2,007
Views
2
CrossRef citations to date
0
Altmetric
Review Article

Zero-Knowledge Proof Intelligent Recommendation System to Protect Students’ Data Privacy in the Digital Age

Article: 2222495 | Received 05 May 2023, Accepted 04 Jun 2023, Published online: 13 Jun 2023

References

  • Abdi, M. H., G. Okeyo, and R. W. Mwangi. 2018. Matrix factorization techniques for context-aware collaborative filtering recommender systems: A survey. Computer and Information Science 11 (2):1. doi:10.5539/cis.v11n2p1.
  • Ahmad, T. 2020. Corona virus (covid-19) pandemic and work from home: Challenges of cybercrimes and cybersecurity. SSRN Electronic Journal Available at SSRN 3568830. doi: 10.2139/ssrn.3568830.
  • Alexandridis, G., G. Siolas, and A. Stafylopatis. 2017. Enhancing social collaborative filtering through the application of non-negative matrix factorization and exponential random graph models. Data Mining and Knowledge Discovery 31 (4):1031–2099. doi:10.1007/s10618-017-0504-3.
  • Almuhammadi, S., and C. Neuman. 2005. Security and privacy using one-round zero-knowledge proofs. Seventh IEEE International Conference on E-Commerce Technology (CEC'05), Munich, Germany, 435–438. doi:10.1109/ICECT.2005.78.
  • Andergassen, M., G. Ernst, V. Guerra, F. Mödritscher, M. Moser, G. Neumann, and T. Renner. 2015. The evolution of e-learning platforms from content to activity based learning: The case of Learn@ Wu. 2015 International Conference on Interactive Collaborative Learning (ICL), Firenze, Italy, 779–784. doi:10.1109/ICL.2015.7318127.
  • Borisov, N., M. Klonowski, M. Kutyłowski, and A. Lauks-Dutka 2010. Attacking and repairing the improved modonions protocol. Paper presented at the Information, Security and Cryptology–ICISC 2009: 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 12.
  • Borsotti, V., and P. Bjørn. 2022. Humor and stereotypes in computing: An equity-focused approach to institutional accountability. Computer Supported Cooperative Work (CSCW) 31 (4):771–803. doi:10.1007/s10606-022-09440-9.
  • Cao, L., and Z. Wan. 2020. Anonymous scheme for blockchain atomic swap based on zero-knowledge proof. 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, 371–374. doi:10.1109/ICAICA50127.2020.9181875.
  • Cao, X., H. Zhang, J. Shi, and G. Cui. 2008. Cluster heads election analysis for multi-hop wireless sensor networks based on weighted graph and particle swarm optimization. 2008 Fourth International Conference on Natural Computation, Jinan, China, 599–603. doi:10.1109/ICNC.2008.693.
  • Chang, B. 2021. Student privacy issues in online learning environments. Distance Education 42 (1):55–69. doi:10.1080/01587919.2020.1869527.
  • Chigada, J., and R. Madzinga. 2021. Cyberattacks and threats during COVID-19: A systematic literature review. South African Journal of Information Management 23 (1):1–11. doi:10.4102/sajim.v23i1.1277.
  • Daras, G., A. Odena, H. Zhang, and A. G. Dimakis. 2020. Your local GAN: Designing two dimensional local attention mechanisms for generative models. 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, WA, USA, 14519–14527. doi:10.1109/CVPR42600.2020.01454.
  • Gabay, D., K. Akkaya, and M. Cebe. 2020. Privacy-preserving authentication scheme for connected electric vehicles using blockchain and zero knowledge proofs. IEEE Transactions on Vehicular Technology 69 (6):5760–72. doi:10.1109/TVT.2020.2977361.
  • Gao, H., Z. Ma, S. Luo, Y. Xu, Z. Wu, and Z. Duan. 2021. BSSPD: A blockchain-based security sharing scheme for personal data with fine-grained access control. Wireless Communications and Mobile Computing 2021:1–20. doi:10.1155/2021/6658920.
  • Gong, X.-R., R.-C. Zhao, and L.-S. Lu. 2007. Communication optimization algorithms based on extend data flow graph. Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), Qingdao, China, 3–8. doi:10.1109/SNPD.2007.168.
  • Harikrishnan, M., and K. Lakshmy. 2019. Secure digital service payments using zero knowledge proof in distributed network. 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, 307–312. doi:10.1109/ICACCS.2019.8728462.
  • Hassanpour, A., M. Moradikia, H. Adeli, S. R. Khayami, and P. Shamsinejadbabaki. 2019. A novel end‐to‐end deep learning scheme for classifying multi‐class motor imagery electroencephalography signals. Expert Systems 36 (6):e12494. doi:10.1111/exsy.12494.
  • Hatzivasilis, G., S. Ioannidis, M. Smyrlis, G. Spanoudakis, F. Frati, L. Goeke, and T. Hildebrandt, G. Tsakirakis, F. Oikonomou, G. Leftheriotis. 2020. Modern aspects of cyber-security training and continuous adaptation of programmes to trainees. Applied Sciences 10 (16):5702. doi:10.3390/app10165702.
  • He, Z., and L. Ge. 2008. ID-Based signature under the schnorr signature. 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, China, 1–3. doi:10.1109/WiCom.2008.1118.
  • He, Y., Y. Ye, P. Hanhart, and X. Xiu. 2017. Motion compensated prediction with geometry padding for 360 video coding. 2017 IEEE Visual Communications and Image Processing (VCIP), St. Petersburg, FL, USA, 1–4. doi:10.1109/VCIP.2017.8305088.
  • Hu, J., P. Zhu, Y. Qi, Q. Zhu, and X. Li. 2022. A patent registration and trading system based on blockchain. Expert Systems with Applications 201:117094. doi:10.1016/j.eswa.2022.117094.
  • Jianhong, Z., C. Hua, G. Shengnan, and G. Qin 2009. On the linkability of two schnorr type ID-Based blind signature schemes. Paper presented at the 2009 International Forum on Computer Science-Technology and Applications.
  • Kan, H., and H. Shen. 2003. On Schnorr-Adleman lattice. Paper presented at the Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Chengdu, China, Applications and Technologies. doi:10.1109/PDCAT.2003.1236246.
  • Kapassa, E., and M. Themistocleous. 2022. Blockchain technology applied in IoV demand response management: A systematic literature review. Future Internet 14 (5):136. doi:10.3390/fi14050136.
  • Karthikeyan, M., and D. Saraswady. 2014. Sphere decoding using threshold based Schnorr-Euchner enumeration in MIMO system. 2014 International Conference on Recent Trends in Information Technology, Chennai, India, 1–4. doi:10.1109/ICRTIT.2014.6996088.
  • Lam, T. Y., J. Clampitt, Y.-C. Cai, and B. Li. 2015. Voids in modified gravity reloaded: Eulerian void assignment. Monthly Notices of the Royal Astronomical Society 450 (3):3319–30. doi:10.1093/mnras/stv797.
  • Li, W., H. Guo, M. Nejad, and C.-C. Shen. 2020. Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach. IEEE Access 8:181733–43. doi:10.1109/ACCESS.2020.3028189.
  • Li, D., H. Guo, Z. Wang, and Z. Zheng. 2021. Unsupervised fake news detection based on autoencoder. IEEE Access 9:29356–65. doi:10.1109/ACCESS.2021.3058809.
  • Lin, J., H. Pu, Y. Li, and J. Lian. 2018. Intelligent recommendation system for course selection in smart education. Procedia Computer Science 129:449–53. doi:10.1016/j.procs.2018.03.023.
  • Lin, D., and K. Sako.2019.Public-Key Cryptography–PKC 2019,22nd IACR international conference on practice and theory of public-key cryptography.Beijing, China:April 14-17 2019, Proceedings, Part II (Vol. 11443) Springer.10.1007/978-3-030-17259-6.
  • Li, C., Y. Wu, and F. Yu. 2021. An improved Schnorr-based multi-signature scheme with application to blockchain. 2021 IEEE 3rd International Conference on Civil Aviation Safety and Information Technology (ICCASIT), Changsha, China, 858–863. doi:10.1109/ICCASIT53235.2021.9633663.
  • Li, W., L. Xia, and Y. Huang. 2020. An Adaptive ant colony optimization in knowledge graphs. 2020 IEEE International Conference on Knowledge Graph (ICKG), Nanjing, China, 26–32. doi:10.1109/ICBK50248.2020.00014.
  • Ma, T. 2020. White-box Schnorr signature for internet of things security. 2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), Harbin, China, 1939–1942. doi:10.1109/ICMCCE51767.2020.00425.
  • Menci, N. 2002. An Eulerian perturbation approach to large-scale structures: Extending the adhesion approximation. Monthly Notices of the Royal Astronomical Society 330 (4):907–19. doi:10.1046/j.1365-8711.2002.05133.x.
  • Murphy, K. P. 2012. Machine learning: A probabilistic perspective, vol. 25. Cambridge, MA, USA: MIT press.
  • Pasquet, M., F. Maia, E. Riviere, and V. Schiavoni 2014. Autonomous multi-dimensional slicing for large-scale distributed systems. Paper presented at the Distributed Applications and Interoperable Systems: 14th IFIP WG 6.1 International Conference, DAIS 2014, Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014, Berlin, Germany, June 3-5, 2014, Proceedings 14.
  • Perez, M., S. Avila, D. Moreira, D. Moraes, V. Testoni, E. Valle, and S. Goldenstein, A. Rocha. 2017. Video pornography detection through deep learning techniques and motion information. Neurocomputing 230:279–93. doi:10.1016/j.neucom.2016.12.017.
  • Pop, C., T. Cioara, M. Antal, and I. Anghel. 2020. Trading Energy as a Digital Asset: A Blockchain based Energy Market. Cryptocurrencies Blockchain Technol. Appl. Decentralization Smart Contract 261–79.
  • Qi, C. (2009). A zero-knowledge proof of digital signature scheme based on the elliptic curve cryptosystem. 2009 Third International Symposium on Intelligent Information Technology Application, Nanchang, China, 612–615. doi:10.1109/IITA.2009.505.
  • Qi, M., and B. Chen. 2009. Construction of safe patent trading platform based on zero-knowledge proof. 2009 Asia-Pacific Conference on Information Processing, Shenzhen, China, 627–630. doi:10.1109/APCIP.2009.288.
  • Rafiei, M. H., and H. Adeli. 2017. NEEWS: A novel earthquake early warning model using neural dynamic classification and neural dynamic optimization. Soil Dynamics and Earthquake Engineering 100:417–27. doi:10.1016/j.soildyn.2017.05.013.
  • Ryu, H., D. Kang, and D. Won. 2021. On a partially verifiable multi-party multi-argument zero-knowledge proof. 2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM), Seoul, Korea (South), 1–8. doi:10.1109/IMCOM51814.2021.9377407.
  • Saadatniaki, F., R. Xin, and U. A. Khan. 2020. Decentralized optimization over time-varying directed graphs with row and column-stochastic matrices. IEEE Transactions on Automatic Control 65 (11):4769–80. doi:10.1109/TAC.2020.2969721.
  • Schukat, M., and P. Flood. 2014. Zero-knowledge proofs in M2M communication, 25th IET Irish Signals & Systems Conference 2014 and 2014 China-Ireland International Conference on Information and Communications Technologies (ISSC 2014/CIICT 2014), Limerick, 269–273. doi:10.1049/cp.2014.0697.
  • Sun, X., F. R. Yu, P. Zhang, Z. Sun, W. Xie, and X. Peng. 2021. A survey on zero-knowledge proof in blockchain. IEEE Network 35 (4):198–205. doi:10.1109/MNET.011.2000473.
  • Tahiri, J. S., S. Bennani, and M. K. Idrissi. 2016. An assessment system adapted to differentiated learning within massive open online courses using psychometric testing. 2016 15th International Conference on Information Technology Based Higher Education and Training (ITHET), Istanbul, Turkey, 1–7. doi:10.1109/ITHET.2016.7760741.
  • Tsai, Y. C., R. Tso, Z.-Y. Liu, and K. Chen. 2019. An improved non-interactive zero-knowledge range proof for decentralized applications. 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), Newark, CA, USA, 129–134. doi:10.1109/DAPPCON.2019.00025.
  • Ugurlu, B., and A. Kawamura. 2010. Eulerian ZMP resolution based bipedal walking: Discussions on the intrinsic angular momentum rate change about center of mass. 2010 IEEE International Conference on Robotics and Automation, Anchorage, AK, USA, 4218–4223. doi:10.1109/ROBOT.2010.5509427.
  • Ulusoy, Ö., A. U. Tansel, E. Arkun, Ö. Ulusoy, A. U. Tansel, and E. Arkun. 2015. Recommendation and search in social networks. Springer International Publishing. doi: 10.1007/978-3-319-14379-8.
  • Wang, Q., and K. Demertzis. 2022. Privacy leaks protection in music streaming services using an intelligent permissions management system. Computational Intelligence and Neuroscience 2022:1–7. doi:10.1155/2022/5027256.
  • Wang, J., Z. Tan, X. Li, and Y. Hu. 2020. Differential privacy preservation in interpretable feedforward-designed convolutional neural networks. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 631–638. doi:10.1109/TrustCom50675.2020.00089.
  • Wan, Z., Y. Zhou, and K. Ren. 2022. Zk-AuthFeed: Protecting data feed to smart contracts with authenticated zero knowledge proof. In IEEE Transactions on Dependable and Secure Computing 20 (2): 1335–1347. doi:10.1109/TDSC.2022.3153084.
  • Wehrmann, J., G. S. Simões, R. C. Barros, and V. F. Cavalcante. 2018. Adult content detection in videos with convolutional and recurrent neural networks. Neurocomputing 272:432–38. doi:10.1016/j.neucom.2017.07.012.
  • Xue, Y., Q. Zhang, and F. Neri. 2021. Self-adaptive particle swarm optimization-based echo state network for time series prediction. International Journal of Neural Systems 31 (12):2150057. doi:10.1142/S012906572150057X.
  • Yamamoto, M., T. Uchitane, and T. Hatanaka. 2012. An experimental study for multi-objective optimization by particle swarm with graph based archive. 2012 Proceedings of SICE Annual Conference (SICE), Akita, Japan, 89–94.
  • Yan, K., H.-C. Wu, H. Xiao, and X. Zhang. 2016. Novel robust band-limited signal detection approach using graphs. IEEE Communications Letters 21 (1):20–23. doi:10.1109/LCOMM.2016.2618871.
  • Zhang, Y., and K. Demertzis. 2022. Increasing cyber defense in the music education sector using blockchain zero-knowledge proof identification. Computational Intelligence and Neuroscience 2022:1–7. doi:10.1155/2022/9922167.
  • Zhang, L., J. Li, L. Chen, and Y. Zhou. 2011. A undividable electronic cash scheme based on Schnorr digital signature. 2011 International Conference on Computer Science and Service System (CSSS), Nanjing, 2951–2954. doi:10.1109/CSSS.2011.5974728.
  • Zheng, X., X. Yin, and K. Demertzis. 2022. A privacy-preserved variational-autoencoder for DGA identification in the education industry and distance learning. Computational Intelligence and Neuroscience 2022:1–8. doi:10.1155/2022/7384803.
  • Zoolfakar, A., and F. Sulaiman. 2009. Providing differentiated learning experiences through e-Learning on solid state devices course. 2009 International Conference on Engineering Education (ICEED), Kuala Lumpur, Malaysia, 138–142. doi:10.1109/ICEED.2009.5490598.