Machine Learning and Enhanced Encryption for Edge Computing in IoT and Wireless Networks

Main Article Content

Bhalchandra M Hardas , Vaishali Raut , Prasanna Palsodkar , Mithun G Aush

Abstract

Machine Learning (ML) and better encryption methods is a key part of fixing the security and speed problems that Edge Computing causes in the Internet of Things (IoT) and Wireless Networks. The goal of this study is to improve the security of edge devices and networks so that critical data created and processed at the edge stays private and secure. Anomaly detection, threat identification, and adaptable security mechanisms depend on machine learning algorithms in a big way. These algorithms allow for proactive defenses against cyber dangers that are always changing. The proposed system used homomorphic encryption and quantum-resistant cryptography, to make data more private and secure. Even in edge devices with limited resources, these security methods keep data transfer and storage safe. The combination of machine learning and stronger encryption not only protects the IoT environment but also makes the best use of resources by changing security measures on the fly as threats change. This study adds to the development of safe and effective edge computing models, which helps IoT and wireless networks become more popular. The results can be used in many situations, from smart cities to industrial robotics. This makes sure that the advantages of edge computing can be enjoyed without putting the safety and privacy of the linked systems at risk.

Article Details

Section
Articles
Author Biography

Bhalchandra M Hardas , Vaishali Raut , Prasanna Palsodkar , Mithun G Aush

Dr. Bhalchandra M Hardas

2Dr.Vaishali Raut

3Dr.Prasanna Palsodkar

4Dr. Mithun G Aush

[1] Assistant Professor, Department of Electronics and Computer Science, Shri Ramdeobaba college of Engineering and Management, Nagpur, Maharashtra, India.

2Assistant Professor, Electronics & Telecommunications Engineering, G H Raisoni College of Engineeting and Management, Pune, Maharashtra, India

3Assistant Professor, Dept. of Electronics Engineering, Yeshwantrao Chavan College of Engineering, Nagpur, Maharashtra, India.

4Assistant Professor, Department of Electrical Engineering, Chh. Shahu College of Engineering, Aurangabad, Maharashtra, India

hardasbm@rknec.edu1, vaishraut02@gmail.com2, palsodkar.prasanna@gmail.com3, mithun.csmss@gmail.com4

References

L. Ding and M. Ben Salem, "A Novel Architecture for Automatic Document Classification for Effective Security in Edge Computing Environments," 2018 IEEE/ACM Symposium on Edge Computing (SEC), Seattle, WA, USA, 2018, pp. 416-420

Y. Li, H. Ling, X. Ren, C. Yu and T. Liu, "Privacy-Preserving Swarm Learning Based on Lightweight Homomorphic Encryption and Blockchain Technology," 2023 IEEE 5th Eurasia Conference on IOT, Communication and Engineering (ECICE), Yunlin, Taiwan, 2023, pp. 692-697

A. R, K. Renuka D, O. S and S. R, "Secured Data Sharing of Medical Images for Disease diagnosis using Deep Learning Models and Federated Learning Framework," 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), Coimbatore, India, 2023, pp. 499-504

X. Li, J. He, P. Vijayakumar, X. Zhang and V. Chang, "A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs," in IEEE Transactions on Industrial Informatics, vol. 18, no. 8, pp. 5494-5503, Aug. 2022

M. Nijim and H. Albataineh, "Secure-Stor: A Novel Hybrid Storage System Architecture to Enhance Security and Performance in Edge Computing," in IEEE Access, vol. 9, pp. 92446-92459, 2021.

J. Sharma, D. Kim, A. Lee and D. Seo, "On Differential Privacy-Based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment," in IEEE Access, vol. 9, pp. 38107-38118, 2021.

M. Yang, Y. He and J. Qiao, "Federated Learning-Based Privacy-Preserving and Security: Survey," 2021 Computing, Communications and IoT Applications (ComComAp), Shenzhen, China, 2021, pp. 312-317.

Ajani, S. N. ., Khobragade, P. ., Dhone, M. ., Ganguly, B. ., Shelke, N. ., & Parati, N. . (2023). Advancements in Computing: Emerging Trends in Computational Science with Next-Generation Computing. International Journal of Intelligent Systems and Applications in Engineering, 12(7s), 546–559

R. Dornala, S. Ponnapalli and K. Sai, "Blockchain Security in Edge Applications with Novel Load Balancing Approach," 2023 International Conference on Sustainable Communication Networks and Application (ICSCNA), Theni, India, 2023, pp. 263-269, doi: 10.1109/ICSCNA58489.2023.10370477.

T. S. Vasista, R. P. Singh and P. Kumar, "Advancing Healthcare: Unleashing the Potential of Cryptography, Blockchain, and Machine Learning," 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), Delhi, India, 2023, pp. 1-6.

G. Eibl, K. Bao, P.-W. Grassal, D. Bernau and H. Schmeck, "The influence of differential privacy on short term electric load forecasting", Energy Informat., vol. 1, pp. 48, Oct. 2018.

R. Civino, C. Blondeau and M. Sala, "Differential attacks: Using alternative operations", Des. Codes Cryptogr., vol. 87, no. 2, pp. 225-247, Mar. 2019.

A. R. Chowdhury, C. Wang, C. He, A. Machanajjhala and S. Jha, " Crypt $epsilon$ : Crypto-assisted differential privacy on untrusted servers ", Proc. ACM SIGMOD Int. Conf. Manage. Data (SIGMOD), pp. 603-619, Jun. 2020.

L. Ni, C. Li, X. Wang, H. Jiang and J. Yu, "DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data", IEEE Access, vol. 6, pp. 21053-21063, 2018.

Y. Zhang, Z. Hao and S. Wang, "A differential privacy support vector machine classifier based on dual variable perturbation", IEEE Access, vol. 7, pp. 98238-98251, 2019.