Generative Architecture for Data Imputation in Secure Blockchain-enabled Spatiotemporal Data Management

Authors

  • Song Li School of Computer and Information Security, Guilin University of Electronic Technology, Guilin, China
  • WenFen Liu School of Computer and Information Security, Guilin University of Electronic Technology, Guilin, China
  • Yan Wu Unit 95795 of PLA, Guilin, China
  • Jie Zhao School of Computer and Information Security, Guilin University of Electronic Technology, Guilin, China

DOI:

https://doi.org/10.13052/jwe1540-9589.2315

Keywords:

Indirect feedback graph algorithm, linked spatiotemporal data, big data analysis, secure access, data retrieval, generative AI, blockchain

Abstract

In the era of big data, one of the most critical challenges is ensuring secure access, retrieval, and sharing of linked spatiotemporal data. To address this challenge, this paper introduces a groundbreaking blockchain-enabled evolutionary indirect feedback graph algorithm for the secure management of interconnected spatiotemporal datasets. The algorithm utilizes a generative neural network model for data imputation, predicting and generating plausible values to improve dataset completeness and integrity. The core architecture utilizes blockchain technology to optimize data retrieval efficiency and uphold robust access control mechanisms. The algorithm incorporates indirect feedback mechanisms, allowing users to provide implicit feedback through their interactions, enhancing the relevance and efficiency of data retrieval. In addition. sophisticated graph-based techniques are used to model intricate relationships between data entities, facilitating seamless data retrieval and sharing in interwoven datasets. The algorithm’s data security approach includes comprehensive access control mechanisms, encryption, and authentication mechanisms, safeguarding data confidentiality and integrity. Extensive evaluations show significant enhancements in retrieval performance and access control precision, making the proposed model a promising solution for the secure management of expansive interconnected spatiotemporal data.

Downloads

Download data is not yet available.

Author Biographies

Song Li, School of Computer and Information Security, Guilin University of Electronic Technology, Guilin, China

Song Li obtained a Master’s degree in computer application technology from Nanjing University of Aeronautics and Astronautics in China. At present, he is pursuing a Ph.D. degree in cyberspace security at Guilin University of Electronic Technology, also in China. His primary research interests revolve around data security and blockchain technology.

WenFen Liu, School of Computer and Information Security, Guilin University of Electronic Technology, Guilin, China

WenFen Liu earned a Ph.D. in cryptography from the Information Engineering University of the People’s Liberation Army in 1999. In 2017, she joined Guilin University of Electronic Technology as a distinguished faculty member. Currently, she holds the position of Doctoral Supervisor and serves as a Professor at the School of Computer and Information Security, Guilin University of Electronic Technology. Her research focuses primarily on privacy protection, statistical analysis technology for big data security, and the design and analysis of cryptographic algorithms.

Yan Wu, Unit 95795 of PLA, Guilin, China

Yan Wu obtained a Bachelor’s degree in Management from Guilin University of Electronic Technology in 2006, and now she works in the Unit 95795 of People’s Liberation Army. Her research interests mainly include big data and multimedia applications.

Jie Zhao, School of Computer and Information Security, Guilin University of Electronic Technology, Guilin, China

Jie Zhao received a B.Eng. in the School of Information and Management Science at Henan Agricultural University, Zhengzhou, China. He is currently studying for a M.Eng. in electronic science and Technology at the School of Computer and Information Security, Guilin University of Electronic Technology, China. His research interests focus on blockchain.

References

A. Bifet, G. de Francisci Morales, J. Read, G. Holmes, and B. Pfahringer, “Efficient Online Evaluation of Big Data Stream Classifiers,” in Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, in KDD ’15. New York, NY, USA: Association for Computing Machinery, Dec. 2015, pp. 59–68. doi: 10.1145/2783258.2783372.

M. G., T. C., L. D., and S. R, Big Data Security Intelligence for Healthcare Industry 4.0. in Springer Series in Advanced Manufacturing. Cham: Springer, 2017.

X. Shi, R. Qiu, Z. Ling, F. Yang, H. Yang, and X. He, “Spatio-Temporal Correlation Analysis of Online Monitoring Data for Anomaly Detection and Location in Distribution Networks,” IEEE Trans. Smart Grid, vol. 11, no. 2, pp. 995–1006, Mar. 2020, doi: 10.1109/TSG.2019.2929219.

A. Bates and W. U. Hassan, “Can Data Provenance Put an End to the Data Breach?,” IEEE Secur. Priv., vol. 17, no. 4, pp. 88–93, Jul. 2019, doi: 10.1109/MSEC.2019.2913693.

S. Chun, S. J. Oh, R. Sampaio de Rezende, Y. Kalantidis, and D. Larlus, “Probabilistic Embeddings for Cross-Modal Retrieval,” in 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Jun. 2021, pp. 8411–8420. doi: 10.1109/CVPR46437.2021. 00831.

Z. Li, W. Xu, H. Shi, Y. Zhang, and Y. Yan, “Security and Privacy Risk Assessment of Energy Big Data in Cloud Environment,” Comput. Intell. Neurosci., vol. 2021, p. e2398460, Oct. 2021, doi: 10.1155/2021/ 2398460.

V. Alieksieiev and B. Andrii, “Information Analysis and Knowledge Gain within Graph Data Model,” in 2019 IEEE 14th International Conference on Computer Sciences and Information Technologies (CSIT), Sep. 2019, pp. 268–271. doi: 10.1109/STC-CSIT.2019.8929812.

S. Behera and J. R. Prathuri, “Application of Homomorphic Encryption in Machine Learning,” in 2020 2nd PhD Colloquium on Ethically Driven Innovation and Technology for Society (PhD EDITS), Aug. 2020, pp. 1–2. doi: 10.1109/PhDEDITS51180.2020.9315305.

A. C. F. Chan and C. Castelluccia, “A security framework for privacy-preserving data aggregation in wireless sensor networks,” ACM Trans. Sens. Netw. TOSN, vol. 7, no. 4, 2011, doi: 10.1145/1921621.1921623.

L. Avigad and O. Goldreich, “Testing Graph Blow-Up,” in Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation: In Collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman, O. Goldreich, Ed., in Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2011, pp. 156–172. doi: 10.1007/978-3-642-22670-0_18.

M. Bellare et al., “On Probabilistic versus Deterministic Provers in the Definition of Proofs of Knowledge,” in Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation: In Collaboration with Lidor, O. G. David Zuckerman, Ed., Berlin, Heidelberg: Springer, 2011, pp. 114–123. doi: 10.1007/978-3-642-22670-0_14.

S. Blyumin, A. Pogodaev, and E. Khabibullina, “Graph-structural Modeling of Some Special Organizational Systems,” in 2020 2nd International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA), Aug. 2020, pp. 279–283. doi: 10.1109/SUMMA50634.2020.9280724.

S. S. Alotaibi, “Registration Center Based User Authentication Scheme for Smart E-Governance Applications in Smart Cities,” IEEE Access, vol. 7, pp. 5819–5833, 2019, doi: 10.1109/ACCESS.2018.2884541.

G. Avalle, F. De Pace, C. Fornaro, F. Manuri, and A. Sanna, “An Augmented Reality System to Support Fault Visualization in Industrial Robotic Tasks,” IEEE Access, vol. 7, pp. 132343–132359, 2019, doi: 10.1109/ACCESS.2019.2940887.

B. Bordel, R. Alcarria, and T. Robles, “Lightweight encryption for short-range wireless biometric authentication systems in Industry 4.0,” Integr. Comput.-Aided Eng., vol. Preprint, no. Preprint, pp. 1–21, Jan. 2021, doi: 10.3233/ICA-210673.

V. R. Catherine and A. S. Nargunam, “Multi authority Ciphertext-Policy Attribute-based encryption for security enhancement in the cloud storage unit,” Sustain. Energy Technol. Assess., vol. 53, p. 102556, 2022.

A. Bakdi, A. Hentout, and H. Boutami, “Optimal path planning and execution for mobile robots using genetic algorithm and adaptive fuzzy-logic control[J,” Robot. Auton. Syst., vol. 89, pp. 95–109, 2017.

S. Olyaee, R. Ebrahimpur, and S. Esfandeh, “A hybrid genetic algorithm-neural network for modeling of periodic nonlinearity in three-longitudinal-mode laser heterodyne interferometer,” in 2013 21st Iranian Conference on Electrical Engineering (ICEE), May 2013, pp. 1–5. doi: 10.1109/IranianCEE.2013.6599790.

L. Cheng, H. Z. G, and Y. Lin, “Recurrent Neural Network for Non-Smooth Convex Optimization Problems With Application to the Identification of Genetic Regulatory Networks[J,” IEEE Trans. Neural Netw., vol. 22, no. 5, pp. 714–26, 2011.

H. J. X, M. M. Y, and W. K, “Product modeling design based on genetic algorithm and BP neural network[J],” Neural Comput. Appl., vol. 33, no. 9, pp. 4111–4117, 2021.

S. Ding, S. Qu, and Y. Xi, “A long video caption generation algorithm for big video data retrieval[J],” Future Gener. Comput. Syst., vol. 93, pp. 583–595, 2019.

C. C. Aggarwal, P. S. Yu, J. Han, and J. Wang, “- A Framework for Clustering Evolving Data Streams,” in Proceedings 2003 VLDB Conference, J.-C. Freytag, P. Lockemann, S. Abiteboul, M. Carey, P. Selinger, and A. Heuer, Eds., San Francisco: Morgan Kaufmann, 2003, pp. 81–92. doi: 10.1016/B978-012722442-8/50016-1.

A. E. Barinov and A. A. Zakharov, “Clustering using a random walk on graph for head pose estimation,” in 2015 International Conference on Mechanical Engineering, Automation and Control Systems (MEACS), Sep. 2015, pp. 1–5. doi: 10.1109/MEACS.2015.7414876.

R. C. de Amorim, “Constrained clustering with Minkowski Weighted K-Means,” in 2012 IEEE 13th International Symposium on Computational Intelligence and Informatics (CINTI), Aug. 2012, pp. 13–17. doi: 10.1109/CINTI.2012.6496753.

S. Alhasan, G. Abdul-Salaam, L. Bayor, and K. Oliver, “Intrusion Detection System Based on Artificial Immune System: A Review,” in 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), Sep. 2021, pp. 7–14. doi: 10.1109/ICSIoT55070.2021.00011.

A. Bala, I. Ismail, R. Ibrahim, and S. M. Sait, “Applications of Metaheuristics in Reservoir Computing Techniques: A Review,” IEEE Access, vol. 6, pp. 58012–58029, 2018, doi: 10.1109/ACCESS.2018. 2873770.

N. Aljohani, J. Shelton, and K. Roy, “Authentication Based on Touch Patterns Using an Artificial Immune System,” in 2021 IEEE Symposium Series on Computational Intelligence (SSCI), Sep. 2021, pp. 1–8. doi: 10.1109/SSCI50451.2021.9660096.

Y. Cho et al., “A Secure Three-Factor Authentication Protocol for E-Governance System Based on Multiserver Environments,” IEEE Access, vol. 10, pp. 74351–74365, 2022, doi: 10.1109/ACCESS.2022.3191419.

M. Borassi, A. Epasto, S. Lattanzi, S. Vassilvitskii, and M. Zadimoghaddam, “Sliding Window Algorithms for k-Clustering Problems.” arXiv, Oct. 23, 2020. doi: 10.48550/arXiv.2006.05850.

M. Abdullah and M. Hadzikadic, “Sentiment Analysis of Twitter Data: Emotions Revealed Regarding Donald Trump during the 2015-16 Primary Debates,” in 2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI), Aug. 2017, pp. 760–764. doi: 10.1109/ICTAI.2017.00120.

R. Chauhan and S. S. Heydari, “Polymorphic Adversarial DDoS attack on IDS using GAN,” in 2020 International Symposium on Networks, Computers and Communications (ISNCC, Jul. 2020, pp. 1–6. doi: 10.1109/ISNCC49221.2020.9297264.

Y. Hui and L. Zesong, “Research on Real-time Analysis and Hybrid Encryption of Big Data,” in 2019 2nd International Conference on Artificial Intelligence and Big Data (ICAIBD), Feb. 2019, pp. 52–55. doi: 10.1109/ICAIBD.2019.8836992.

S. Ahmed, M. M. Alshater, A. E. Ammari, and H. Hammami, “Artificial intelligence and machine learning in finance: A bibliometric review,” Res. Int. Bus. Finance, vol. 61, p. 101646, Oct. 2022.

D. Atienza, P. Larranaga, and C. Bielza, “Hybrid semiparametric Bayesian networks,” TEST, vol. 31, no. 2, pp. 299–327, 2022.

Downloads

Published

2024-03-27

How to Cite

Li, S., Liu, W., Wu, Y., & Zhao, J. (2024). Generative Architecture for Data Imputation in Secure Blockchain-enabled Spatiotemporal Data Management. Journal of Web Engineering, 23(01), 111–164. https://doi.org/10.13052/jwe1540-9589.2315

Issue

Section

Advances, Risks, Solutions, and Ethics in Generative AI for Web Engineering