首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
Machine learning job failure analysis and prediction model for the cloud environment 面向云环境的机器学习作业失效分析与预测模型
Pub Date : 2023-09-27 DOI: 10.1016/j.hcc.2023.100165
Harikrishna Bommala , Uma Maheswari V. , Rajanikanth Aluvalu , Swapna Mudrakola

Reliable and accessible cloud applications are essential for the future of ubiquitous computing, smart appliances, and electronic health. Owing to the vastness and diversity of the cloud, a most cloud services, both physical and logical services have failed. Using currently accessible traces, we assessed and characterized the behaviors of successful and unsuccessful activities. We devised and implemented a method to forecast which jobs will fail. The proposed method optimizes cloud applications more efficiently in terms of resource usage. Using Google Cluster, Mustang, and Trinity traces, which are publicly available, an in-depth evaluation of the proposed model was conducted. The traces were also fed into several different machine learning models to select the most reliable model. Our efficiency analysis proves that the model performs well in terms of accuracy, F1-score, and recall. Several factors, such as failure of forecasting work, design of scheduling algorithms, modification of priority criteria, and restriction of task resubmission, may increase cloud service dependability and availability.

可靠和可访问的云应用程序对于无处不在的计算、智能设备和电子健康的未来至关重要。由于云的浩瀚和多样性,大多数云服务,包括物理服务和逻辑服务都失败了。使用当前可访问的痕迹,我们评估并描述了成功和不成功活动的行为。我们设计并实施了一种方法来预测哪些工作将失败。提出的方法在资源使用方面更有效地优化了云应用程序。使用公开可用的Google Cluster、Mustang和Trinity跟踪,对所提议的模型进行了深入的评估。这些轨迹也被输入到几个不同的机器学习模型中,以选择最可靠的模型。我们的效率分析证明,该模型在准确率、f1分数和召回率方面表现良好。预测工作的失败、调度算法的设计、优先级标准的修改和任务重新提交的限制等几个因素可能会增加云服务的可靠性和可用性。
{"title":"Machine learning job failure analysis and prediction model for the cloud environment","authors":"Harikrishna Bommala ,&nbsp;Uma Maheswari V. ,&nbsp;Rajanikanth Aluvalu ,&nbsp;Swapna Mudrakola","doi":"10.1016/j.hcc.2023.100165","DOIUrl":"10.1016/j.hcc.2023.100165","url":null,"abstract":"<div><p>Reliable and accessible cloud applications are essential for the future of ubiquitous computing, smart appliances, and electronic health. Owing to the vastness and diversity of the cloud, a most cloud services, both physical and logical services have failed. Using currently accessible traces, we assessed and characterized the behaviors of successful and unsuccessful activities. We devised and implemented a method to forecast which jobs will fail. The proposed method optimizes cloud applications more efficiently in terms of resource usage. Using Google Cluster, Mustang, and Trinity traces, which are publicly available, an in-depth evaluation of the proposed model was conducted. The traces were also fed into several different machine learning models to select the most reliable model. Our efficiency analysis proves that the model performs well in terms of accuracy, F1-score, and recall. Several factors, such as failure of forecasting work, design of scheduling algorithms, modification of priority criteria, and restriction of task resubmission, may increase cloud service dependability and availability.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000636/pdfft?md5=bfe61b5b8fb7fd53b685e1c9be60171b&pid=1-s2.0-S2667295223000636-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decoupled knowledge distillation method based on meta-learning 基于元学习的解耦知识蒸馏方法
Pub Date : 2023-09-26 DOI: 10.1016/j.hcc.2023.100164
Wenqing Du , Liting Geng , Jianxiong Liu , Zhigang Zhao , Chunxiao Wang , Jidong Huo

With the advancement of deep learning techniques, the number of model parameters has been increasing, leading to significant memory consumption and limits in the deployment of such models in real-time applications. To reduce the number of model parameters and enhance the generalization capability of neural networks, we propose a method called Decoupled MetaDistil, which involves decoupled meta-distillation. This method utilizes meta-learning to guide the teacher model and dynamically adjusts the knowledge transfer strategy based on feedback from the student model, thereby improving the generalization ability. Furthermore, we introduce a decoupled loss method to explicitly transfer positive sample knowledge and explore the potential of negative samples knowledge. Extensive experiments demonstrate the effectiveness of our method.

