Blockchain and Federated Learning For Privacy-Preserved Data Sharing in Industrial IoT
Blockchain and Federated Learning For Privacy-Preserved Data Sharing in Industrial IoT
Abstract—The rapid increase in the volume of data gener- privacy [1]. Data leakage may take place during data storage,
ated from connected devices in industrial Internet of Things data transmission and data sharing, which may lead to serious
paradigm, opens up new possibilities for enhancing the issues for both owners and providers. In this regard, existing
quality of service for the emerging applications through
data sharing. However, security and privacy concerns (e.g., work mainly focuses on utilizing aggregate information about
data leakage) are major obstacles for data providers to the data, without breaking the privacy of the participants. They
share their data in wireless networks. The leakage of address the problem by making some modifications to the
private data can lead to serious issues beyond financial key contributions of original data, such as k-anonymity [2],
loss for the providers. In this article, we first design a l-diversity [3]. But most of the methods assume that the attack-
blockchain empowered secure data sharing architecture for
distributed multiple parties. Then, we formulate the data ers only have limited background knowledge, where the data
sharing problem into a machine-learning problem by incor- are still vulnerable to algorithm-based attacks or background
porating privacy-preserved federated learning. The privacy knowledge attack. Differential privacy [4] provides the most
of data is well-maintained by sharing the data model instead reliable privacy guarantee, which is generally considered strong
of revealing the actual data. Finally, we integrate feder- enough to protect data from privacy attacks. A machine learning
ated learning in the consensus process of permissioned
blockchain, so that the computing work for consensus can differentially private [5] was proposed to publish data struc-
also be used for federated training. Numerical results de- tures instead of publishing queries and answers directly, in the
rived from real-world datasets show that the proposed data constraint of differential privacy.
sharing scheme achieves good accuracy, high efficiency, Data from IIoT applications may include sensitive infor-
and enhanced security. mation. In this regard, protecting data privacy is a key issue.
Index Terms—Data sharing, federated learning, indus- In [6], the authors proposed a protection method that satisfies
trial Internet of Things (IIoT), permissioned blockchain,
privacy-preserved.
differential privacy to protect location data privacy, without
reducing much utility of data in IIoT. There are also some
I. INTRODUCTION works exploring the use of blockchain to enhance data security
HE AMOUNT of data generated by the connected de- in IIoT. In [7], the authors also integrated blockchain into
T vices in the industrial Internet of Things (IIoT) paradigm
has witnessed a massive growth in Industry 4.0. Along with
edge intelligence for resource allocation in IIoT. Though the
combination is promising, the machine-learning methods can
the value the data brings, comes serious concerns about data be further improved. Therefore, some works exploited Markov
models, which can illustrate activity transactions without having
Manuscript received May 31, 2019; revised August 13, 2019 and knowledge of the problem in hand [8], for resource allocation.
September 3, 2019; accepted September 3, 2019. Date of publication For example, in [9], the authors leveraged deep reinforcement
September 18, 2019; date of current version February 28, 2020. This learning (DRL) for task offloading and transmission scheduling.
work was supported in part by the Joint Funds of National Natural
Science Foundation of China and Xinjiang under Project U1603261, The using of new machine-learning technology also brings new
and in part by the National Natural Science Foundation of China under security threats such as cyber stealth attacks [10], which imposes
Project 61602055. Paper no. TII-19-2282. (Corresponding author: Yan new security requirements [11] for protecting data privacy in
Zhang.)
Y. Lu and X. Huang are with the Institute of Network Technology, sharing process. In [12], the authors implemented a protocol that
Beijing University of Posts and Telecommunications, Beijing 100876, turns a blockchain into an automated access-control manager,
China (e-mail:, [email protected]; [email protected]). to ensure that users can own and control their data. In [13], the
Y. Dai is with the University of Electronic Science and Technology of
China, Chengdu 611731, China (e-mail:, [email protected]). authors proposed a blockchain-enabled efficient data collection
S. Maharjan is with the Simula Metropolitan Center for Digital Engi- and secure sharing scheme combining Ethereum blockchain and
neering, Norway, and also with the University of Oslo, 1325 Oslo, Norway DRL to create a reliable and safe environment. Among these
(e-mail:, [email protected]).
Y. Zhang is with the Department of Informatics, University of Oslo, works, consensus protocols are a core technical component to
1325 Oslo, Norway (e-mail:, [email protected]). achieve consensus among all participating nodes. In proof-of-
Color versions of one or more of the figures in this article are available work (PoW) [14], the miner that solves a mathematical puzzle
online at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TII.2019.2942190 first wins the right to produce a block. However, heavy resource
1551-3203 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
4178 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
LU et al.: BLOCKCHAIN AND FEDERATED LEARNING FOR PRIVACY-PRESERVED DATA SHARING IN INDUSTRIAL IoT 4179
A. Treat Model
results toward request Req. The cached results are then sent
We focus on collaborative data sharing, where K data
to the requester as a reply. Otherwise, for a new data sharing
providers (owners) and one data requester work together to
request, the multiparty data retrieval process is executed to find
accomplish a data sharing task. The data providers and data
the related parties according to the registration records. We
requester are considered as dishonest. The proposed mechanism
regard these parties as committee nodes, which are responsible
is vulnerable to three types of threats. The first is the quality of
for driving the consensus in permissioned blockchain. Then,
the provided data. Dishonest providers may provide biased and
the committee nodes train a global data model M jointly by
inaccurate results to the requester, reducing the usability of the
federated learning. Once the model is trained, the data requester
entire shared data. The second is data privacy. Providers and
r uses Req = {f1 , f2 , . . ., fx } as the input of the M and gets
receivers may try to infer the private data of others from shared
the corresponding sharing results M(Req). Data model M can
data, which may lead to unwanted sensitive data leakage from
accept any query fx in the query set Fx and provide a result
data providers. The threat of collusion also exists if a group of
M(fx ) for the query. In addition, as a machine learning model,
participants try to infer the data of other participants. The third
M can also make predictions on the fresh query that f y ∈ / Fx .
is data authority management. Once the raw data is shared, the
data owner will lose control over these data and the data may be
shared to other unauthorized entities by a dishonest participant. III. BLOCKCHAIN AND FEDERATED LEARNING
FOR SECURE DATA SHARING
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
4180 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
Since most of the data are sensitive and its amount is large, it is di (Pi , Pj ) = Pj
m ,n ∈P i ∪P j (am n + am n )
Pi
a resource intensive and risky task to put data on the blockchain
with its limited storage space. Thus, we utilize blockchain to · log(dp (Pi , Pj )) (1)
retrieve data, while the real data is stored locally by its owners.
P
When a new data provider participates in, its unique identity (ID) where aPmin , amjn are the elements of weighted matrix for node
is recorded as a transaction in the blockchain, together with the Pi and node Pj , respectively. The ID of each participant (device)
profiles of its data, including data categories, data types, and is generated according to the logic distance. That is, the more
data size. All the profiles of data from multiple participants relative two nodes are, the longer their common ID prefix will be.
will be recorded in forms of transactions, and will be verified Given two nodes Pi and Pj with IDs Pi (id) and Pj (id)),
by the blockchain nodes through adopting Merkle tree [24]. respectively. The relevance distance between them is defined as
Each data sharing event is also stored in the blockchain as a
d(Pi , Pj ) = Pi (id) ⊕ Pj (id). (2)
transaction. The detailed forms of the two transactions—the
retrieval transactions recording data profiles of permissioned When a user submits a data sharing request to its nearby node
participants and the data sharing transactions recording all the Pi , all nodes in the same community with Pi send the request
ˇ data sharing events— shown in Fig. ˇ4. ˇ to the nodes in their local routing table with a certain distance
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
LU et al.: BLOCKCHAIN AND FEDERATED LEARNING FOR PRIVACY-PRESERVED DATA SHARING IN INDUSTRIAL IoT 4181
to start the retrieving process. This process will be implemented 3) Launching Data Sharing Requests: Data requester r
recursively until all nodes within the relevant distance have been posts a data sharing request Req = {f1 , f2 , . . ., fx } to
traversed. At the end of retrieval, we get the related subset nodes its nearby super node SNreq . Request Req contains the
toward the request, Ps ⊆ P, which are also the committee nodes ID of r, the requested data category and the timestamp,
for running a consensus process to approve the data sharing which is signed by r with its private key SKr .
results. 4) Data Retrieval: Once a nearby node receives the data
sharing request, it verifies the ID of requester r. Then, it
searches permissioned blockchain to confirm whether the
C. Data Sharing Process request has been processed before. If there is a record, the
Existing methods use encryption for data security. However, cached model is returned as the reply. Otherwise, it runs
in data sharing scenarios, it is still risky for data holders to share the multiparty retrieval process to find the related parties.
the original data due to various attacks toward the encryption. A 5) Data Model Learning: The related parties work collab-
more secure method is to share the answers toward the requests, oratively to respond to the sharing request. They run
which can provide the requesters with valid information and federated learning to train a global data model M toward
protect privacy of data holders. The data providers share learned the request Req. The training set is generated based on
data models with the requesters instead of the original data. local data D and corresponding query results f x(D),
When the data requester r initiates a sharing request Req, DT = < fx , fx (D) >. The learning global model M is
it submits the request to its nearby super node SNreq of the then returned to the requester as a reply and is cached by
permissioned blockchain. SNreq first searches the blockchain to a node locally for future requests.
find out whether the request has been processed before. If there 6) Generating Data Sharing Records: The data sharing
is a lookup hit, then the cached data model M calculated before events between data requesters and data providers are
is returned to the requester directly. Otherwise, node SNreq looks generated as transactions and broadcasted in permis-
up the blockchain for related nodes—committee nodes, toward sioned blockchain. All the records are collected into
the sharing request r, through the aforementioned multiparty blocks, which are encrypted and signed by the collecting
data retrieval process. The committee nodes are responsible for node.
executing the consensus process and learn the federated data 7) Carrying Out Consensus: The consensus process is ex-
model M collaboratively. A committee node Pi learns a local ecuted by the related nodes selected for data retrieval.
data model mi for the requests from requesters, then it will send Each node competes for the opportunity to write blocks
model mi to other related participants, according to the local to the blockchain through PoW protocol. The node who
retrieval table of Pi . This process is repeated jointly on various wins the competition broadcasts its block to other nodes
related parties, until all related parties are traversed. The trained for verification. Once the verification is passed, the
data model M will be returned to requester r, as the answer to block is added to the permissioned blockchain, which
its data sharing requests. is tamper-proof.
The detailed steps of our data sharing scheme are as follows. Combining federated learning with permissioned blockchain,
1) Initialization: Before a data provider Pi joins, a local the requested data can be retrieved and shared securely in
clustering based on Jaccard similarity is executed to industrial IoT scenarios with distributed multiple data providers,
cluster its textual data into various categories. We se- which can improve the scale and quality of shared data. How-
rialize the key terms as vectors in a certain order to ever, the PoW consensus protocol incurs both high energy
represent a category. The more similar two datasets are, consumption and computation overhead, thus making it less
the closer their distance is. Then, its nearby super nodes, practical for IoT devices to adopt. To address this issue, we
to which Pi belongs, will search the blockchain to find further propose a new consensus to improve the utility and
the records which are logically close (according to XOR efficiency of computing work in the consensus protocol.
distance) to it. For each participant, we generate its ID
based on the hashed vectors to ensure that participants
D. Consensus: Proof of Training Quality (PoQ)
holding similar datasets have similar IDs. In addition, to
enhance computing efficiency, we divide the participants Transferring the data sharing problem into model sharing
in advance by running a community partition process, brings many benefits in data sharing. Sharing the data model
where all nodes are partitioned into various communities only instead of original data, helps protect privacy of data
according to their distances toward each other. owners. In addition, the machine learning data models are more
2) Registering Retrieval Records: Once Pi joins, it first effective to provide the required information for new sharing
sends its public key PKr and its data profiles to the nearby requests.
