首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
Erratum regarding missing statements in previously published articles 关于先前发表文章中遗漏陈述的勘误表
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100105
{"title":"Erratum regarding missing statements in previously published articles","authors":"","doi":"10.1016/j.hcc.2023.100105","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100105","url":null,"abstract":"","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100105"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-based keyword search encryption for power data protection 基于属性的关键字搜索加密用于电力数据保护
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100115
Xun Zhang , Dejun Mu , Jinxiong Zhao

To protect the privacy of power data, we usually encrypt data before outsourcing it to the cloud servers. However, it is challenging to search over the encrypted data. In addition, we need to ensure that only authorized users can retrieve the power data. The attribute-based searchable encryption is an advanced technology to solve these problems. However, many existing schemes do not support large universe, expressive access policies, and hidden access policies. In this paper, we propose an attribute-based keyword search encryption scheme for power data protection. Firstly, our proposed scheme can support encrypted data retrieval and achieve fine-grained access control. Only authorized users whose attributes satisfy the access policies can search and decrypt the encrypted data. Secondly, to satisfy the requirement in the power grid environment, the proposed scheme can support large attribute universe and hidden access policies. The access policy in this scheme does not leak private information about users. Thirdly, the security analysis and performance analysis indicate that our scheme is efficient and practical. Furthermore, the comparisons with other schemes demonstrate the advantages of our proposed scheme.

为了保护电力数据的隐私,我们通常在将数据外包给云服务器之前对其进行加密。然而,对加密数据进行搜索是具有挑战性的。此外,我们需要确保只有授权用户才能检索电力数据。基于属性的可搜索加密是解决这些问题的一种先进技术。然而,许多现有的方案不支持大范围、表达式访问策略和隐藏式访问策略。在本文中,我们提出了一种用于电力数据保护的基于属性的关键字搜索加密方案。首先,我们提出的方案可以支持加密数据检索,并实现细粒度的访问控制。只有属性满足访问策略的授权用户才能搜索和解密加密数据。其次,为了满足电网环境下的要求,该方案可以支持大属性域和隐藏访问策略。此方案中的访问策略不会泄露有关用户的私人信息。第三,安全性分析和性能分析表明,该方案是有效的、实用的。此外,与其他方案的比较表明了我们提出的方案的优点。
{"title":"Attribute-based keyword search encryption for power data protection","authors":"Xun Zhang ,&nbsp;Dejun Mu ,&nbsp;Jinxiong Zhao","doi":"10.1016/j.hcc.2023.100115","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100115","url":null,"abstract":"<div><p>To protect the privacy of power data, we usually encrypt data before outsourcing it to the cloud servers. However, it is challenging to search over the encrypted data. In addition, we need to ensure that only authorized users can retrieve the power data. The attribute-based searchable encryption is an advanced technology to solve these problems. However, many existing schemes do not support large universe, expressive access policies, and hidden access policies. In this paper, we propose an attribute-based keyword search encryption scheme for power data protection. Firstly, our proposed scheme can support encrypted data retrieval and achieve fine-grained access control. Only authorized users whose attributes satisfy the access policies can search and decrypt the encrypted data. Secondly, to satisfy the requirement in the power grid environment, the proposed scheme can support large attribute universe and hidden access policies. The access policy in this scheme does not leak private information about users. Thirdly, the security analysis and performance analysis indicate that our scheme is efficient and practical. Furthermore, the comparisons with other schemes demonstrate the advantages of our proposed scheme.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100115"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey on security analysis of machine learning-oriented hardware and software intellectual property 面向机器学习的软硬件知识产权安全分析综述
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100114
Ashraful Tauhid , Lei Xu , Mostafizur Rahman , Emmett Tomai

Intellectual Property (IP) includes ideas, innovations, methodologies, works of authorship (viz., literary and artistic works), emblems, brands, images, etc. This property is intangible since it is pertinent to the human intellect. Therefore, IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent. IP protection regulations have been deployed and are still in practice, including patents, copyrights, contracts, trademarks, trade secrets, etc., to address these challenges. Unfortunately, these protections are insufficient to keep IP entities from being changed or stolen without permission. As for this, some IPs require hardware IP protection mechanisms, and others require software IP protection techniques. To secure these IPs, researchers have explored the domain of Intellectual Property Protection (IPP) using different approaches. In this paper, we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research; provide discussions on hardware IP and software IP attacks and defense techniques; summarize different applications of IP protection; and lastly, identify the challenges and future research prospects in hardware and software IP security.

知识产权(IP)包括思想、创新、方法、作者作品(即文学和艺术作品)、徽章、品牌、图像等。这种财产是无形的,因为它与人类的智力有关。因此,毫无疑问,知识产权实体在未经所有者同意的情况下容易受到侵犯和修改。知识产权保护法规已经部署并仍在实施,包括专利、版权、合同、商标、商业秘密等,以应对这些挑战。不幸的是,这些保护措施不足以防止IP实体在未经许可的情况下被更改或窃取。对此,一些IP需要硬件IP保护机制,而另一些则需要软件IP保护技术。为了保护这些IP,研究人员使用不同的方法探索了知识产权保护领域。在本文中,我们讨论了IPP研究领域现有的知识产权和同时取得的突破;提供关于硬件IP和软件IP攻击和防御技术的讨论;总结IP保护的不同应用;最后,确定了软硬件IP安全方面的挑战和未来的研究前景。
{"title":"A survey on security analysis of machine learning-oriented hardware and software intellectual property","authors":"Ashraful Tauhid ,&nbsp;Lei Xu ,&nbsp;Mostafizur Rahman ,&nbsp;Emmett Tomai","doi":"10.1016/j.hcc.2023.100114","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100114","url":null,"abstract":"<div><p>Intellectual Property (IP) includes ideas, innovations, methodologies, works of authorship (viz., literary and artistic works), emblems, brands, images, etc. This property is intangible since it is pertinent to the human intellect. Therefore, IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent. IP protection regulations have been deployed and are still in practice, including patents, copyrights, contracts, trademarks, trade secrets, etc., to address these challenges. Unfortunately, these protections are insufficient to keep IP entities from being changed or stolen without permission. As for this, some IPs require hardware IP protection mechanisms, and others require software IP protection techniques. To secure these IPs, researchers have explored the domain of Intellectual Property Protection (IPP) using different approaches. In this paper, we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research; provide discussions on hardware IP and software IP attacks and defense techniques; summarize different applications of IP protection; and lastly, identify the challenges and future research prospects in hardware and software IP security.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100114"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions 物联网安全和隐私信任管理技术的详细研究:挑战、趋势和研究方向
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100127
Himani Tyagi , Rajendra Kumar , Santosh Kr Pandey

The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life. The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT. Therefore, this technology is facing some serious issues and challenges concerning security and privacy. These issues and challenges are the real motivation behind considering this study. Hence, this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks. This systematic literature review (SLR) focuses particularly on a popular and applicable security approach known as Trust Management System (TMS). Firstly, all aspects of trust management, including trust indicators, trust properties, trust evaluation, trust building, trust models and the importance of those models for security and privacy, trust prediction methodologies, and ultimately trust-based attacks, are covered in this literature. Secondly, trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT: cryptography-based, computational and probabilistic-based, information theory-based, and others. Then, an understanding of the problems and difficulties with current methodologies is given, along with suggestions for further research. Finally, the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.

物联网是一项现代技术,旨在通过自动化日常生活中使用的大多数东西来缓解人类生活。通信对网络的无休止依赖正在吸引对手利用物联网的漏洞。因此,这项技术在安全和隐私方面面临着一些严重的问题和挑战。这些问题和挑战是考虑这项研究的真正动机。因此,本次调查包括关于安全和隐私挑战的讨论,以及基于物联网的无线传感器网络的可用解决方案。这篇系统的文献综述(SLR)特别关注一种流行且适用的安全方法,即信任管理系统(TMS)。首先,本文献涵盖了信任管理的各个方面,包括信任指标、信任属性、信任评估、信任建立、信任模型以及这些模型对安全和隐私的重要性、信任预测方法,以及最终基于信任的攻击。其次,根据物联网中基于信任的安全解决方案所使用的方法,将信任管理方案分为四组:基于密码学的、基于计算和概率的、基于信息论的和其他。然后,对当前方法论存在的问题和难点进行了理解,并提出了进一步研究的建议。最后,通过制定物联网中信任管理系统的期望特征,并提出适用于物联网网络的信任模型,得出了SLR的结论。
{"title":"A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions","authors":"Himani Tyagi ,&nbsp;Rajendra Kumar ,&nbsp;Santosh Kr Pandey","doi":"10.1016/j.hcc.2023.100127","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100127","url":null,"abstract":"<div><p>The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life. The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT. Therefore, this technology is facing some serious issues and challenges concerning security and privacy. These issues and challenges are the real motivation behind considering this study. Hence, this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks. This systematic literature review (SLR) focuses particularly on a popular and applicable security approach known as Trust Management System (TMS). Firstly, all aspects of trust management, including trust indicators, trust properties, trust evaluation, trust building, trust models and the importance of those models for security and privacy, trust prediction methodologies, and ultimately trust-based attacks, are covered in this literature. Secondly, trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT: cryptography-based, computational and probabilistic-based, information theory-based, and others. Then, an understanding of the problems and difficulties with current methodologies is given, along with suggestions for further research. Finally, the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100127"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PRAP-PIM: A weight pattern reusing aware pruning method for ReRAM-based PIM DNN accelerators PRAP-PIM:一种用于基于ReRAM的PIM-DNN加速器的权重模式重用感知修剪方法
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100123
Zhaoyan Shen , Jinhao Wu , Xikun Jiang , Yuhao Zhang , Lei Ju , Zhiping Jia

