{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:05:55Z","timestamp":1755223555576,"version":"3.43.0"},"reference-count":41,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Model. Simul. Sci. Comput."],"published-print":{"date-parts":[[2025,8]]},"abstract":"<jats:p> In the age of the Internet of Things (IoT), an immense volume of data is rapidly generated and entrusted to external units, including cloud centers for storage and analysis. This implies that the data produced by IoT devices is conveyed and stored in a distant location, where it can undergo processing, examination, and utilization to extract valuable insights and facilitate informed decision-making. Privacy protection methods can be applied in IoT settings to safeguard sensitive and private information from potential security risks. Within the scope of IoT privacy, data sanitization involves the permanent and irreversible concealment of all sensitive data from extensive streams of information. Conversely, data restoration is the reverse process of data sanitization. Considering privacy preservation in IoT for data streaming, this research paper implements a Deep Learning (DL) tuned key-based data sanitization and restoration approach. The entire process of the implemented approach is handled by two significant steps such as data sanitization and data restoration. In the data sanitization step, three processes take place such as retrieval of features, key generation via Self-Adaptive Osprey Optimization (SAOO) and key tuning via Enhanced Convolutional Neural Network (ECNN). Initially, features such as raw features, statistical features and improved entropy-based features are retrieved (considering this as sensitive information. To sanitize this, key generation is the subsequent phase, where optimal keys are generated by SAOO and its security and confidentiality are ensured by the Khatri\u2013Rao product. Then, these optimal keys are tuned by ECNN to ensure the efficacy of privacy preservation in IoT without compromising the performance of the model. Finally, the data restoration process is to recover the previously sanitized data in an IoT environment and reconstitute the original data from their sanitized form while maintaining the security and confidentiality of raw sensitive data. With these steps, the privacy of an IoT environment is protected from any form of issues. Additionally, this approach is experimentally explored to determine its efficacy using various analyses. <\/jats:p>","DOI":"10.1142\/s1793962325500473","type":"journal-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:22:02Z","timestamp":1747801322000},"source":"Crossref","is-referenced-by-count":0,"title":["Privacy preservation in IoT: Deep learning tuned key generation-assisted data sanitization and restoration process"],"prefix":"10.1142","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1805-0191","authenticated-orcid":false,"given":"Ravindra Sadashivrao","family":"Apare","sequence":"first","affiliation":[{"name":"Department of Information Technology, Trinity College of Engineering and Research, Near Khadimachine Chowk, KondhwaAnnexe, Savitribai Phule Pune University, Pune 411007, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7324-416X","authenticated-orcid":false,"given":"Manoj Limchand","family":"Bangare","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Smt. Kashibai Navale College Engineering, Savitribai Phule Pune University, Pune 411007, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9676-5600","authenticated-orcid":false,"given":"Nitin Sudam","family":"More","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, MIT Art, Design and Technology University, Pune 411007, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8326-6346","authenticated-orcid":false,"given":"Pushpa Manoj","family":"Bangare","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunication, Smt. Kashibai Navale College Engineering, Savitribai Phule Pune University, Pune 411007, Maharashtra, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3745-1687","authenticated-orcid":false,"given":"Ratnaprabha Ravindra","family":"Borhade","sequence":"additional","affiliation":[{"name":"Department of Electronics and Telecommunication, Cummins College of Engineering for Women, Savitribai Phule Pune University, Pune 411007, Maharashtra, India"}]}],"member":"219","published-online":{"date-parts":[[2025,7,10]]},"reference":[{"key":"S1793962325500473BIB001","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e19380"},{"key":"S1793962325500473BIB002","doi-asserted-by":"publisher","DOI":"10.1007\/s43621-024-00179-5"},{"key":"S1793962325500473BIB003","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.04.001"},{"key":"S1793962325500473BIB004","first-page":"7542","volume":"7","author":"Bangare M. L.","year":"2021","journal-title":"Des. Eng."},{"key":"S1793962325500473BIB005","doi-asserted-by":"publisher","DOI":"10.3233\/JHS-190619"},{"key":"S1793962325500473BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-023-05484-8"},{"key":"S1793962325500473BIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100831"},{"key":"S1793962325500473BIB008","doi-asserted-by":"publisher","DOI":"10.1109\/GCWCN.2018.8668616"},{"key":"S1793962325500473BIB009","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e17863"},{"key":"S1793962325500473BIB010","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103311"},{"key":"S1793962325500473BIB011","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.01.028"},{"key":"S1793962325500473BIB012","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3089435"},{"key":"S1793962325500473BIB013","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2885054"},{"key":"S1793962325500473BIB014","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100210"},{"key":"S1793962325500473BIB015","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2022.100003"},{"key":"S1793962325500473BIB016","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2020.10.015"},{"key":"S1793962325500473BIB017","doi-asserted-by":"publisher","DOI":"10.3390\/fi14090246"},{"key":"S1793962325500473BIB018","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpbup.2022.100071"},{"key":"S1793962325500473BIB019","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.12.008"},{"key":"S1793962325500473BIB020","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3070544"},{"key":"S1793962325500473BIB021","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937177"},{"key":"S1793962325500473BIB022","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2939286"},{"key":"S1793962325500473BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2941244"},{"key":"S1793962325500473BIB024","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800503"},{"key":"S1793962325500473BIB025","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.05.004"},{"key":"S1793962325500473BIB026","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.03.045"},{"key":"S1793962325500473BIB027","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.12.013"},{"key":"S1793962325500473BIB028","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2022.03.003"},{"key":"S1793962325500473BIB029","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.10.024"},{"key":"S1793962325500473BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3064691"},{"key":"S1793962325500473BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941575"},{"key":"S1793962325500473BIB032","first-page":"102517","volume":"53","author":"Wang C.","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"S1793962325500473BIB033","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.041"},{"key":"S1793962325500473BIB034","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2022.2149861"},{"key":"S1793962325500473BIB035","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxad016"},{"key":"S1793962325500473BIB036","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103053"},{"key":"S1793962325500473BIB037","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.706-708.1726"},{"issue":"3","key":"S1793962325500473BIB038","first-page":"306","volume":"42","author":"Kalyani G.","year":"2020","journal-title":"Int. J. Comput. Appl."},{"key":"S1793962325500473BIB039","doi-asserted-by":"publisher","DOI":"10.3389\/fmech.2022.1126450"},{"key":"S1793962325500473BIB040","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2976101"},{"key":"S1793962325500473BIB041","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00386-3"}],"container-title":["International Journal of Modeling, Simulation, and Scientific Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S1793962325500473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T03:18:59Z","timestamp":1754968739000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S1793962325500473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,10]]},"references-count":41,"journal-issue":{"issue":"04","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["10.1142\/S1793962325500473"],"URL":"https:\/\/doi.org\/10.1142\/s1793962325500473","relation":{},"ISSN":["1793-9623","1793-9615"],"issn-type":[{"type":"print","value":"1793-9623"},{"type":"electronic","value":"1793-9615"}],"subject":[],"published":{"date-parts":[[2025,7,10]]},"article-number":"2550047"}}