随着深度学习技术的进步,模型参数的数量不断增加,导致大量的内存消耗,并限制了这些模型在实时应用中的部署。为了减少模型参数的数量,提高神经网络的泛化能力,提出了一种解耦元蒸馏方法。该方法利用元学习来指导教师模型,并根据学生模型的反馈动态调整知识迁移策略,从而提高泛化能力。此外,我们引入了一种解耦损失方法来显式传递正样本知识,并探索了负样本知识的潜力。大量的实验证明了该方法的有效性。
{"title":"Decoupled knowledge distillation method based on meta-learning","authors":"Wenqing Du ,&nbsp;Liting Geng ,&nbsp;Jianxiong Liu ,&nbsp;Zhigang Zhao ,&nbsp;Chunxiao Wang ,&nbsp;Jidong Huo","doi":"10.1016/j.hcc.2023.100164","DOIUrl":"10.1016/j.hcc.2023.100164","url":null,"abstract":"<div><p>With the advancement of deep learning techniques, the number of model parameters has been increasing, leading to significant memory consumption and limits in the deployment of such models in real-time applications. To reduce the number of model parameters and enhance the generalization capability of neural networks, we propose a method called Decoupled MetaDistil, which involves decoupled meta-distillation. This method utilizes meta-learning to guide the teacher model and dynamically adjusts the knowledge transfer strategy based on feedback from the student model, thereby improving the generalization ability. Furthermore, we introduce a decoupled loss method to explicitly transfer positive sample knowledge and explore the potential of negative samples knowledge. Extensive experiments demonstrate the effectiveness of our method.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000624/pdfft?md5=716f214f6655f84938b0daddee4b5296&pid=1-s2.0-S2667295223000624-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134917375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on dynamic group signature scheme with threshold traceability for blockchain 带阈值可追溯性的区块链动态群组签名方案研究
Pub Date : 2023-09-20 DOI: 10.1016/j.hcc.2023.100163
Hyo-jin Song , Teahoon Kim , Yong-Woon Hwang , Daehee Seo , Im-Yeong Lee

Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all participants. However, single-signature applications in transactions can lead to user identification issues due to the reuse of public keys. To address this issue, group signatures can be used, where the same group public key is used to verify signatures from group members to provide anonymity to users. However, in dynamic groups where membership may change, an attack can occur where a user who has left the group can disguise themselves as a group member by leaking a partial key. This problem cannot be traced back to the partial key leaker. In this paper, we propose assigning different partial keys to group members to trace partial key leakers and partially alleviate the damage caused by partial key leaks. Exist schemes have shown that arbitrary tracing issues occurred when a single administrator had exclusive key generation and tracing authority. This paper proposes a group signature scheme that solves the synchronization problem by involving a threshold number of TMs while preventing arbitrary tracing by distributing authority among multiple TMs.

区块链技术通过在所有参与者之间达成共识来共享交易和维护相同信息,从而提供透明度和可靠性。然而,由于公钥的重复使用,交易中的单签名应用可能会导致用户识别问题。为了解决这个问题,可以使用群组签名,即使用相同的群组公共密钥来验证群组成员的签名,从而为用户提供匿名性。然而,在动态群组中,群组成员可能会发生变化,这时可能会发生一种攻击,即已离开群组的用户可以通过泄漏部分密钥将自己伪装成群组成员。这个问题无法追溯到部分密钥泄露者。在本文中,我们建议为群组成员分配不同的部分密钥,以追踪部分密钥泄漏者,并部分减轻部分密钥泄漏造成的损失。现有方案表明,当单个管理员独享密钥生成和追踪权限时,会出现任意追踪问题。本文提出了一种群组签名方案,通过涉及一定数量的 TM 来解决同步问题,同时通过在多个 TM 之间分配权限来防止任意追踪。
{"title":"A study on dynamic group signature scheme with threshold traceability for blockchain","authors":"Hyo-jin Song ,&nbsp;Teahoon Kim ,&nbsp;Yong-Woon Hwang ,&nbsp;Daehee Seo ,&nbsp;Im-Yeong Lee","doi":"10.1016/j.hcc.2023.100163","DOIUrl":"10.1016/j.hcc.2023.100163","url":null,"abstract":"<div><p>Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all participants. However, single-signature applications in transactions can lead to user identification issues due to the reuse of public keys. To address this issue, group signatures can be used, where the same group public key is used to verify signatures from group members to provide anonymity to users. However, in dynamic groups where membership may change, an attack can occur where a user who has left the group can disguise themselves as a group member by leaking a partial key. This problem cannot be traced back to the partial key leaker. In this paper, we propose assigning different partial keys to group members to trace partial key leakers and partially alleviate the damage caused by partial key leaks. Exist schemes have shown that arbitrary tracing issues occurred when a single administrator had exclusive key generation and tracing authority. This paper proposes a group signature scheme that solves the synchronization problem by involving a threshold number of TMs while preventing arbitrary tracing by distributing authority among multiple TMs.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000612/pdfft?md5=f44628d3083bf96e8f4a13831b67a184&pid=1-s2.0-S2667295223000612-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135387621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles 可证明的安全认证协议的交通交换在无人驾驶飞行器
Pub Date : 2023-09-15 DOI: 10.1016/j.hcc.2023.100154
Vincent Omollo Nyangaresi

Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions. In addition, they have been deployed in civilian critical infrastructure monitoring. In this environment, real-time and massive data is exchanged between the aerial vehicles and the ground control stations. Depending on the mission of these aerial vehicles, some of the collected and transmitted data is sensitive and private. Therefore, many security protocols have been presented to offer privacy and security protection. However, majority of these schemes fail to consider attack vectors such as side-channeling, de-synchronization and known secret session temporary information leakages. This last attack can be launched upon adversarial physical capture of these drones. In addition, some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high overheads. In this paper, an authentication protocol based on lightweight quadratic residues and hash functions is developed. Its formal security analysis is executed using the widely deployed random oracle model. In addition, informal security analysis is carried out to show its robustness under the Dolev–Yao (DY) and Canetti–Krawczyk (CK) threat models. In terms of operational efficiency, it is shown to have relatively lower execution time, communication costs, and incurs the least storage costs among other related protocols. Specifically, the proposed protocol provides a 25% improvement in supported security and privacy features and a 6.52% reduction in storage costs. In overall, the proposed methodology offers strong security and privacy protection at lower execution time, storage and communication overheads.

无人驾驶飞行器提供在潜在敌对控制区域进行军事侦察等服务。此外,它们还被部署在民用关键基础设施监测中。在这种环境下,飞行器和地面控制站之间进行实时、海量的数据交换。根据这些飞行器的任务,一些收集和传输的数据是敏感和私人的。因此,出现了许多安全协议来提供隐私和安全保护。然而,这些方案大多没有考虑到诸如侧信道、去同步和已知秘密会话临时信息泄漏等攻击向量。这最后一次攻击可以在敌方捕获这些无人机后发动。此外,其中一些协议部署了计算密集型的非对称加密原语,这导致了很高的开销。本文提出了一种基于轻量级二次残数和哈希函数的认证协议。其形式化的安全性分析是使用广泛部署的随机oracle模型执行的。此外,本文还进行了非正式安全分析,验证了该方法在Dolev-Yao (DY)和Canetti-Krawczyk (CK)威胁模型下的鲁棒性。在操作效率方面,它具有相对较低的执行时间和通信成本,并且在其他相关协议中占用的存储成本最少。具体来说,提议的协议在支持的安全和隐私功能方面提供了25%的改进,并降低了6.52%的存储成本。总的来说,所提出的方法以较低的执行时间、存储和通信开销提供了强大的安全性和隐私保护。
{"title":"Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles","authors":"Vincent Omollo Nyangaresi","doi":"10.1016/j.hcc.2023.100154","DOIUrl":"10.1016/j.hcc.2023.100154","url":null,"abstract":"<div><p>Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled regions. In addition, they have been deployed in civilian critical infrastructure monitoring. In this environment, real-time and massive data is exchanged between the aerial vehicles and the ground control stations. Depending on the mission of these aerial vehicles, some of the collected and transmitted data is sensitive and private. Therefore, many security protocols have been presented to offer privacy and security protection. However, majority of these schemes fail to consider attack vectors such as side-channeling, de-synchronization and known secret session temporary information leakages. This last attack can be launched upon adversarial physical capture of these drones. In addition, some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high overheads. In this paper, an authentication protocol based on lightweight quadratic residues and hash functions is developed. Its formal security analysis is executed using the widely deployed random oracle model. In addition, informal security analysis is carried out to show its robustness under the Dolev–Yao (DY) and Canetti–Krawczyk (CK) threat models. In terms of operational efficiency, it is shown to have relatively lower execution time, communication costs, and incurs the least storage costs among other related protocols. Specifically, the proposed protocol provides a 25% improvement in supported security and privacy features and a 6.52% reduction in storage costs. In overall, the proposed methodology offers strong security and privacy protection at lower execution time, storage and communication overheads.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000521/pdfft?md5=905b3445e9516ad8c201c868fb43d5f4&pid=1-s2.0-S2667295223000521-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135346685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge-based recommendation with contrastive learning 基于知识的对比推荐
Pub Date : 2023-09-15 DOI: 10.1016/j.hcc.2023.100151
Yang He , Xu Zheng , Rui Xu , Ling Tian

