Detailed Information

Cited 0 time in webofscience Cited 65 time in scopus
Metadata Downloads

Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things

Authors
Sharma, VishalYou, IlsunJayakody, Dushantha Nalin K.Atiquzzaman, Mohammed
Issue Date
Mar-2019
Publisher
Elsevier BV
Keywords
IoT; S-IoT; Trust; Privacy; Edge-computing; Crowdsourcing
Citation
Future Generation Computer Systems, v.92, pp 758 - 776
Pages
19
Journal Title
Future Generation Computer Systems
Volume
92
Start Page
758
End Page
776
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/4717
DOI
10.1016/j.future.2017.12.039
ISSN
0167-739X
1872-7115
Abstract
Social-Internet of Things (S-IoT) fortifies the relationship between computing entities for efficient utilization of resources. S-IoT accentuates on building convivial circles between the devices, which sanction sharing of information without compromising own performance. Trust and privacy are the two factors responsible for the maintenance of these social circles. Trust establishes faith between the entities and privacy supports abstraction of device information. There exist a plethora of approaches, which fixate on trust and privacy in social networks. However, the subsisting solutions rely on a trust scoring system and utilize a single centralized server for these calculations. Such scoring systems are manipulable by eavesdroppers, which engender erroneous reputation leading to high trust values. Considering the desideratum of an efficient trust and privacy-preserving solution, this paper proposes a novel solution in the form of fission computing. The proposed approach relies on the edge-crowd integration for maintenance of trust and preservation of privacy rules in S-IoT. The proposed solution uses crowdsources as mini-edge servers and entropy modeling for defining trust between the entities. Fission managers are responsible for maintaining the privacy rules, which operate for every S-IoT application. The proposed approach is analyzed through numerical simulations by using a safe network as a performance benchmark. Further, the article presents a case study on the detection of fake news sources in S-IoT as an application of the proposed approach. (C) 2018 Elsevier B.V. All rights reserved.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Information Security Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE