Cargando…
Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations
This study provides an in-depth analysis and research on multimedia fusion privacy protection algorithms based on IoT data security in a network regulation environment. Aiming at the problem of collusion and conspiracy to deceive users in the process of outsourced computing and outsourced verificati...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9452945/ https://www.ncbi.nlm.nih.gov/pubmed/36093500 http://dx.doi.org/10.1155/2022/3574812 |
_version_ | 1784785030980042752 |
---|---|
author | Zhu, Guicun Li, Xingguo Zheng, Changlong Wang, Linlin |
author_facet | Zhu, Guicun Li, Xingguo Zheng, Changlong Wang, Linlin |
author_sort | Zhu, Guicun |
collection | PubMed |
description | This study provides an in-depth analysis and research on multimedia fusion privacy protection algorithms based on IoT data security in a network regulation environment. Aiming at the problem of collusion and conspiracy to deceive users in the process of outsourced computing and outsourced verification, a safe, reliable, and collusion-resistant scheme based on blockchain is studied for IoT outsourced data computing and public verification, with the help of distributed storage methods, where smart devices encrypt the collected data and upload them to the DHT for storage along with the results of this data given by the cloud server. After testing, the constructed model has a privacy-preserving budget value of 0.6 and the smallest information leakage ratio of multimedia fusion data based on IoT data security when the decision tree depth is 6. After using this model under this condition, the maximum value of the information leakage ratio of multimedia fusion data based on IoT data security is reduced from 0.0865 to 0.003, and the data security is significantly improved. In the consensus verification process, to reduce the consensus time and ensure the operating efficiency of the system, a consensus node selection algorithm is proposed, thereby reducing the time complexity of the consensus. Based on the smart grid application scenario, the security and performance of the proposed model are analyzed. This study proves the correctness of this scheme by using BAN logic and proves the security of this scheme under the stochastic prediction machine model. Finally, this study compares the security aspects and performance aspects of the scheme with some existing similar schemes and shows that the scheme is feasible under IoT. |
format | Online Article Text |
id | pubmed-9452945 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Hindawi |
record_format | MEDLINE/PubMed |
spelling | pubmed-94529452022-09-09 Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations Zhu, Guicun Li, Xingguo Zheng, Changlong Wang, Linlin Comput Intell Neurosci Research Article This study provides an in-depth analysis and research on multimedia fusion privacy protection algorithms based on IoT data security in a network regulation environment. Aiming at the problem of collusion and conspiracy to deceive users in the process of outsourced computing and outsourced verification, a safe, reliable, and collusion-resistant scheme based on blockchain is studied for IoT outsourced data computing and public verification, with the help of distributed storage methods, where smart devices encrypt the collected data and upload them to the DHT for storage along with the results of this data given by the cloud server. After testing, the constructed model has a privacy-preserving budget value of 0.6 and the smallest information leakage ratio of multimedia fusion data based on IoT data security when the decision tree depth is 6. After using this model under this condition, the maximum value of the information leakage ratio of multimedia fusion data based on IoT data security is reduced from 0.0865 to 0.003, and the data security is significantly improved. In the consensus verification process, to reduce the consensus time and ensure the operating efficiency of the system, a consensus node selection algorithm is proposed, thereby reducing the time complexity of the consensus. Based on the smart grid application scenario, the security and performance of the proposed model are analyzed. This study proves the correctness of this scheme by using BAN logic and proves the security of this scheme under the stochastic prediction machine model. Finally, this study compares the security aspects and performance aspects of the scheme with some existing similar schemes and shows that the scheme is feasible under IoT. Hindawi 2022-08-31 /pmc/articles/PMC9452945/ /pubmed/36093500 http://dx.doi.org/10.1155/2022/3574812 Text en Copyright © 2022 Guicun Zhu et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Zhu, Guicun Li, Xingguo Zheng, Changlong Wang, Linlin Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations |
title | Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations |
title_full | Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations |
title_fullStr | Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations |
title_full_unstemmed | Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations |
title_short | Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations |
title_sort | multimedia fusion privacy protection algorithm based on iot data security under network regulations |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9452945/ https://www.ncbi.nlm.nih.gov/pubmed/36093500 http://dx.doi.org/10.1155/2022/3574812 |
work_keys_str_mv | AT zhuguicun multimediafusionprivacyprotectionalgorithmbasedoniotdatasecurityundernetworkregulations AT lixingguo multimediafusionprivacyprotectionalgorithmbasedoniotdatasecurityundernetworkregulations AT zhengchanglong multimediafusionprivacyprotectionalgorithmbasedoniotdatasecurityundernetworkregulations AT wanglinlin multimediafusionprivacyprotectionalgorithmbasedoniotdatasecurityundernetworkregulations |