CN113163019B - Internet of things privacy protection service discovery system based on SDN and edge computing - Google Patents
Internet of things privacy protection service discovery system based on SDN and edge computing Download PDFInfo
- Publication number
- CN113163019B CN113163019B CN202110588548.2A CN202110588548A CN113163019B CN 113163019 B CN113163019 B CN 113163019B CN 202110588548 A CN202110588548 A CN 202110588548A CN 113163019 B CN113163019 B CN 113163019B
- Authority
- CN
- China
- Prior art keywords
- service
- context
- tree
- space
- internet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims abstract description 22
- 230000008569 process Effects 0.000 claims abstract description 15
- 238000005192 partition Methods 0.000 claims abstract description 12
- 239000013598 vector Substances 0.000 claims description 27
- 238000013507 mapping Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 6
- 238000000638 solvent extraction Methods 0.000 claims description 6
- 238000011161 development Methods 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 4
- 238000005065 mining Methods 0.000 claims description 3
- 238000007781 pre-processing Methods 0.000 claims description 2
- 230000006870 function Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000003116 impacting effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000004540 process dynamic Methods 0.000 description 2
- 241000764238 Isis Species 0.000 description 1
- 230000003044 adaptive effect Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to an Internet of things privacy protection service discovery system based on SDN and edge computing, which comprises: the SDN controller is used for controlling each EN to serve as a cooperative learner to cache and process information in the MEC network; the context space model carries out context space partition on the preprocessed context records so as to mine and obtain similar context records; the service space model of the Internet of things covers the total service space through a service history tree and a service discovery tree, the service history tree and the service discovery tree are infinite binary trees, and each tree node corresponds to a service cluster in the total service space; the service history tree stores all historical service records of the Internet of things and marks the partition state of the total service space; the service discovery tree is constructed and refreshed according to the service history tree and the context space and is used for discovering an Internet of things service cluster suitable for the current user so as to select the optimal personalized service and recommend the optimal personalized service to the user; a balance is struck between accuracy of service discovery and the level of privacy protection.
Description
Technical Field
The invention relates to the technical field of internet of things, in particular to an internet of things privacy protection service discovery system based on SDN and edge computing.
Background
In the scene of the internet of things, a plurality of heterogeneous entities and intelligent devices are connected with each other under the support of radio frequency identification, wireless sensor networks and other technologies, and a large amount of data related to various physical environments are transmitted. With the help of ubiquitous deployment devices, internet of things services and applications are growing rapidly, covering almost every aspect of our lives (e.g., healthcare, smart home, industry, etc.). Over time, as smart devices continue to grow rapidly, more and more services will be provided to users.
The contextual information of the end user detected by the ambient sensors plays a crucial role in providing personal services. The service discovery system is an important component of an ecosystem of the Internet of things, and finds corresponding services from candidate services by using the context of a user instead of searching a plurality of services randomly. The service discovery can be applied to various scenes such as intelligent home automation, industrial automation and traffic, and the life of people is improved.
However, the highly heterogeneous nature of different users and the ever expanding number of services offered by many service providers in the internet of things greatly impact real-time services. To better meet the needs of individuals, the context of users (e.g., location, time, etc.) is widely used in the context of the internet of things, which raises privacy concerns. Also, many users have several different service requirements in each round, and therefore the service selection should be combined.
Disclosure of Invention
The invention provides an Internet of things privacy protection service discovery system based on SDN and edge calculation, aiming at the technical problems in the prior art, and solves the problems in the prior art.
The technical scheme for solving the technical problems is as follows: an internet of things privacy protection service discovery system based on SDN and edge computing, comprising: EN, SDN controller and service model;
the EN and the SDN controller are deployed in an MEC network; the SDN controller is used for controlling each EN to serve as a cooperative learner to cache and process information in the MEC network;
the service model comprises a context space model and an internet of things service space model;
the context space model carries out context space partition on the context records after preprocessing so as to mine and obtain similar context records;
the service space model of the Internet of things covers the total service space through a service history tree and a service discovery tree, the service history tree and the service discovery tree are infinite binary trees, and each tree node corresponds to a service cluster in the total service space; the service history tree stores all historical service records of the Internet of things and marks the partition state of the total service space; and the service discovery tree is constructed and refreshed according to the service history tree and the context space and is used for discovering an Internet of things service cluster suitable for the current user so as to select the optimal personalized service and recommend the optimal personalized service to the user.
The invention has the beneficial effects that: the invention provides a context-aware online algorithm supporting MEC, which is used for service discovery and supporting large-scale service in IoT, and numerical results show that compared with other context-aware online algorithms, the method has good performance and balances the accuracy of service discovery and the privacy protection level.
On the basis of the technical scheme, the invention can be further improved as follows.
Further, the process of the service model selecting the best personalized service to recommend to the user comprises the following steps:
extracting service vectors into the service space of the Internet of things until a user registers new Internet of things service to EN a in the MEC networkTo EN a, the current context vector of the user is receivedAnd carrying out pretreatment in EN a at the t round; wherein EN a represents the a-th EN, the superscript a represents the sequence number of the EN, and the subscript t represents the t-th round;
the context space model is in context spaceFinding a context subspace of the service record to obtain enough service records of the Internet of things for reference;
setting a reward estimated value B value representing tree nodes (h, i), and selecting an optimal Internet of things cluster corresponding to the highest B value;
For the userSelecting an optimal Internet of things clusterSet of internet of things services inIn (1)N is the total number of the Internet of things services in the set of the Internet of things services;
if the number of services selected by the current userNot more than N, andis thatIs then inLirandon recommendationProviding the service to the user; otherwise, recommend N services to the user and ask for help from neighboring ENs to recommend others-N services;
and stopping the whole recommendation process after the user gives feedback.
Further, the process of obtaining similar context records by the context space model comprises:
mapping each of the user's contexts to oneDimensional context space(ii) a In the t-th round, the user has a context vectorThe context vector is encodedSending to the context space model;
in each round, acquiring a valid record by mining the context information of the user, and taking the valid record as a reference for selecting the service type;
for the context spacePartitioning into a plurality of context subspaces, and ensuring that the maximum number of context records in each space does not exceed a set threshold; finding the context vectorThe subspaces to which the context information belongs, and the appropriate context space containing the context-related information is obtained to obtain similar context records.
Further, the calculation formula of the reward estimation value B is as follows:
wherein subscript h, i represents tree node (h, i);the average reward of experience is shown, and gamma is a parameter for balancing exploration and development;the expression of the Liphoz constant is shown,representing a context spaceThe maximum distance of (a) is,represents the upper limit of the diameter of the subset region of tree nodes (h, i), infinity represents infinity;
representing the number of times tree nodes (h, i) are selected at ena until round t,representing the set of ena and its single-hop neighbors,to indicate the function, n is the total number of rounds.
Further, the empirical average reward of the tree nodes (h, i) is:
Further, the service history tree is used in the service space model of the internet of thingsAnd context spaceRefreshing the service discovery treeAnd updating the B value, including:
for theTo judge the existenceNot exceeding a set thresholdEN a seeks help from its neighboring hop EN, for EN aAll ENs in time, the empirical average reward is calculated as:;
computing and updating the service discovery treeAverage empirical consideration ofThen, the place is calculated and updatedThe value of B is as followsAdding to the service discovery treeIn (1).
Further, the service model also includes a local differential privacy mechanismTo the userInitial context vector ofAnd carrying out context random data perturbation processing, and calculating the influence of the perturbation processing on service discovery through a loss function.
wherein,as a context vectorVia the local differential privacy mechanismPerturbing the set of post-operation mappings;,,representing a privacy factor;
further, after the service model selects the best personalized service to recommend to the user, the discovery system calculates a total reward value according to the server side reward and the user side reward:
server-side rewards obtained from various ENs monitored by the SDN controller,and rewarding the user terminal determined according to the execution time, the response time and the reliability of the user.
Further, the discovery system performs offline update according to the completed service record:
in the service space model of the Internet of things, the service history tree is used for the serviceEach leaf tree node in (1)If, if(ii) a Updating the service history tree:
updating the B value:
Wherein,representing context vectorsThe number of contexts in (a) and (b),andindicating that a threshold is set.