Knowledge Graphs (KGs) have been incorporated as external information into recommendation systems to ensure the high-confidence system. Recently, Contrastive Learning (CL) framework has been widely used in knowledge-based recommendation, owing to the ability to mitigate data sparsity and it considers the expandable computing of the system. However, existing CL-based methods still have the following shortcomings in dealing with the introduced knowledge: (1) For the knowledge view generation, they only perform simple data augmentation operations on KGs, resulting in the introduction of noise and irrelevant information, and the loss of essential information. (2) For the knowledge view encoder, they simply add the edge information into some GNN models, without considering the relations between edges and entities. Therefore, this paper proposes a Knowledge-based Recommendation with Contrastive Learning (KRCL) framework, which generates dual views from user–item interaction graph and KG. Specifically, through data enhancement technology, KRCL introduces historical interaction information, background knowledge and item–item semantic information. Then, a novel relation-aware GNN model is proposed to encode the knowledge view. Finally, through the designed contrastive loss, the representations of the same item in different views are closer to each other. Compared with various recommendation methods on benchmark datasets, KRCL has shown significant improvement in different scenarios.

知识图(KGs)已作为外部信息纳入推荐系统,以确保高置信度系统。近年来,对比学习(CL)框架由于能够减轻数据稀疏性,并考虑到系统的可扩展计算,已被广泛应用于基于知识的推荐中。然而,现有的基于CL的方法在处理引入的知识时仍然存在以下缺点:(1)对于知识视图生成,它们只对KGs进行简单的数据扩充操作,导致引入噪声和无关信息,并丢失基本信息。(2) 对于知识视图编码器,他们只是将边缘信息添加到一些GNN模型中,而不考虑边缘和实体之间的关系。因此,本文提出了一种基于知识的对比学习推荐(KRCL)框架,该框架从用户-项目交互图和KG生成双视图。具体而言,KRCL通过数据增强技术引入历史交互信息、背景知识和项目-项目语义信息。然后,提出了一种新的关系感知GNN模型来对知识视图进行编码。最后,通过设计的对比损失,同一项目在不同视图中的表示更加接近。与基准数据集上的各种推荐方法相比,KRCL在不同场景下都表现出了显著的改进。
{"title":"Knowledge-based recommendation with contrastive learning","authors":"Yang He ,&nbsp;Xu Zheng ,&nbsp;Rui Xu ,&nbsp;Ling Tian","doi":"10.1016/j.hcc.2023.100151","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100151","url":null,"abstract":"<div><p>Knowledge Graphs (KGs) have been incorporated as external information into recommendation systems to ensure the high-confidence system. Recently, Contrastive Learning (CL) framework has been widely used in knowledge-based recommendation, owing to the ability to mitigate data sparsity and it considers the expandable computing of the system. However, existing CL-based methods still have the following shortcomings in dealing with the introduced knowledge: (1) For the knowledge view generation, they only perform simple data augmentation operations on KGs, resulting in the introduction of noise and irrelevant information, and the loss of essential information. (2) For the knowledge view encoder, they simply add the edge information into some GNN models, without considering the relations between edges and entities. Therefore, this paper proposes a Knowledge-based Recommendation with Contrastive Learning (KRCL) framework, which generates dual views from user–item interaction graph and KG. Specifically, through data enhancement technology, KRCL introduces historical interaction information, background knowledge and item–item semantic information. Then, a novel relation-aware GNN model is proposed to encode the knowledge view. Finally, through the designed contrastive loss, the representations of the same item in different views are closer to each other. Compared with various recommendation methods on benchmark datasets, KRCL has shown significant improvement in different scenarios.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50193403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in Robustness and Imperceptibility 为了提高数字音频水印的鲁棒性和不可感知性,采用深度卷积神经网络和搜索位置优化算法进行了有效的数字音频水印
Pub Date : 2023-09-14 DOI: 10.1016/j.hcc.2023.100153
Abhijit J. Patil , Ramesh Shelke

Watermarking is the advanced technology utilized to secure digital data by integrating ownership or copyright protection. Most of the traditional extracting processes in audio watermarking have some restrictions due to low reliability to various attacks. Hence, a deep learning-based audio watermarking system is proposed in this research to overcome the restriction in the traditional methods. The implication of the research relies on enhancing the performance of the watermarking system using the Discrete Wavelet Transform (DWT) and the optimized deep learning technique. The selection of optimal embedding location is the research contribution that is carried out by the deep convolutional neural network (DCNN). The hyperparameter tuning is performed by the so-called search location optimization, which minimizes the errors in the classifier. The experimental result reveals that the proposed digital audio watermarking system provides better robustness and performance in terms of Bit Error Rate (BER), Mean Square Error (MSE), and Signal-to-noise ratio. The BER, MSE, and SNR of the proposed audio watermarking model without the noise are 0.082, 0.099, and 45.363 respectively, which is found to be better performance than the existing watermarking models.

