{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T17:46:35Z","timestamp":1762710395550,"version":"3.41.2"},"reference-count":31,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2023,2,27]],"date-time":"2023-02-27T00:00:00Z","timestamp":1677456000000},"content-version":"vor","delay-in-days":57,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862052"],"award-info":[{"award-number":["61862052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2023,1]]},"abstract":"<jats:p>With the continuous improvement of computation and communication capabilities, the Internet of Things (IoT) plays a vital role in many intelligent applications. Therefore, IoT devices generate a large amount of data every day, which lays a solid foundation for the success of machine learning. However, the strong privacy requirements of the IoT data make its machine learning very difficult. To protect data privacy, many privacy\u2010preserving machine learning schemes have been proposed. At present, most schemes only aim at specific models and lack general solutions, which is not an ideal solution in engineering practice. In order to meet this challenge, we propose an efficient and privacy\u2010preserving machine learning training framework (ePMLF) in a fog computing environment. The ePMLF framework can let the software service provider (SSP) perform privacy\u2010preserving model training with the data on the fog nodes. The security of the data on the fog nodes can be protected and the model parameters can only be obtained by SSP. The proposed secure data normalization method in the framework further improves the accuracy of the training model. Experimental analysis shows that our framework significantly reduces the computation and communication overhead compared with the existing scheme.<\/jats:p>","DOI":"10.1155\/2023\/8292559","type":"journal-article","created":{"date-parts":[[2023,2,28]],"date-time":"2023-02-28T02:50:06Z","timestamp":1677552606000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["ePMLF: Efficient and Privacy\u2010Preserving Machine Learning Framework Based on Fog Computing"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2023-4376","authenticated-orcid":false,"given":"Ruoli","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0472-5378","authenticated-orcid":false,"given":"Yong","family":"Xie","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9658-2313","authenticated-orcid":false,"given":"Hong","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7713-3520","authenticated-orcid":false,"given":"Xingxing","family":"Jia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9534-4719","authenticated-orcid":false,"given":"Syed Hamad","family":"Shirazi","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2023,2,27]]},"reference":[{"key":"e_1_2_12_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2923261"},{"key":"e_1_2_12_2_2","doi-asserted-by":"crossref","unstructured":"YangL. ZhengQ. andFanX. Rspp: a reliable searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks Proceedings of the IEEE INFOCOM 2017-IEEE Conference on Computer Communications May 2017 Atlanta GA USA IEEE 1\u20139.","DOI":"10.1109\/INFOCOM.2017.8056954"},{"key":"e_1_2_12_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3099368"},{"key":"e_1_2_12_4_2","unstructured":"GeyerR. C. KleinT. andNabiM. Differentially private federated learning: a client level perspective 2017 https:\/\/arxiv.org\/abs\/1712.07557."},{"key":"e_1_2_12_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3060764\u201312.118"},{"key":"e_1_2_12_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.2980192"},{"key":"e_1_2_12_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.054"},{"key":"e_1_2_12_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3004231"},{"key":"e_1_2_12_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2987958"},{"key":"e_1_2_12_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2020.3027758"},{"key":"e_1_2_12_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2956615"},{"key":"e_1_2_12_12_2","doi-asserted-by":"crossref","unstructured":"LiuL. ZhangJ. SongS. andLetaiefK. B. Client-edge-cloud hierarchical federated learning Proceedings of the ICC 2020-2020 IEEE International Conference on Communications (ICC) June 2020 Dublin Ireland IEEE 1\u20136.","DOI":"10.1109\/ICC40277.2020.9148862"},{"key":"e_1_2_12_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.015"},{"key":"e_1_2_12_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-016-0284-9"},{"key":"e_1_2_12_15_2","doi-asserted-by":"crossref","unstructured":"MehnazS. BellalaG. andBertinoE. A secure sum protocol and its application to privacy-preserving multi-party analytics Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies June 2017 New York NY USA 219\u2013230.","DOI":"10.1145\/3078861.3078869"},{"key":"e_1_2_12_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3046509"},{"key":"e_1_2_12_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2019.2929409"},{"key":"e_1_2_12_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.12.007"},{"key":"e_1_2_12_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.04.098"},{"key":"e_1_2_12_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2015.2470255"},{"key":"e_1_2_12_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1019-9"},{"key":"e_1_2_12_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.2971598"},{"key":"e_1_2_12_23_2","first-page":"222","article-title":"Privacy-preserving outsourced clinical decision support system in the cloud","volume":"14","author":"Liu X.","year":"2017","journal-title":"IEEE Transactions on Services Computing"},{"key":"e_1_2_12_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054135"},{"key":"e_1_2_12_25_2","doi-asserted-by":"crossref","unstructured":"El MakkaouiK. Beni-HssaneA. andEzzatiA. Cloud-elgamal: an efficient homomorphic encryption scheme Proceedings of the 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM) October 2016 Fez Morocco IEEE 63\u201366.","DOI":"10.1109\/WINCOM.2016.7777192"},{"volume-title":"Machine learning classification over encrypted data","year":"2014","author":"Bost R.","key":"e_1_2_12_26_2"},{"key":"e_1_2_12_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.06.017"},{"key":"e_1_2_12_28_2","unstructured":"Gilad-BachrachR. DowlinN. LaineK. LauterK. NaehrigM. andWernsingJ. Cryptonets: applying neural networks to encrypted data with high throughput and accuracy Proceedings of the International Conference on Machine Learning January 2016 New York NY USA PMLR 201\u2013210."},{"key":"e_1_2_12_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.05.003"},{"key":"e_1_2_12_30_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"e_1_2_12_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3119897"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/8292559.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijis\/2023\/8292559.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2023\/8292559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T05:17:17Z","timestamp":1735622237000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2023\/8292559"}},"subtitle":[],"editor":[{"given":"Paolo","family":"Gastaldo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,1]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10.1155\/2023\/8292559"],"URL":"https:\/\/doi.org\/10.1155\/2023\/8292559","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"type":"print","value":"0884-8173"},{"type":"electronic","value":"1098-111X"}],"subject":[],"published":{"date-parts":[[2023,1]]},"assertion":[{"value":"2022-09-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8292559"}}