The beneficial effect of adopting the further scheme is that: only a single arm is considered to be selected in a round against the conventional CMAB algorithm, but many users have multiple requirements in a round and are therefore not applicable. The invention provides a context-aware online algorithm for local differential privacy and MEC support, which can process dynamic complex context problems, carry out balance between development and exploration after selecting proper arm, and select a group of arms by utilizing combined contextual multi-arm basis (CC-MAB) to meet different service requirements of each round of users. And the system can continuously learn the rewards of arms on the web, as the user context arrives, to maximize the total rewards.
Sensitive information of a user is protected on a user level instead of a service discovery system level by using a Local Differential Privacy (LDP) mechanism, random noise is introduced to interfere individual context by combining LDP and CC-MAB, the privacy of the user is ensured, and the balance between service discovery precision and local privacy/personal information utility is realized. The accuracy of the system is measured using the regret concept in multi-arm bandit, which is defined as the gap between the optimal service and the reward of the actually selected service, the sub-linear regret means that our method converges to the optimal service discovery strategy. The L2 loss was introduced as a practical measure to evaluate privacy loss and data utility during random perturbations. We have demonstrated theoretically that our algorithm can achieve a sub-linear regret, ensuring that promising local differential privacy is provided for individual ENs and users, but without significantly impacting the information utility.
Drawings
Fig. 1 is an interaction diagram of an internet of things privacy protection service discovery system based on SDN and edge computing according to an embodiment of the present invention;
fig. 2 is a schematic diagram of context space partitioning according to an embodiment of the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention.
MEC (Mobile Edge Computing) is a technology based on 5G evolution architecture and integrates Mobile access networks with internet services deeply. The method has lower delay time so as to relieve network congestion and improve the experience quality of users. Data caching and processing may be performed on individual ENs (Edge Node services), where services may be deployed to end users with real-time responses. In addition, in order to realize a distributed ubiquitous computing scenario with high complexity and logic control on each EN, the Network complexity may be managed by using an SDN (Software Defined Network) that hides all internal details in the MEC Network, the control and the data plane are separated, and the programmable control is realized, so that the SDN controller can obtain a complete view and centralized control of the entire Network, and is more flexible and reliable. Furthermore, it can be deployed on eligible ENs in the MEC network, which is considered a promising solution to efficiently provide computing resources and coordinate the MEC network. Therefore, it is beneficial to cooperate the MEC supporting SDN with a service discovery system to provide real-time, low-latency services to users.
An internet of things privacy protection service discovery system based on SDN and edge computing, the discovery system comprising: EN, SDN controller, and service model.
The EN and the SDN controller are deployed in an MEC network; the SDN controller is used for controlling each EN to serve as a cooperative learner to cache and process information in the MEC network.
The service model comprises a context space model and an internet of things service space model.
And the context space model carries out context space partition on the preprocessed context information so as to mine and obtain similar context records.
The service space model of the Internet of things covers the total service space through a service history tree and a service discovery tree, wherein the service history tree and the service discovery tree are infinite binary trees; the service history tree stores all historical service records of the Internet of things and marks the partition state of the total service space; and the service discovery tree is constructed and refreshed according to the service history tree and the context space and is used for discovering an Internet of things service cluster suitable for the current user so as to select the optimal personalized service and recommend the optimal personalized service to the user.
The service history tree stores all historical service records of the Internet of things up to the t round, and the tree nodes in the service history tree can be gradually divided along with the increase of the history records. The service discovery tree may be refreshed based on a similar context space selected for obtaining a similar history and containing useful tree nodes in the service history tree. In the whole process, only the tree nodes containing the context related records of the service discovery tree in the service history tree are considered, and the whole service history tree is not considered. A particular internet of things service cluster is selected and the partitioning will be finer as the depth of the tree increases.
Example 1
The EN and the SDN controller are deployed in an MEC network; the SDN controller is used for controlling each EN to serve as a cooperative learner to cache and process information in the MEC network.
The service model comprises a context space model and an internet of things service space model.
And the context space model carries out context space partition on the preprocessed context information so as to mine and obtain similar context records.
The service space model of the Internet of things covers the total service space through a service history tree and a service discovery tree, wherein the service history tree and the service discovery tree are infinite binary trees; the service history tree stores all historical service records of the Internet of things and marks the partition state of the total service space; and the service discovery tree is constructed and refreshed according to the service history tree and the context space and is used for discovering an Internet of things service cluster suitable for the current user so as to select the optimal personalized service and recommend the optimal personalized service to the user.
