkregulations
AT zhengchanglong multimediafusionprivacyprotectionalgorithmbasedoniotdatasecurityundernetworkregulations
AT wanglinlin multimediafusionprivacyprotectionalgorithmbasedoniotdatasecurityundernetworkregulations