水印是一种先进的技术,通过整合所有权或版权保护来保护数字数据。传统的音频水印提取方法对各种攻击的可靠性较低,存在一定的局限性。因此,本研究提出了一种基于深度学习的音频水印系统,以克服传统方法的局限性。该研究的意义在于利用离散小波变换(DWT)和优化的深度学习技术增强水印系统的性能。最优嵌入位置的选择是深度卷积神经网络(deep convolutional neural network, DCNN)的研究成果。超参数调优是通过所谓的搜索位置优化来执行的,这将使分类器中的错误最小化。实验结果表明,所提出的数字音频水印系统在误码率(BER)、均方误差(MSE)和信噪比方面具有较好的鲁棒性和性能。无噪声音频水印模型的误码率为0.082,MSE为0.099,信噪比为45.363,性能优于现有的水印模型。
{"title":"An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in Robustness and Imperceptibility","authors":"Abhijit J. Patil ,&nbsp;Ramesh Shelke","doi":"10.1016/j.hcc.2023.100153","DOIUrl":"10.1016/j.hcc.2023.100153","url":null,"abstract":"<div><p>Watermarking is the advanced technology utilized to secure digital data by integrating ownership or copyright protection. Most of the traditional extracting processes in audio watermarking have some restrictions due to low reliability to various attacks. Hence, a deep learning-based audio watermarking system is proposed in this research to overcome the restriction in the traditional methods. The implication of the research relies on enhancing the performance of the watermarking system using the Discrete Wavelet Transform (DWT) and the optimized deep learning technique. The selection of optimal embedding location is the research contribution that is carried out by the deep convolutional neural network (DCNN). The hyperparameter tuning is performed by the so-called search location optimization, which minimizes the errors in the classifier. The experimental result reveals that the proposed digital audio watermarking system provides better robustness and performance in terms of Bit Error Rate (BER), Mean Square Error (MSE), and Signal-to-noise ratio. The BER, MSE, and SNR of the proposed audio watermarking model without the noise are 0.082, 0.099, and 45.363 respectively, which is found to be better performance than the existing watermarking models.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522300051X/pdfft?md5=eb13242a3c2d8236c8e27be37944fea5&pid=1-s2.0-S266729522300051X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135298725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain DBT-PDP:基于区块链的可证明数据拥有与外包数据批量传输
Pub Date : 2023-09-14 DOI: 10.1016/j.hcc.2023.100152
Chengming Yi , Hua Zhang , Weiming Sun , Jun Ding

In the scenario of large-scale data ownership transactions, existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication, which greatly affects their practicability. This paper proposes a data integrity audit scheme based on blockchain where data ownership can be traded in batches. A data tag structure which supports data ownership batch transaction is adopted in our scheme. The update process of data tag does not involve the unique information of each data, so that any user can complete ownership transactions of multiple data in a single transaction through a single transaction auxiliary information. At the same time, smart contract is introduced into our scheme to perform data integrity audit belongs to third-party auditors, therefore our scheme can free from potential security risks of malicious third-party auditors. Safety analysis shows that our scheme is proved to be safe under the stochastic prediction model and k-CEIDH hypothesis. Compared with similar schemes, the experiment shows that communication overhead and computing time of data ownership transaction in our scheme is lower. Meanwhile, the communication overhead and computing time of our scheme is similar to that of similar schemes in data integrity audit.

在大规模数据所有权交易的场景下,现有的数据完整性审计方案面临着来自恶意第三方审计人员的安全风险,且计算和通信效率低下,极大地影响了其实用性。本文提出了一种基于区块链的数据完整性审计方案,数据所有权可以分批交易。我们的方案采用了支持数据所有权批量交易的数据标签结构。数据标签的更新过程不涉及每条数据的唯一信息,任何用户都可以通过一条交易辅助信息在一次交易中完成多条数据的所有权交易。同时,我们的方案中引入了智能合约,执行属于第三方审计人员的数据完整性审计,因此我们的方案可以摆脱恶意第三方审计人员潜在的安全风险。安全性分析表明,在随机预测模型和 k-CEIDH 假设下,我们的方案被证明是安全的。实验表明,与同类方案相比,我们的方案中数据所有权交易的通信开销和计算时间更低。同时,在数据完整性审计方面,我们方案的通信开销和计算时间与同类方案相似。
{"title":"DBT-PDP: Provable data possession with outsourced data batch transfer based on blockchain","authors":"Chengming Yi ,&nbsp;Hua Zhang ,&nbsp;Weiming Sun ,&nbsp;Jun Ding","doi":"10.1016/j.hcc.2023.100152","DOIUrl":"10.1016/j.hcc.2023.100152","url":null,"abstract":"<div><p>In the scenario of large-scale data ownership transactions, existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication, which greatly affects their practicability. This paper proposes a data integrity audit scheme based on blockchain where data ownership can be traded in batches. A data tag structure which supports data ownership batch transaction is adopted in our scheme. The update process of data tag does not involve the unique information of each data, so that any user can complete ownership transactions of multiple data in a single transaction through a single transaction auxiliary information. At the same time, smart contract is introduced into our scheme to perform data integrity audit belongs to third-party auditors, therefore our scheme can free from potential security risks of malicious third-party auditors. Safety analysis shows that our scheme is proved to be safe under the stochastic prediction model and k-CEIDH hypothesis. Compared with similar schemes, the experiment shows that communication overhead and computing time of data ownership transaction in our scheme is lower. Meanwhile, the communication overhead and computing time of our scheme is similar to that of similar schemes in data integrity audit.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295223000508/pdfft?md5=4d6ff0d17b47c02265a60a329233f6b6&pid=1-s2.0-S2667295223000508-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135298556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SUDM-SP: A method for discovering trajectory similar users based on semantic privacy SUDM-SP:一种基于语义隐私的轨迹相似用户发现方法
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100146
Weiqi Zhang , Guisheng Yin , Bingyi Xie

With intelligent terminal devices’ widespread adoption and global positioning systems’ advancement, Location-based Social Networking Services (LbSNs) have gained considerable attention. The recommendation mechanism, which revolves around identifying similar users, holds significant importance in LbSNs. In order to enhance user experience, LbSNs heavily rely on accurate data. By mining and analyzing users who exhibit similar behavioral patterns to the target user, LbSNs can offer personalized services that cater to individual preferences. However, trajectory data, a form encompassing various sensitive attributes, pose privacy concerns. Unauthorized disclosure of users’ precise trajectory information can have severe consequences, potentially impacting their daily lives. Thus, this paper proposes the Similar User Discovery Method based on Semantic Privacy (SUDM-SP) for trajectory analysis. The approach involves employing a model that generates noise trajectories, maximizing expected noise to preserve the privacy of the original trajectories. Similar users are then identified based on the published noise trajectory data. SUDM-SP consists of two key components. Firstly, a puppet noise location, exhibiting the highest semantic expectation with the original location, is generated to derive noise-suppressed trajectory data. Secondly, a mechanism based on semantic and geographical distance is employed to cluster highly similar users into communities, facilitating the discovery of noise trajectory similarity among users. Through trials conducted using real datasets, the effectiveness of SUDM-SP, as a recommendation service ensuring user privacy protection is substantiated.