Preferably, the process of the service model selecting the best personalized service recommendation to the user comprises:
Specifically, the process of obtaining similar context records by the context space model includes:
mapping each of said user's contexts (which may be hobbies, location, time and duration, etc.) to oneDimensional context space(ii) a Mapping each of the user's contexts to oneDimensional context space(ii) a In the t-th round, the user has a context vectorThe context vector is encodedSending to the context space model; context vectorByAnd (5) modeling dimensional vectors.
FIG. 2 is a diagram illustrating a context space partition according to an embodiment of the present invention, where FIG. 2 is a diagram illustrating a context space partitionAndrespectively representAndthe time of the wheel is such that,、andrespectively, Lc represents the Liphoz constant.
Normalizing the range of each dimension of a context record to [0,1 ]]Thus C isA context space. As can be seen in connection with the embodiment shown in FIG. 2, the three-dimensional context space contains usersService record ofUp toWheels, where dimensions may be age, monthly salary, and man-hours. For example,=0.20 means that the user isIs about 20 years old, and the maximum age is 100 years old, whenWhen =0.89, he/she belongs to a high salary class because the threshold for the average payroll of 1200$ per month is 0.5. If it is not=0.26, maximum value 24, this indicates the userWork was done for about 6.2 hours per day.
In each round, a valid record is obtained by mining the context information of the user, and the valid record is used as a reference for selecting the service type.
For the context spacePartitioning into a plurality of subspaces, and ensuring that the maximum number of context records in each space does not exceed a set threshold; finding the context vectorThe subspaces to which the context information belongs are obtained into an appropriate context space containing the context-related information so as to obtain similar context records for accurate selection.
For example, for the above-mentioned usersSimilar user records (high salary, young and easy to work) may be consulted.
Only the entire context space in the case of few history records is considered initially. As records increase, the context space can be divided more finely. T rounds since the recording is more completeThe time becomes shorter. At the time of,Only a small subspace is covered, which contains more contextual users. Setting a threshold valueLimiting the maximum number in each space when the number of records is greater than or equal to a thresholdThe space is further partitioned for accurate assessment. The context space only needs to be foundThe appropriate context space containing the context-related information can be obtained from the subspaces to which it belongs. If subspaceIs greater than a thresholdThen, thenWill be partitioned and the context space will be updated. By usingTo representThe maximum distance of (c).
Step 3, setting the reward estimated value B of the tree node (h, i), and selecting the optimal Internet of things cluster corresponding to the highest B value. Each tree node corresponds to a service cluster in the total service space,。
preferably, the calculation formula of the reward estimate value B is:
wherein, the superscript a represents the sequence number of EN, the subscript t represents the t-th round, and the subscript h, i represents the tree node (h, i);the average reward of experience is shown, and gamma is a parameter for balancing exploration and development;the expression of the Liphoz constant is shown,to representThe maximum distance of (a) is,represents the upper bound of the diameter of the subset region of tree nodes (h, i), infinity representing infinity.Is thatThe uncertainty of the context.
The B value represents the reward estimate for the tree node (h, i), used as the basis for service discovery. The first item is based on the evaluation of service cluster performance previously recorded, i.e. the exploitation of past experience. The second term is the uncertainty of the cluster feedback, indicating the exploration level of the cluster. The last term represents the uncertainty of the tree node size.
The empirical average reward of the tree nodes (h, i) is:
Representing the number of times tree nodes (h, i) are selected at ena until round t,representing the set of ena and its single-hop neighbors,to indicate the function, n is the total number of rounds.
Further, the service history tree is used in the service space model of the internet of thingsAnd context spaceRefreshing the service discovery treeAnd updating the B value, including:
for theTo judge the existenceNot exceeding a set thresholdEN a, then considering that EN a is an inexperienced node, needs to learn from other nodes and let EN a seek help from its neighboring EN by one hop, forAll ENs in time, the empirical average reward is calculated as:。
computing and updating the service discovery treeAverage empirical consideration ofThen, the B value is calculated and updated, andadding to the service discovery treeIn (1).
The discovery system updates only the B-values of tree nodes containing relevant records and adds them to the service discovery tree, thereby reducing the number of candidates for service clusters and the likelihood of selecting to unrelated tree nodes.
