Abstract
With the increasing scale and complexity of IoT swarm intelligence applications, data security and privacy protection have become important factors restricting the development of IoT swarm intelligence. This paper explores the key technologies of data security and privacy protection in IoT swarm intelligence to improve the security and trustworthiness of IoT swarm intelligence applications. Using the method of literature research and empirical analysis, the data security and privacy protection in the swarm intelligence of the Internet of Things are deeply analyzed and studied. The data security risks in the Internet of Things are identified and classified, and the corresponding security requirements are proposed. According to different security requirements, a series of data security and privacy protection technologies are proposed. Finally, through empirical research, the effectiveness and feasibility of the proposed key technologies are verified. The research results show that these technologies and methods can provide guarantees for the security and trustworthiness of IoT swarm intelligence applications, contributing to the healthy development of the IoT industry. However, further research and improvements are still needed to address new security and privacy challenges that continue to emerge.
Similar content being viewed by others
Data availability
The data will be available upon request.
References
Abowd, J.M., Schmutte, I.M.: An economic analysis of privacy protection and statistical accuracy as social choices. Am. Econ. Rev. 109(1), 171–202 (2019)
Choi, J., Sung, W., Choi, C., Kim, P.: Personal information leakage detection method using the inference-based access control model on the android platform. Pervasive Mob. Comput. 24, 138–149 (2015)
Dong, J., Roth, A., Su, W.J.: Gaussian differential privacy. J. R. Stat. Soc. Ser. B Stat Methodol. 84(1), 3–37 (2022)
Elkoumy, G., Fahrenkrog-Petersen, S.A., Sani, M.F., et al.: Privacy and confidentiality in process mining: threats and research challenges. ACM Trans. Manag. Inf. Syst. (TMIS) 13(1), 1–17 (2021)
Feng, X., Yan, F., Liu, X.: Study of wireless communication technologies on internet of things for precision agriculture. Wireless Pers. Commun. 108(3), 1785–1802 (2019a)
Feng, Q., He, D., Zeadally, S., et al.: A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126, 45–58 (2019b)
Ju, C., Gu, Q., Wu, G., Zhang, S.: Local differential privacy protection of high-dimensional perceptual data by the refined Bayes network. Sensors 20(9), 208–216 (2020)
Paul, A., Jeyaraj, R.: Internet of Things: a primer. Human Behav. Emerg. Technol. 1(1), 37–47 (2019)
Ray, P.P.: A survey on internet of things architectures. J. King Saud Univ. Comput. Inf. Sci. 30(3), 291–319 (2018)
Shuman, E., Saguy, T., van Zomeren, M., Halperin, E.: Disrupting the system constructively: testing the effectiveness of nonnormative nonviolent collective action. J. Pers. Soc. Psychol. 121(4), 785–796 (2021)
Sugiura, G., Ito, K., Kashima, K.: Bayesian differential privacy for linear dynamical systems. IEEE Control Syst Lett 6, 896–901 (2021)
Sun, P.: Security and privacy protection in cloud computing: discussions and challenges. J. Netw. Comput. Appl. 160, 5434–5439 (2020)
Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: a survey. IEEE Access 8, 131723–131740 (2020)
Yu, K., Guo, Z., Shen, Y., et al.: Secure artificial intelligence of things for implicit group recommendations. IEEE Internet Things J. 9(4), 2698–2707 (2021)
Zhao, Y., Chen, J.: A survey on differential privacy for unstructured data content. ACM Comput. Surv. (CSUR) 54(10s), 1–28 (2022)
Funding
The authors have not disclosed any funding.
Author information
Authors and Affiliations
Contributions
The first version was written by YL, YH and QC has done the simulations. All authors have contributed to the paper’s analysis, discussion, writing, and revision.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Ethical approval
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, Y., Hua, Y. & Chen, Q. Research on key technologies of data security and privacy protection in Internet of Things group intelligence. Opt Quant Electron 56, 114 (2024). https://doi.org/10.1007/s11082-023-05691-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11082-023-05691-y