Resistive Random-Access Memory (ReRAM) based Processing-in-Memory (PIM) frameworks are proposed to accelerate the working process of DNN models by eliminating the data movement between the computing and memory units. To further mitigate the space and energy consumption, DNN model weight sparsity and weight pattern repetition are exploited to optimize these ReRAM-based accelerators. However, most of these works only focus on one aspect of this software/hardware co-design framework and optimize them individually, which makes the design far from optimal. In this paper, we propose PRAP-PIM, which jointly exploits the weight sparsity and weight pattern repetition by using a weight pattern reusing aware pruning method. By relaxing the weight pattern reusing precondition, we propose a similarity-based weight pattern reusing method that can achieve a higher weight pattern reusing ratio. Experimental results show that PRAP-PIM achieves 1.64× performance improvement and 1.51× energy efficiency improvement in popular deep learning benchmarks, compared with the state-of-the-art ReRAM-based DNN accelerators.

提出了基于电阻随机存取存储器(ReRAM)的存储器中处理(PIM)框架,通过消除计算单元和存储器单元之间的数据移动来加速DNN模型的工作过程。为了进一步减少空间和能量消耗,利用DNN模型的权重稀疏性和权重模式重复性来优化这些基于ReRAM的加速器。然而,这些工作大多只关注这种软硬件协同设计框架的一个方面,并对其进行单独的优化,这使得设计远非最佳。在本文中,我们提出了PRAP-PIM,它通过使用权重模式重用感知修剪方法来联合利用权重稀疏性和权重模式重复性。通过放宽权重模式重用的前提,提出了一种基于相似性的权重模式重用方法,可以获得更高的权重模式复用率。实验结果表明,与最先进的基于ReRAM的DNN加速器相比,PRAP-PIM在流行的深度学习基准中实现了1.64倍的性能提升和1.51倍的能效提升。
{"title":"PRAP-PIM: A weight pattern reusing aware pruning method for ReRAM-based PIM DNN accelerators","authors":"Zhaoyan Shen ,&nbsp;Jinhao Wu ,&nbsp;Xikun Jiang ,&nbsp;Yuhao Zhang ,&nbsp;Lei Ju ,&nbsp;Zhiping Jia","doi":"10.1016/j.hcc.2023.100123","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100123","url":null,"abstract":"<div><p>Resistive Random-Access Memory (ReRAM) based Processing-in-Memory (PIM) frameworks are proposed to accelerate the working process of DNN models by eliminating the data movement between the computing and memory units. To further mitigate the space and energy consumption, DNN model weight sparsity and weight pattern repetition are exploited to optimize these ReRAM-based accelerators. However, most of these works only focus on one aspect of this software/hardware co-design framework and optimize them individually, which makes the design far from optimal. In this paper, we propose PRAP-PIM, which jointly exploits the weight sparsity and weight pattern repetition by using a weight pattern reusing aware pruning method. By relaxing the weight pattern reusing precondition, we propose a similarity-based weight pattern reusing method that can achieve a higher weight pattern reusing ratio. Experimental results show that PRAP-PIM achieves 1.64× performance improvement and 1.51× energy efficiency improvement in popular deep learning benchmarks, compared with the state-of-the-art ReRAM-based DNN accelerators.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100123"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM 使用改进的椭圆曲线密码算法增强物联网设备安全性,并使用深度LSTM检测恶意软件
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100117
R. Aiyshwariya Devi, A.R. Arunachalam

Internet of things (IoT) has become more popular due to the development and potential of smart technology aspects. Security concerns against IoT infrastructure, applications, and devices have grown along with the need for IoT technologies. Enhanced system security protocols are difficult due to the diverse capabilities of IoT devices and the dynamic, ever-changing environment, and simply applying basic security requirements is dangerous. Therefore, this proposed work designs a malware detection and prevention approach for secure data transmission among IoT gadgets. The malware detection approach is designed with the aid of a deep learning approach. The initial process is identifying attack nodes from normal nodes through a trust value using contextual features. After discovering attack nodes, these are considered for predicting different kinds of attacks present in the network, while some preprocessing and feature extraction strategies are applied for effective classification. The Deep LSTM classifier is applied for this malware detection approach. Once completed malware detection, prevention is performed with the help of the Improved Elliptic Curve Cryptography (IECC) algorithm. A hybrid MA-BW optimization is adopted for selecting the optimal key during transmission. Python 3.8 software is used to test the performance of the proposed approach, and several existing techniques are considered to evaluate its performance. The proposed approach obtained 95% of accuracy, 5% of error value and 92% of precision. In addition, the improved ECC algorithm is also compared with some existing algorithm which takes 6.02 s of execution time. Compared to the other methods, the proposed approach provides better security to IoT gadgets during data transmission.

物联网(IoT)由于智能技术方面的发展和潜力而变得更加流行。随着对物联网技术的需求,对物联网基础设施、应用程序和设备的安全担忧也在增长。由于物联网设备的不同功能和不断变化的动态环境,增强的系统安全协议很困难,简单地应用基本安全要求是危险的。因此,这项拟议的工作设计了一种用于物联网小工具之间安全数据传输的恶意软件检测和预防方法。恶意软件检测方法是在深度学习方法的帮助下设计的。初始过程是通过使用上下文特征的信任值从正常节点中识别攻击节点。在发现攻击节点后,考虑这些节点来预测网络中存在的不同类型的攻击,同时应用一些预处理和特征提取策略来进行有效的分类。Deep LSTM分类器被应用于这种恶意软件检测方法。一旦完成恶意软件检测,就可以在改进的椭圆曲线密码算法(IECC)的帮助下进行预防。在传输过程中,采用混合MA-BW优化来选择最佳密钥。Python 3.8软件用于测试所提出方法的性能,并考虑了几种现有技术来评估其性能。该方法的准确率为95%,误差值为5%,精度为92%。此外,还将改进的ECC算法与现有的执行时间为6.02s的算法进行了比较。与其他方法相比,所提出的方法在数据传输过程中为物联网小工具提供了更好的安全性。
{"title":"Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM","authors":"R. Aiyshwariya Devi,&nbsp;A.R. Arunachalam","doi":"10.1016/j.hcc.2023.100117","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100117","url":null,"abstract":"<div><p>Internet of things (IoT) has become more popular due to the development and potential of smart technology aspects. Security concerns against IoT infrastructure, applications, and devices have grown along with the need for IoT technologies. Enhanced system security protocols are difficult due to the diverse capabilities of IoT devices and the dynamic, ever-changing environment, and simply applying basic security requirements is dangerous. Therefore, this proposed work designs a malware detection and prevention approach for secure data transmission among IoT gadgets. The malware detection approach is designed with the aid of a deep learning approach. The initial process is identifying attack nodes from normal nodes through a trust value using contextual features. After discovering attack nodes, these are considered for predicting different kinds of attacks present in the network, while some preprocessing and feature extraction strategies are applied for effective classification. The Deep LSTM classifier is applied for this malware detection approach. Once completed malware detection, prevention is performed with the help of the Improved Elliptic Curve Cryptography (IECC) algorithm. A hybrid MA-BW optimization is adopted for selecting the optimal key during transmission. Python 3.8 software is used to test the performance of the proposed approach, and several existing techniques are considered to evaluate its performance. The proposed approach obtained 95% of accuracy, 5% of error value and 92% of precision. In addition, the improved ECC algorithm is also compared with some existing algorithm which takes 6.02 s of execution time. Compared to the other methods, the proposed approach provides better security to IoT gadgets during data transmission.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100117"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection DPTP-LICD:一种基于潜在利益群体检测的差分隐私轨迹保护方法
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100134
Weiqi Zhang , Guisheng Yin , Yuxin Dong , Fukun Chen , Qasim Zia

With the rapid development of high-speed mobile network technology and high-precision positioning technology, the trajectory information of mobile users has received extensive attention from academia and industry in the field of Location-based Social Networks. Researchers can mine users’ trajectories in Location-based Social Networks to obtain sensitive information, such as friendship groups, activity patterns, and consumption habits. Therefore, mobile users’ privacy and security issues have received growing attention in Location-based Social networks. It is crucial to strike a balance between privacy protection and data availability. This paper proposes a differential privacy trajectory protection method based on latent interest community detection (DPTP-LICD), ensuring strict privacy protection standards and user data availability. Firstly, based on the historical trajectory information of users, spatiotemporal constraint information is extracted to construct a potential community strength model for mobile users. Secondly, the latent interest community obtained from the analysis is used to identify preferred hot spots on the user’s trajectory, and their priorities are assigned based on a popularity model. A reasonable privacy budget is allocated to prevent excessive noise from being added and rendering the protected trajectory data unusable. Finally, to prevent privacy leakage, we add Laplace and exponential noise in generating preferred hot spots and recommending user interest points. Security and effectiveness analysis shows that our mechanism provides effective points of interest recommendations and protects users’ privacy from disclosure.

随着高速移动网络技术和高精度定位技术的快速发展,移动用户的轨迹信息在基于位置的社交网络领域受到了学术界和业界的广泛关注。研究人员可以在基于位置的社交网络中挖掘用户的轨迹,以获取敏感信息,如友谊团体、活动模式和消费习惯。因此,移动用户的隐私和安全问题在基于位置的社交网络中越来越受到关注。在隐私保护和数据可用性之间取得平衡至关重要。本文提出了一种基于潜在兴趣社区检测的差分隐私轨迹保护方法(DPTP-LICD),以确保严格的隐私保护标准和用户数据的可用性。首先,基于用户的历史轨迹信息,提取时空约束信息,构建移动用户潜在的社区强度模型。其次,通过分析获得的潜在兴趣社区用于识别用户轨迹上的首选热点,并基于流行度模型分配其优先级。分配合理的隐私预算以防止添加过多的噪声并使受保护的轨迹数据不可用。最后,为了防止隐私泄露,我们在生成首选热点和推荐用户兴趣点时添加了拉普拉斯和指数噪声。安全性和有效性分析表明,我们的机制提供了有效的兴趣点推荐,并保护用户的隐私不被泄露。
{"title":"DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection","authors":"Weiqi Zhang ,&nbsp;Guisheng Yin ,&nbsp;Yuxin Dong ,&nbsp;Fukun Chen ,&nbsp;Qasim Zia","doi":"10.1016/j.hcc.2023.100134","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100134","url":null,"abstract":"<div><p>With the rapid development of high-speed mobile network technology and high-precision positioning technology, the trajectory information of mobile users has received extensive attention from academia and industry in the field of Location-based Social Networks. Researchers can mine users’ trajectories in Location-based Social Networks to obtain sensitive information, such as friendship groups, activity patterns, and consumption habits. Therefore, mobile users’ privacy and security issues have received growing attention in Location-based Social networks. It is crucial to strike a balance between privacy protection and data availability. This paper proposes a differential privacy trajectory protection method based on latent interest community detection (DPTP-LICD), ensuring strict privacy protection standards and user data availability. Firstly, based on the historical trajectory information of users, spatiotemporal constraint information is extracted to construct a potential community strength model for mobile users. Secondly, the latent interest community obtained from the analysis is used to identify preferred hot spots on the user’s trajectory, and their priorities are assigned based on a popularity model. A reasonable privacy budget is allocated to prevent excessive noise from being added and rendering the protected trajectory data unusable. Finally, to prevent privacy leakage, we add Laplace and exponential noise in generating preferred hot spots and recommending user interest points. Security and effectiveness analysis shows that our mechanism provides effective points of interest recommendations and protects users’ privacy from disclosure.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100134"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on offloading in fog-based Internet of Things: Architecture, machine learning approaches, and open issues 基于雾的物联网卸载综述:架构、机器学习方法和开放问题
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100124
Kalimullah Lone , Shabir Ahmad Sofi

There is an exponential increase in the number of smart devices, generating helpful information and posing a serious challenge while processing this huge data. The processing is either done at fog level or cloud level depending on the size and nature of the task. Offloading data to fog or cloud adds latency, which is less in fog and more in the cloud. The methods of processing data and tasks at fog level or cloud are mostly machine learning based. In this paper, we will discuss all three levels in terms of architecture, starting from the internet of things to fog and fog to cloud. Specifically, we will describe machine learning-based offloading from the internet of things to fog and fog to cloud. Finally, we will come up with current research directions, issues, and challenges in the IoT–fog–cloud environment.