Step 4, the user is provided withSelecting an optimal Internet of things clusterSet of internet of things services inIn (1)And N is the total number of the Internet of things services in the set of the Internet of things services.
Step 5, if the number of the services selected by the current userNot more than N, andis thatIs then inLirandon recommendationProviding the service to the user; otherwise, recommend N services to the user and ask for help from neighboring ENs to recommend others-N services.
And 6, stopping the whole recommendation process after the user gives feedback.
The service model also includes a local differential privacy mechanismAnd step 2 is followed by: for the userInitial context vector ofAnd carrying out context random data perturbation processing, and calculating the influence of the perturbation processing on better service discovery through a loss function.
wherein,as a context vectorVia the local differential privacy mechanismPerturbing the set of post-operation mappings;,,representing a privacy factor.
further, after service provisioning, the user explicitly or implicitly provides feedback to the system (user-side rewards if the service is selected by the user, the service-side rewards may be evaluated by data monitored by the MEC network, and if not, the latest history may be utilized.
After the service system selects the optimal personalized service to recommend to the user, the discovery system calculates a total reward value according to the reward of the service end and the reward of the user end:
server-side rewards obtained from various ENs monitored by the SDN controller,the user terminal is awarded according to the execution time, the response time, the reliability and the like of the user.
Further, the discovery system also performs offline updating according to the completed service record:
in the service space model of the Internet of things, the service history tree is used for the serviceEach leaf tree node in (1)If, if(ii) a This indicates that leaf nodes have been selected a sufficient number of times that the tree should be expanded to obtain more precise regions and finer divisions, the service history tree is updated:
updating the B value:
Wherein,representing context vectorsThe number of contexts in (a) and (b),andindicating that a threshold is set.
The invention provides a context-aware online algorithm for local differential privacy and MEC support, which realizes sub-linear regret boundary and local differential privacy under the condition of not influencing the utility of context information and balances the accuracy of service discovery and the privacy protection level.
Only a single arm is considered to be selected in a round against the conventional CMAB algorithm, but many users have multiple requirements in a round and are therefore not applicable. The invention provides a context-aware online algorithm for local differential privacy and MEC support, which can process dynamic complex context problems, carry out balance between development and exploration after selecting proper arm, and select a group of arms by utilizing combined contextual multi-arm basis (CC-MAB) to meet different service requirements of each round of users. And the system can continuously learn the rewards of arms on the web, as the user context arrives, to maximize the total rewards.
Sensitive information of a user is protected on a user level instead of a service discovery system level by using a Local Differential Privacy (LDP) mechanism, random noise is introduced to interfere individual context by combining LDP and CC-MAB, the privacy of the user is ensured, and the balance between service discovery precision and local privacy/personal information utility is realized. The accuracy of the system is measured using the regret concept in multi-arm bandit, which is defined as the gap between the optimal service and the reward [35] of the actually selected service, the sub-linear regret means that our method converges to the optimal service discovery strategy. The L2 loss was introduced as a practical measure to evaluate privacy loss and data utility during random perturbations. We have demonstrated theoretically that our algorithm can achieve a sub-linear regret, ensuring that promising local differential privacy is provided for individual ENs and users, but without significantly impacting the information utility.