super node for registration. Then, a data retrieval record Directly using existing consensus such as PoW for data
for Pi is generated and broadcasted by the node to other sharing either brings high cost of computing and communi-
nodes in permissioned blockchain for verification. Other cation resources, or makes limited additional contribution to
nodes collect all received records and verify them before data sharing. To address this problem, we propose a federated
writing them into permissioned blockchain. learning empowered consensus—PoQ protocol. PoQ combines
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
4182 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
LU et al.: BLOCKCHAIN AND FEDERATED LEARNING FOR PRIVACY-PRESERVED DATA SHARING IN INDUSTRIAL IoT 4183
TABLE I
RECORD TUPLE OF A MODEL TRANSACTION
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
4184 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
B. Evaluation Setup
We conduct evaluations of the proposed secure data sharing
scheme on two real-world data sets, which is widely used for
evaluating text-related machine learning algorithms. The first
one is Reuters dataset [27], a benchmark dataset for classifi-
cation tasks. The dataset consists of a series of short files in
various topics appeared on Reuters newswire. It contains a total
of 15 732 files in 116 categories. The second one is the 20
newsgroups dataset [28], which is a collection of approximately
20 000 newsgroup files. The data are partitioned into 20 different
groups, where each group is related to one topic. The data in the
two datasets is unstructured short text, which is quite different Fig. 10. AUC in various datasets (Reuters).
from the structured data in databases. We use the two datasets
to simulate the large amount of unstructured short data pieces
in IIoT, such as the configuration files generated from various
vehicular applications and the status log files.
We divide the sorted dataset into shards and recombine
the shards into subsets to simulate the distributed multiple
participants in our data sharing scheme. Classification anal-
ysis is used to simulate the data sharing tasks. We im-
plement our improved distributed GBDT on textual data
to execute the federated learning process over distributed
datasets.
Fig. 11. Running time in various datasets (20News).
C. Numerical Results
Receiver operating characteristic (ROC) curve is widely used and 9). It can be seen that the AUC results change little as
to illustrate the diagnostic ability of a classifier scheme, whose the number of data providers increases, which indicates our
discrimination threshold is varied. We use the area under the proposed model is scalable. Since the global model in federated
ROC curve (AUC) to evaluate the accuracy of the model. The learning is aggregated from all local models, and each local
performance of our proposed mechanism in various distributed model is trained on local data, the number of data providers
datasets, compared with a benchmark method, text graph convo- has little effect on the performance of the aggregated model.
lutional networks [29], is shown in Figs. 9 and 10. From Fig. 9, Fig. 11 shows that the running time of our proposed mechanism
we can conclude that compared with the benchmark method, varies from milliseconds to seconds with an average of 880 ms
most of our testing groups obtain high accuracy with an average in different subdatasets. From Fig. 12, we can see that, for
AUC value of 0.918, which indicates that our proposed federated the same dataset, the running time increases with the number
learning mechanism achieves high diagnostic ability. We can of data providers involved. The reason is that the more data
also observe that the accuracy changes not so smoothly. The providers, the more time it takes to implement the collaborative
reason is that the number of files in each subset is a fixed discrete working process. Moreover, the results of running time show
value, and the accuracy is also related to the characteristics of that the performance of the proposed federated learning based
files from different subset, which can not be a continuously data sharing scheme is near real time.
changing value as the size of data increases. Fig. 10 shows Through the above evaluation, we can observe that the
the AUC results with various number of data providers (3, 6, increase in data providers has little effect on the accuracy of our
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
LU et al.: BLOCKCHAIN AND FEDERATED LEARNING FOR PRIVACY-PRESERVED DATA SHARING IN INDUSTRIAL IoT 4185
REFERENCES
[1] E. Sisinni, A. Saifullah, S. Han, U. Jennehag, and M. Gidlund, “Industrial
Internet of Things: Challenges, opportunities, and directions,” IEEE Trans.
Ind. Informat., vol. 14, no. 11, pp. 4724–4734, Nov. 2018.
[2] L. Sweeney, “k-anonymity: A model for protecting privacy,” Int. J.
Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 05, pp. 557–570,
2002.
[3] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam,
“l-diversity: Privacy beyond k-anonymity,” in Proc. 22nd Int. Conf. Data
Eng., 2006, pp. 24–24.