随着智能终端设备的广泛采用和全球定位系统的发展,基于位置的社交网络服务(Lbsn)得到了相当大的关注。围绕识别相似用户的推荐机制在LBSN中具有重要意义。为了增强用户体验,LBSN在很大程度上依赖于准确的数据。通过挖掘和分析表现出与目标用户相似行为模式的用户,LBSN可以提供满足个人偏好的个性化服务。然而,轨迹数据,一种包含各种敏感属性的形式,引起了隐私问题。未经授权泄露用户的精确轨迹信息可能会产生严重后果,可能会影响他们的日常生活。因此,本文提出了一种基于语义隐私的相似用户发现方法(SUDM-SP)用于轨迹分析。该方法包括使用生成噪声轨迹的模型,最大化预期噪声以保持原始轨迹的隐私。然后基于公布的噪声轨迹数据来识别类似的用户。SUDM-SP由两个关键组成部分组成。首先,生成对原始位置表现出最高语义期望的伪噪声位置,以导出噪声抑制的轨迹数据。其次,采用基于语义和地理距离的机制,将高度相似的用户聚类到社区中,有助于发现用户之间的噪声轨迹相似性。通过使用真实数据集进行的试验,SUDM-SP作为一种确保用户隐私保护的推荐服务的有效性得到了证实。
{"title":"SUDM-SP: A method for discovering trajectory similar users based on semantic privacy","authors":"Weiqi Zhang ,&nbsp;Guisheng Yin ,&nbsp;Bingyi Xie","doi":"10.1016/j.hcc.2023.100146","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100146","url":null,"abstract":"<div><p>With intelligent terminal devices’ widespread adoption and global positioning systems’ advancement, Location-based Social Networking Services (LbSNs) have gained considerable attention. The recommendation mechanism, which revolves around identifying similar users, holds significant importance in LbSNs. In order to enhance user experience, LbSNs heavily rely on accurate data. By mining and analyzing users who exhibit similar behavioral patterns to the target user, LbSNs can offer personalized services that cater to individual preferences. However, trajectory data, a form encompassing various sensitive attributes, pose privacy concerns. Unauthorized disclosure of users’ precise trajectory information can have severe consequences, potentially impacting their daily lives. Thus, this paper proposes the Similar User Discovery Method based on Semantic Privacy (SUDM-SP) for trajectory analysis. The approach involves employing a model that generates noise trajectories, maximizing expected noise to preserve the privacy of the original trajectories. Similar users are then identified based on the published noise trajectory data. SUDM-SP consists of two key components. Firstly, a puppet noise location, exhibiting the highest semantic expectation with the original location, is generated to derive noise-suppressed trajectory data. Secondly, a mechanism based on semantic and geographical distance is employed to cluster highly similar users into communities, facilitating the discovery of noise trajectory similarity among users. Through trials conducted using real datasets, the effectiveness of SUDM-SP, as a recommendation service ensuring user privacy protection is substantiated.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on medical data storage and sharing model based on blockchain 基于区块链的医疗数据存储与共享模型研究
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100133
Jian Zhao , Wenqian Qiang , Zisong Zhao , Tianbo An , Zhejun Kuang , Dawei Xu , Lijuan Shi

With the process of medical informatization, medical diagnosis results are recorded and shared in the form of electronic data in the computer. However, the security of medical data storage cannot be effectively protected and the unsafe sharing of medical data among different institutions is still a hidden danger that cannot be underestimated. To solve the above problems, a secure storage and sharing model of private data based on blockchain technology and homomorphic encryption is constructed. Based on the idea of blockchain decentralization, the model maintains a reliable medical alliance chain system to ensure the safe transmission of data between different institutions; A privacy data encryption and computing protocol based on homomorphic encryption is constructed to ensure the safe transmission of medical data; Using its complete anonymity to ensure the Blockchain of medical data and patient identity privacy; A strict transaction control management mechanism of medical data based on Intelligent contract automatic execution of preset instructions is proposed. After security verification, compared with the traditional medical big data storage and sharing mode, the model has better security and sharing.

随着医疗信息化的进程,医疗诊断结果在计算机中以电子数据的形式被记录和共享。然而,医疗数据存储的安全性无法得到有效保护,不同机构之间不安全的医疗数据共享仍然是一个不可小觑的隐患。针对上述问题,构建了一个基于区块链技术和同态加密的私有数据安全存储与共享模型。基于区块链去中心化的思想,该模型维护了一个可靠的医疗联盟链系统,以确保不同机构之间的数据安全传输;构建了一种基于同态加密的隐私数据加密和计算协议,以确保医疗数据的安全传输;利用其完全匿名性来确保医疗数据和患者身份隐私的区块链;提出了一种基于预设指令的智能合约自动执行的严格的医疗数据交易控制管理机制。经过安全验证,与传统的医疗大数据存储和共享模式相比,该模型具有更好的安全性和共享性。
{"title":"Research on medical data storage and sharing model based on blockchain","authors":"Jian Zhao ,&nbsp;Wenqian Qiang ,&nbsp;Zisong Zhao ,&nbsp;Tianbo An ,&nbsp;Zhejun Kuang ,&nbsp;Dawei Xu ,&nbsp;Lijuan Shi","doi":"10.1016/j.hcc.2023.100133","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100133","url":null,"abstract":"<div><p>With the process of medical informatization, medical diagnosis results are recorded and shared in the form of electronic data in the computer. However, the security of medical data storage cannot be effectively protected and the unsafe sharing of medical data among different institutions is still a hidden danger that cannot be underestimated. To solve the above problems, a secure storage and sharing model of private data based on blockchain technology and homomorphic encryption is constructed. Based on the idea of blockchain decentralization, the model maintains a reliable medical alliance chain system to ensure the safe transmission of data between different institutions; A privacy data encryption and computing protocol based on homomorphic encryption is constructed to ensure the safe transmission of medical data; Using its complete anonymity to ensure the Blockchain of medical data and patient identity privacy; A strict transaction control management mechanism of medical data based on Intelligent contract automatic execution of preset instructions is proposed. After security verification, compared with the traditional medical big data storage and sharing mode, the model has better security and sharing.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consensus algorithm for medical data storage and sharing based on master–slave multi-chain of alliance chain 基于联盟链主从多链的医疗数据存储共享共识算法
Pub Date : 2023-09-01 DOI: 10.1016/j.hcc.2023.100122
Yixian Zhang , Feng Zhao

The safe storage and sharing of medical data have promoted the development of the public medical field. At the same time, blockchain technology guarantees the safe storage and sharing of medical data. However, the consensus algorithm in the current medical blockchain cannot meet the requirements of low delay and high throughput in the large-scale network, and the identity of the primary node is exposed and vulnerable to attack. Therefore, this paper proposes an efficient consensus algorithm for medical data storage and sharing based on a master–slave multi-chain of alliance chain (ECA_MDSS). Firstly, institutional nodes in the healthcare alliance chain are clustered according to geographical location and medical system structure to form a multi-zones network. The system adopts master–slave multi-chain architecture to ensure security, and each zone processes transactions in parallel to improve consensus efficiency. Secondly, the aggregation signature is used to improve the practical Byzantine fault-tolerant (PBFT) consensus to reduce the communication interaction of consensus in each zone. Finally, an efficient ring signature is used to ensure the anonymity and privacy of the primary node in each zone and to prevent adaptive attacks. Meanwhile, a trust model is introduced to evaluate the trust degree of the node to reduce the evil done by malicious nodes. The experimental results show that ECA_ MDSS can effectively reduce communication overhead and consensus delay, improve transaction throughput, and enhance system scalability.

医疗数据的安全存储和共享促进了公共医疗领域的发展。同时,区块链技术保证了医疗数据的安全存储和共享。然而,当前医疗区块链中的共识算法无法满足大规模网络中低延迟、高吞吐量的要求,主节点的身份暴露且易受攻击。因此,本文提出了一种基于联盟链主从多链(ECA_MDSS)的高效医疗数据存储和共享共识算法。首先,根据地理位置和医疗体系结构,对医疗联盟链中的机构节点进行聚类,形成多区域网络。系统采用主从多链架构,确保安全,每个区域并行处理事务,提高共识效率。其次,使用聚合签名来改进实用拜占庭容错(PBFT)共识,以减少共识在每个区域的通信交互。最后,使用有效的环签名来确保每个区域中主节点的匿名性和私密性,并防止自适应攻击。同时,引入了一个信任模型来评估节点的信任度,以减少恶意节点的恶意行为。实验结果表明,ECA_MDS可以有效地降低通信开销和一致性延迟,提高事务吞吐量,增强系统的可扩展性。
{"title":"Consensus algorithm for medical data storage and sharing based on master–slave multi-chain of alliance chain","authors":"Yixian Zhang ,&nbsp;Feng Zhao","doi":"10.1016/j.hcc.2023.100122","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100122","url":null,"abstract":"<div><p>The safe storage and sharing of medical data have promoted the development of the public medical field. At the same time, blockchain technology guarantees the safe storage and sharing of medical data. However, the consensus algorithm in the current medical blockchain cannot meet the requirements of low delay and high throughput in the large-scale network, and the identity of the primary node is exposed and vulnerable to attack. Therefore, this paper proposes an efficient consensus algorithm for medical data storage and sharing based on a master–slave multi-chain of alliance chain (ECA_MDSS). Firstly, institutional nodes in the healthcare alliance chain are clustered according to geographical location and medical system structure to form a multi-zones network. The system adopts master–slave multi-chain architecture to ensure security, and each zone processes transactions in parallel to improve consensus efficiency. Secondly, the aggregation signature is used to improve the practical Byzantine fault-tolerant (PBFT) consensus to reduce the communication interaction of consensus in each zone. Finally, an efficient ring signature is used to ensure the anonymity and privacy of the primary node in each zone and to prevent adaptive attacks. Meanwhile, a trust model is introduced to evaluate the trust degree of the node to reduce the evil done by malicious nodes. The experimental results show that ECA_ MDSS can effectively reduce communication overhead and consensus delay, improve transaction throughput, and enhance system scalability.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50191221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1