The invention provides a new context and combination bandit-based local differential privacy online learning method, which is used for service discovery in the Internet of things through an SDN. It guarantees that the sub-linear regret boundary indicates that the algorithm converges to the optimal strategy. Personalized service selection is possible because we take into account the end user's context and process the context information with adaptive context space partitioning. The performance of the IoT service is measured through the user side rewards and the service side rewards, so that the accuracy of the whole service discovery is improved. Under the cooperation of each EN and dynamic complex conditions in the Internet of things, the method supports a large data set which is continuously increased in an MEC scene. The privacy of the user is protected with local differential privacy while a balance is struck between the privacy protection level and the information utility.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (8)
1. An internet of things privacy protection service discovery system based on SDN and edge computing, the discovery system comprising: EN, SDN controller and service model;
the EN and the SDN controller are deployed in an MEC network; the SDN controller is used for controlling each EN to serve as a cooperative learner to cache and process information in the MEC network;
the service model comprises a context space model and an internet of things service space model;
the context space model carries out context space partition on the context records after preprocessing so as to mine and obtain similar context records;
the service space model of the Internet of things covers the total service space through a service history tree and a service discovery tree, the service history tree and the service discovery tree are infinite binary trees, and each tree node corresponds to a service cluster in the total service space; the service history tree stores all historical service records of the Internet of things and marks the partition state of the total service space; the service discovery tree is constructed and refreshed according to the service history tree and the context space and is used for discovering an Internet of things service cluster suitable for the current user so as to select the optimal personalized service and recommend the optimal personalized service to the user;
the service model also includes a local differential privacy mechanismTo the userInitial context vector ofThe context random data perturbation processing is carried out,representing injected context vectorsThe influence of the disturbance processing on the service discovery is calculated through a loss function;
wherein,as a context vectorVia the local differential privacy mechanismPerturbing the set of post-operation mappings;,,representing a privacy factor;representing a context spaceDimension;
2. the discovery system of claim 1 wherein said service model selects the best personalized service to recommend to said user comprises:
extracting service vectors into the service space of the Internet of things until a user registers new Internet of things service to EN a in the MEC networkTo EN a, the current context vector of the user is receivedAnd carrying out pretreatment in EN a at the t round; wherein EN a represents the a-th EN, the superscript a represents the sequence number of the EN, and the subscript t represents the t-th round;
the context space model is in context spaceFinding a context subspace of the service record to obtain enough service records of the Internet of things for reference;
setting a reward estimated value B value representing tree nodes (h, i), and selecting an optimal Internet of things cluster corresponding to the highest B value;
For the userSelecting an optimal Internet of things clusterSet of internet of things services inIn (1)N is the total number of the Internet of things services in the set of the Internet of things services;
if the number of services selected by the current userNot more than N, andis thatIs then inLirandon recommendationProviding the service to the user; otherwise, recommend N services to the user and ask for help from neighboring ENs to recommend others-N services;
and stopping the whole recommendation process after the user gives feedback.
3. The discovery system of claim 1 wherein said process of obtaining similar context records by said context space model comprises:
mapping each of the user's contexts to oneDimensional context space(ii) a In the t-th round, the user has a context vectorThe context vector is encodedSending to the context space model;
in each round, acquiring a valid record by mining the context information of the user, and taking the valid record as a reference for selecting the service type;
for the context spacePartitioning into a plurality of context subspaces, and ensuring that the maximum number of context records in each space does not exceed a set threshold; finding the context vectorThe subspaces to which the context information belongs, and the appropriate context space containing the context-related information is obtained to obtain similar context records.
4. The discovery system of claim 2 wherein said reward estimate value, B, is calculated by the formula:
wherein subscript h, i represents tree node (h, i);the average reward of experience is shown, and gamma is a parameter for balancing exploration and development;the expression of the Liphoz constant is shown,representing a context spaceThe maximum distance of (a) is,represents the upper limit of the diameter of the subset region of tree nodes (h, i), infinity represents infinity;
6. The discovery system of claim 4, wherein said IOT service space model is based on said service history treeAnd context spaceRefreshing the service discovery treeAnd updating the B value, including:
for theTo judge the existenceNot exceeding a set thresholdEN a seeks help from its neighboring hop EN, for EN aAll ENs in time, the empirical average reward is calculated as:;
