A Multi-Criteria Intelligence Aid Methodology and Iot Based Data Protection Using Machine Learning
A Multi-Criteria Intelligence Aid Methodology and Iot Based Data Protection Using Machine Learning
2023 Eighth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) | 979-8-3503-4779-1/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICONSTEM56934.2023.10142810
Abstract- — IoT-powered devices have become one of become one of the key threats to people in recent
the key companions of humans in recent times. Almost times. It has been found that incidents of
every sector of the modern market is heavily reliant on cyberattacks and cyberbullying are increasing day by
IoT-powered devices such as smartphones, computers day. One of the major examples of data breaching
and other smart gadgets. This has resulted in the
has been seen during the Facebookdata privacy
massive availability of digital data containing the
personal information of the users. This has caused a scandal way back in 2018 [1]. This has made the
massive issue regarding data privacy on IoT-powered issue of data protection and privacy much more
devices in recent times. This has resulted in the serious. IoT has become one of the key technologies
application of ML-based technologies for fostering in the modern world which has billions of connected
better data protection. The concerned study has devices across the world. Progress of IoT is also
focused on the role of the different ML-powered happening at a rapid pace and it is expected to have
technologies such as federated learning and 27 billion IoT devices by 2025. This massive use
differential learning models. Thai entre study has also and growth of IoT devices have resulted in large-
focused on numerical analysis of the issues associated scale user-generated data over the internet. It has
with the mentioned models during data protection. It
been reported that the amount of user-generated data
has also provided survey data regarding different FL-
based algorithms such as LM, NN, NM, DT and CM. will stand between 4 zettabytes to 140 zettabytes
This study has analyzed the issues and strengths of between2020-2025 [2]. A significant amount of
ML-based data protection on local and global data personal data of users is collected through IoT
sets. devices which can make the user's privacy very
vulnerable. It has resulted in reviewing the privacy
Keywords: federated learning, differential learning, machine policies and strategies associated with digital data
learning, distributed learning, cryptographic methods. systems. Concerning this, the evolution of new
technologies like machine learning has become
I.INTRODUCTION very crucial in recent times. Machine learning can be
one such technology which can help in fostering the
Technology has become one of the key factors in the data protection regime in IoT-powered devices and
modern-day world with its presence in almost every systems. However, ML can also play some different
sector. People are surrounded by technology at every roles to create problems regarding privacy protection
step and entire daily life operations are becoming in IoT-powered devices. This has made this entire
digital day by day. This has made a huge presence of study identify the opportunities of ML for data
digital data of people on internet media. This has
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on June 12,2023 at 07:31:31 UTC from IEEE Xplore. Restrictions apply.
protection regimes in IoT devices. However, besides
that, the entire study has also highlighted the
problems and privacy risks with different ML
models and systems. This entire study has attempted
to provide a comprehensive analysis and
investigation of the efficiency of ML in data
protection through different issues related to IoT-
powered tools. This entire study has also come up
with a detailed methodology for efficient data
collection regarding the mentioned issue. This entire
study has come up with numerical formulas for
analyzing the issues and problems in the ML and
FL-based data protection system. It has provided
survey data based on different algorithms used in the
SGD model of the FL learning system which is one
of the latest advancements in traditional ML
techniques. This analysis has helped the study to
also formulate future steps for better data protection
in future. Figure 1: IoT Data Protection (Source: [3])
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on June 12,2023 at 07:31:31 UTC from IEEE Xplore. Restrictions apply.
centralized learning method. For executing
centralized learning methods, this study collected
numerical data regarding federated learning and
gated recruiting units. The FL-based data protection
reads data sets which are stored in single or globally
predicted models. This has been one of the key
problems in FL-based data protection.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on June 12,2023 at 07:31:31 UTC from IEEE Xplore. Restrictions apply.
Table 1: Comparison between different ML-based
models for data protection
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on June 12,2023 at 07:31:31 UTC from IEEE Xplore. Restrictions apply.
be improved in future with more advanced ML [10] Chopra, P., Gollamandala, V.S., Ahmed, A.N., Babu, S.T.,
Kaur, C., Prasad, N.A. and Nuagah, S.J., 2022. Research Article
algorithms. This entire study has also provided a list Automated Registration of Multiangle SAR Images Using
of algorithms which can help in advance of Artificial Intelligence.
[11] Babu, S.T. and Rao, C.S., 2020, July. Statistical features based
cryptographic methods for data protection. This optimized technique for copy move forgery detection. In 2020
study may also help in betterment of differential 11th International Conference on Computing, Communication
learning method through CM and DP algorithms for and Networking Technologies (ICCCNT) (pp. 1-6). IEEE.
[12] Kalimuthukumar Sakthivel, Rajesh Krishnasamy, Kannapiran
data protection in future. Balasubramanian, Vijayakumar Krishnakumar , Manikandan
Ganesan “ A revolutionary Partial Resonant Inverter and
REFERENCES doubler rectifier with MPPT based on Sliding Mode Controller
for harvesting Solar photovoltaic sources”, Sustainable
Computing: Informatics and Systems, Volume 36 December
[1] Liu, B., Ding, M., Shaham, S., Rahayu, W., Farokhi, F. and Lin,
2022 100811. https://doi.org/10.1016/j.suscom.2022.100811
Z., 2021. When machine learning meets privacy: A survey and
[13] Kalimuthukumar Sakthivl,Rajesh Krishnasamy, Kannapiran
outlook. ACM Computing Surveys (CSUR), 54(2), pp.1-36.
Balasubramanian, Vijayakumar Krishnakumar and Manikandan
[2] Rodríguez, E., Otero, B. and Canal, R., 2023. A Survey of
Ganesan. “Averaged state space modelling and the applicability
Machine and Deep Learning Methods for Privacy Protection in
of the series Compensated Buck-Boost converter for harvesting
the Internet of Things. Sensors, 23(3), p.1252.
solar Photo Voltaic energy”, Sustainable Energy Technologies
[3] Zhao, P., Zhang, G., Wan, S., Liu, G. and Umer, T., 2020. A
and Assessments, Volume 53, Part C, October 2022, 102611
survey of local differential privacy for securing internet of
[14] T. Vino,S.S.Sivaraju,R. V.V. Krishna,T. Karthikeyan,Yogesh
vehicles. The Journal of Supercomputing, 76, pp.8391-8412.
kumar Sharma, K.G.S.Venkatesan, G.Manikandan,
[4] Liu, B., Ding, M., Shaham, S., Rahayu, W., Farokhi, F. and Lin,
R.Selvameena,and Mebratu Markos “Multicluster Analysis and
Z., 2021. When machine learning meets privacy: A survey and
Design of Hybrid Wireless Sensor Networks Using Solar
outlook. ACM Computing Surveys (CSUR), 54(2), pp.1-36.
Energy”, Hindawi, International Journal of Photoenergy,
[5] Liu, Y., James, J.Q., Kang, J., Niyato, D. and Zhang, S., 2020.
Volume 2022, Article ID 1164613, 8 pages,
Privacy-preserving traffic flow prediction: A federated learning
https://doi.org/10.1155/2022/1164613.
approach. IEEE Internet of Things Journal, 7(8), pp.7751-7763.
[15] Manikandan, G. and Anand, M. “SEC-TAED Based Error
[6] Rodríguez, E., Otero, B. and Canal, R., 2023. A Survey of
Detection and Correction technique for data transmission
Machine and Deep Learning Methods for Privacy Protection in
systems”, Indonesian Journal of Electrical Engineering and
the Internet of Things. Sensors, 23(3), p.1252.
Computer Science, Vol.10,No.2, May 2018, pp.696-703,
[7] ODSC, 2023. ““How You Can Use Federated Learning for
ISSN:2502-4752
Security & Privacy". Available at:
[16] S B G Tilak Babu and Ch Srinivasa Rao, "An optimized
https://odsc.medium.com/how-you-can-use-federated-learning-
technique for copy–move forgery localization using statistical
for-security-privacy-ee0c99cf54b3 [Accessed on 14/03/2023
features", ICT Express, Volume 8, Issue 2, Pages 244-249,
[8] Li, Q., Wen, Z., Wu, Z., Hu, S., Wang, N., Li, Y., Liu, X. and
2022.
He, B., 2021. A survey on federated learning systems: vision,
[17] Ashokkumar, N., and A. Kavitha. "Transition level energy
hype and reality for data privacy and protection. IEEE
consumption of NoC (network-on-chip) using data encoding
Transactions on Knowledge and Data Engineering.
techniques." 2015 2nd International Conference on Computing
[9] Chopra, P., Gollamandala, V.S., Ahmed, A.N., Babu, S.B.G.,
for Sustainable Global Development (INDIACom). IEEE, 2015.
Kaur, C., Achyutha Prasad, N. and Nuagah, S.J., 2022.
Automated Registration of Multiangle SAR Images Using
Artificial Intelligence. Mobile Information Systems, 2022.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on June 12,2023 at 07:31:31 UTC from IEEE Xplore. Restrictions apply.