[4] C. Dwork, “Differential privacy in new settings,” in Proc. 21st Annu.
ACM-SIAM Symp. Discrete Algorithms, 2010, pp. 174–183.
[5] T. Zhu, G. Li, W. Zhou, and S. Y. Philip, “Differentially private data
publishing and analysis: A survey,” IEEE Trans. Knowl. Data Eng.,
vol. 29, no. 8, pp. 1619–1638, Aug. 2017.
[6] C. Yin, J. Xi, R. Sun, and J. Wang, “Location privacy protection based
on differential privacy strategy for big data in industrial Internet of
Fig. 12. Running time in various datasets (Reuters). Things,” IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 3628–3636,
Aug. 2018.
[7] K. Zhang, Y. Zhu, S. Maharjan, and Y. Zhang, “Edge intelligence and
blockchain empowered 5G beyond for industrial Internet of Things,” IEEE
Netw. Mag., to be published.
proposed scheme, while the running time increases evidently. [8] C. Alcaraz, L. Cazorla, and G. Fernandez, “Context-awareness using
The stable accuracy is due to that our scheme can execute anomaly-based detectors for smart grid domains,” in Proc. Int. Conf. Risks
parallel local training, where the federated mode ensures the Sec. Internet Syst., 2014, pp. 17–34.
[9] K. Zhang, S. Leng, X. Peng, P. Li, S. Maharjan, and Y. Zhang, “Artifi-
stable learning accuracy. Yet the increase in data providers cial intelligence inspired transmission scheduling in cognitive vehicular
brings more local models to be updated and computed, which communications and networks,” IEEE Internet Things J., vol. 6, no. 2,
increases the time for training and update transmission. Thus, pp. 1987–1997, Apr. 2019.
[10] L. Cazorla, C. Alcaraz, and J. Lopez, “Cyber stealth attacks in critical
the running time increases with the increase of data providers. information infrastructures,” IEEE Syst. J., vol. 12, no. 2, pp. 1778–1792,
Despite the slightly increased running time, the participation of Jun. 2018.
multiple data providers enlarges the scale of data for computing [11] C. Alcaraz and J. Lopez, “Analysis of requirements for critical control
systems,” Int. J. Crit. Infrastruct. Protection, vol. 5, nos., 3–4, pp. 137–145,
results, which enables the sharing of data to improve the quality 2012.
of vehicular applications. [12] G. Zyskind, O. Nathan, and A. Pentland, “Decentralizing privacy: Using
blockchain to protect personal data,” in Proc. IEEE Sec. Privacy Work-
shops, May 2015, pp. 180–184.
[13] C. H. Liu, Q. Lin, and S. Wen, “Blockchain-enabled data collection and
sharing for industrial IoT with deep reinforcement learning,” IEEE Trans.
V. CONCLUSION Ind. Informat., vol. 15, no. 6, pp. 3516–3526, Jun. 2019.
[14] S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008.
In this article, we proposed a privacy-preserving data sharing [Online]. Available: https://bitcoin.org/bitcoin.pdf
mechanism for distributed multiple parties in IIoT applica- [15] S. Goryczka, L. Xiong, and B. C. Fung, “m-privacy for collaborative data
publishing,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 10, pp. 2520–
tions, which incorporates federated learning into permissioned 2533, Oct. 2014.
blockchain. The illustrative numerical results, showed that our [16] A. Friedman, I. Sharfman, D. Keren, and A. Schuster, “Privacy-preserving
blockchain empowered data sharing scheme enhances the secu- distributed stream monitoring,” in Proc. 35th Annu. IEEE Netw. Distrib.
Syst. Secur. Symp., 2014, pp. 1–9.
rity during sharing process without requiring centralized trust. [17] Z. Qin, T. Yu, Y. Yang, I. Khalil, X. Xiao, and K. Ren, “Generating
Moreover, by integrating federated learning into the consensus synthetic decentralized social graphs with local differential privacy,” in
process of permissioned blockchain, we not only improved Proc. ACM SIGSAC Conf. Comput. Commun. Sec, 2017, pp. 425–438.
[18] A. H. Sodhro, S. Pirbhulal, and V. H. C. de Albuquerque, “Artificial
the utilization of computing resource but also increased the intelligence-driven mechanism for edge computing-based industrial ap-
efficiency of the data sharing scheme. Numerical results on two plications,” IEEE Trans. Ind. Informat., vol. 15, no. 7, pp. 4235–4243,
benchmark real-world datasets corroborated that our proposed Jul. 2019.
[19] A. K. Sangaiah, D. V. Medhane, T. Han, M. S. Hossain, and G. Muham-
mechanism can enable secure data sharing with high efficiency mad, “Enforcing position-based confidentiality with machine learning
and utility. paradigm through mobile edge computing in real-time industrial infor-
The combination of blockchain and federated learning is a matics,” IEEE Trans. Ind. Informat., vol. 15, no. 7, pp. 4189–4196,
Jul. 2019.
promising way to enable secure and intelligent data sharing [20] J. Konečnỳ, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh, and
in IIoT. However, how to efficiently guarantee data privacy by D. Bacon, “Federated learning: Strategies for improving communication
applying blockchain technique is still an open issue, which needs efficiency,” 2016. [Online]. Available: https://arxiv.org/abs/1610.05492
[21] R. C. Geyer, T. Klein, and M. Nabi, “Differentially private federated
to be further explored by analyzing more security threats and learning: A client level perspective,” 2017, arXiv:1712.07557. [Online].
developing more effective solutions. Moreover, how to improve Available: https://arxiv.org/abs/1712.07557
the utility of data models mapped from raw data, regardless of [22] Z. Yu et al., “Federated learning based proactive content caching in edge
computing,” in Proc. IEEE Global Commun. Conf., 2018, pp. 1–6.
the specific computing tasks and machine learning algorithms, [23] S. Niwattanakul, J. Singthongchai, E. Naenudorn, and S. Wanapu, “Using
is a critical problem to be addressed in data sharing. New of jaccard coefficient for keywords similarity,” in Proc. Int. MultiConf.
intelligent mechanisms are required to improve data utility. In Eng. Comput. Scientists, 2013, pp. 380–384.
[24] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk:
addition, the limited resource of devices imposes new challenges The blockchain model of cryptography and privacy-preserving smart
for improving the efficiency of data sharing in IIoT. contracts,” in Proc. IEEE Symp. Sec. Privacy, 2016, pp. 839–858.
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.
4186 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 16, NO. 6, JUNE 2020
[25] P. Maymounkov and D. Mazières, “Kademlia: A peer-to-peer information Sabita Maharjan (M’09) received the Ph.D. de-
system based on the XOR metric,” in Peer-to-Peer Systems, P. Druschel, gree in networks and distributed systems from
F. Kaashoek, and A. Rowstron, Eds., Berlin, Germany: Springer, 2002, Simula Research Laboratory and University of
pp. 53–65. Oslo, Oslo, Norway, in 2013.
[26] C. Dwork, “A firm foundation for private data analysis,” Commun. ACM, She is currently a Senior Research Scientist
vol. 54, no. 1, pp. 86–95, 2011. with the Simula Metropolitan Center for Digital
[27] D. D. Lewis, “Reuters dataset,” 2019. [Online]. Available: http://www. Engineering, Oslo, and an Associate Profes-
daviddlewis.com/resources/testcollections/ sor with the Department of Informatics, Uni-
[28] “20newsgroups,” 2019. [Online]. Available: http://qwone.com/jason/ versity of Oslo. Her research interests include
20Newsgroups/ wireless networks, network security and re-
[29] L. Yao, C. Mao, and Y. Luo, “Graph convolutional networks for text silience, smart grid communications, Internet of
classification,” in Proc. AAAI Conf. Artif. Intell., vol. 33, 2019, pp. 7370– Things, machine-to-machine communication, software-defined wireless
7377. networking, and the Internet of Vehicles.
Authorized licensed use limited to: East China Univ of Science and Tech. Downloaded on April 16,2021 at 03:05:13 UTC from IEEE Xplore. Restrictions apply.