7. The discovery system of claim 1 wherein, after said service model selects the best personalized service to recommend to said user, said discovery system calculates a total reward value based on the server-side reward and the client-side reward:
8. The discovery system of claim 1 wherein said discovery system performs offline updates based on completed business records:
in the service space model of the Internet of things, the service history tree is used for the serviceEach leaf tree node in (1)If, if(ii) a Updating the service history tree:
updating the B value:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110588548.2A CN113163019B (en) | 2021-05-28 | 2021-05-28 | Internet of things privacy protection service discovery system based on SDN and edge computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110588548.2A CN113163019B (en) | 2021-05-28 | 2021-05-28 | Internet of things privacy protection service discovery system based on SDN and edge computing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113163019A CN113163019A (en) | 2021-07-23 |
CN113163019B true CN113163019B (en) | 2021-09-14 |
Family
ID=76877965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110588548.2A Active CN113163019B (en) | 2021-05-28 | 2021-05-28 | Internet of things privacy protection service discovery system based on SDN and edge computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113163019B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110198302A (en) * | 2019-04-26 | 2019-09-03 | 华中科技大学 | A kind of method for secret protection and system for intelligent electric meter data publication |
CN110650487A (en) * | 2019-09-27 | 2020-01-03 | 常熟理工学院 | Internet of things edge computing configuration method based on data privacy protection |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10778412B2 (en) * | 2017-12-28 | 2020-09-15 | Intel Corporation | Multi-domain convolutional neural network |
US11244242B2 (en) * | 2018-09-07 | 2022-02-08 | Intel Corporation | Technologies for distributing gradient descent computation in a heterogeneous multi-access edge computing (MEC) networks |
CN109543094B (en) * | 2018-09-29 | 2021-09-28 | 东南大学 | Privacy protection content recommendation method based on matrix decomposition |
CN112035755B (en) * | 2020-07-14 | 2023-04-07 | 中国科学院信息工程研究所 | User-centered personalized recommendation privacy protection method and system |
-
2021
- 2021-05-28 CN CN202110588548.2A patent/CN113163019B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110198302A (en) * | 2019-04-26 | 2019-09-03 | 华中科技大学 | A kind of method for secret protection and system for intelligent electric meter data publication |
CN110650487A (en) * | 2019-09-27 | 2020-01-03 | 常熟理工学院 | Internet of things edge computing configuration method based on data privacy protection |
Non-Patent Citations (4)
Title |
---|
A Differentially Private Unscented Kalman Filter for Streaming Data in IoT;Jun Wang;《IEEE Access》;20180123;第6卷;全文 * |
Privacy-Preserving MEC-Enabled Contextual Online Learning via SDN for Service Selection in IoT;Difan Mu;《 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)》;20191207;第I-III节 * |
基于边缘辅助连接的位置差分隐私保护的研究;苗秋成;《中国优秀硕士学位论文全文数据库 信息科技辑》;20200115(第01期);全文 * |
移动互联服务与隐私保护的研究进展;李晖等;《通信学报》;20141125(第11期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113163019A (en) | 2021-07-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lv et al. | Big data driven hidden Markov model based individual mobility prediction at points of interest | |
US9547827B2 (en) | Terminal device, terminal control method, program and information processing system | |
Ahad et al. | Neural networks in wireless networks: Techniques, applications and guidelines | |
JP5536485B2 (en) | Portable terminal, server, program, and method for estimating address / location as user moves | |
CN110190918B (en) | Cognitive wireless sensor network spectrum access method based on deep Q learning | |
US20190318254A1 (en) | Method and apparatus for automated decision making | |
CN108829766B (en) | Interest point recommendation method, system, equipment and computer readable storage medium | |
Jeong et al. | Cluster-aided mobility predictions | |
Gao et al. | Distributed maintenance of cache freshness in opportunistic mobile networks | |
JP2018142957A (en) | Management device, program for making computer execute, and computer-readable recording medium recording program | |
Ren et al. | Spatio-temporal spectrum load prediction using convolutional neural network and ResNet | |
Papandrea et al. | Location prediction and mobility modelling for enhanced localization solution | |
Wang et al. | Attentional Markov model for human mobility prediction | |
JP6627496B2 (en) | Management device, program to be executed by computer, and computer-readable recording medium recording the program | |
Yan et al. | Two-dimensional task offloading for mobile networks: An imitation learning framework | |
Tuba et al. | Energy efficient sink placement in wireless sensor networks by brain storm optimization algorithm | |
Hasanin et al. | [Retracted] Efficient Multiuser Computation for Mobile‐Edge Computing in IoT Application Using Optimization Algorithm | |
Oh | Using an adaptive search tree to predict user location | |
CN113163019B (en) | Internet of things privacy protection service discovery system based on SDN and edge computing | |
CN107909498B (en) | Recommendation method based on area below maximized receiver operation characteristic curve | |
US20220368163A1 (en) | Systems and methods for wirelessly charging internet of things devices | |
Chen et al. | Context-aware online offloading strategy with mobility prediction for mobile edge computing | |
Xu | Autonomous Indoor Localization Using Unsupervised Wi-Fi Fingerprinting | |
Bobek et al. | Learning sensors usage patterns in mobile context-aware systems | |
JP6646606B2 (en) | Synchronization method and mobile communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |