4.8 Article

Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices

Journal

IEEE TRANSACTIONS ON FUZZY SYSTEMS
Volume 30, Issue 5, Pages 1421-1435

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TFUZZ.2021.3059952

Keywords

Privacy; Systematics; Query processing; Linguistics; Real-time systems; Energy efficiency; Internet of Things; Edge computing; fuzzy sets; Internet of things; privacy protection; range query

Funding

  1. Zhejiang Natural Science Foundation of China [LY19F020024, LY19F020032, LY19F020023]
  2. National Natural Science Foundation of China [62072460, 62072407, 61802346, 61502421, 61532021]
  3. Key R&D Project of Zhejiang Province [2021C01117]
  4. Zhejiang Postdoctoral Research Project [ZJ2020089]
  5. China Scholarship Council

Ask authors/readers for more resources

This article proposes two privacy-aware fuzzy query processing schemes based on fuzzy theory and introduces linguistic range variables, fuzzy overlap information, and its recovery mechanism. It also devises two distributed privacy-aware fuzzy range query processing algorithms. The approaches aim to provide optimal performances in terms of privacy protection, reliability, energy efficiency, and real-time response.
Range query processing is a common edge computing and service in the Internet of things, which can extract user-interest information from distributed edge devices. How to design lightweight privacy-preserving range query processing methods remains a challenging task. Existing secure range query approaches suffer from both high communication cost and long response time, which makes them unsuitable for edge computing over resource-constrained edge devices. In this article, we propose two privacy-aware fuzzy query processing schemes based on fuzzy theory. Linguistic range variables, fuzzy overlap information, and its recovery mechanism are introduced. In addition, two distributed privacy-aware fuzzy range query processing algorithms are devised. Our approaches not only serve for privacy protection, but also aim to provide other optimal performances in terms of reliability, energy efficiency, and real-time response. Theoretical analysis and experimental evaluations based on real-world datasets validated our motivation.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available