智能设备的数量呈指数级增长,在处理这些巨大数据的同时,产生了有用的信息,并带来了严峻的挑战。根据任务的大小和性质,处理可以在雾级别或云级别进行。将数据卸载到雾或云中会增加延迟,雾中的延迟较少,云中的延迟较多。在雾级或云中处理数据和任务的方法大多是基于机器学习的。在本文中,我们将从架构的角度讨论这三个层面,从物联网到雾,从雾到云。具体来说,我们将描述基于机器学习的从物联网到雾和从雾到云的卸载。最后,我们将提出物联网-雾-云环境中的当前研究方向、问题和挑战。
{"title":"A review on offloading in fog-based Internet of Things: Architecture, machine learning approaches, and open issues","authors":"Kalimullah Lone ,&nbsp;Shabir Ahmad Sofi","doi":"10.1016/j.hcc.2023.100124","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100124","url":null,"abstract":"<div><p>There is an exponential increase in the number of smart devices, generating helpful information and posing a serious challenge while processing this huge data. The processing is either done at fog level or cloud level depending on the size and nature of the task. Offloading data to fog or cloud adds latency, which is less in fog and more in the cloud. The methods of processing data and tasks at fog level or cloud are mostly machine learning based. In this paper, we will discuss all three levels in terms of architecture, starting from the internet of things to fog and fog to cloud. Specifically, we will describe machine learning-based offloading from the internet of things to fog and fog to cloud. Finally, we will come up with current research directions, issues, and challenges in the IoT–fog–cloud environment.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100124"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data-driven approach to designing a BCI-integrated smart wheelchair through cost–benefit analysis 通过成本效益分析设计脑机接口集成智能轮椅的数据驱动方法
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100118
Jenamani Chandrakanta Badajena, Srinivas Sethi, Ramesh Kumar Sahoo

A smart wheelchair provides mobility assistance to persons with motor disabilities by processing sensory inputs from the person. This involves accurately collecting inputs from the user during various movement activities and using them to determine their intended motion. These smart wheelchairs work by collecting brain signals in the form of electroencephalography (EEG) signals and by processing them into a quantized format to provide movement assistance to people. Such systems can be referred to as brain–computer interface (BCI) systems that work with EEG signals. Acquiring data from human beings in the form of brain signals through EEG, along with processing of those signals and ensuring the correctness of actions instigated by those brain signals involve a huge amount of data. In this work, we carried out an experiment by taking 100 human subjects and recording their brain signals using a NeuroMax device. Typical wheelchairs are constrained by design as the motion of those is limited either by manual operation or controlled by haptic sensors and actuators. The main objective in this work was to design a wheelchair with better usability and control using machine learning-based knowledge, which is typically a data-driven approach. However, the proposed approach was designed to take inputs from human gestures and brain sensory activities to provide better usability to the wheelchair. The attention meditation cost–benefit analysis (AMCBA) proposed in this paper aims to reduce the risk of inappropriate results and improve performance by considering various cost–benefit parameters. The said classifier aims to improve the quality of emotion recognition by filtering features from EEG signals using methods of feature selection. The operation of the proposed method is described in two steps: in the first step, we assign weights to different channels for the extraction of spatial and temporal information from human behavior. The second step presents the cost–benefit model to improve the accuracy to help in decision-making. Moreover, we tried to assess the performance of the wheelchair for various assumptions and technical specifications. Finally, this study achieves improved performance in the most difficult circumstances to provide a better experience to persons with immobility.

智能轮椅通过处理运动残疾人的感官输入,为其提供行动辅助。这包括在各种运动活动期间准确地收集来自用户的输入,并使用它们来确定他们的预期运动。这些智能轮椅的工作原理是以脑电图(EEG)信号的形式收集大脑信号,并将其处理成量化格式,为人们提供运动帮助。这类系统可以被称为脑机接口(BCI)系统,用于处理EEG信号。通过脑电图以脑信号的形式从人类获取数据,以及对这些信号的处理,以及确保这些脑信号所引发的行动的正确性,涉及大量数据。在这项工作中,我们进行了一项实验,选取了100名受试者,并使用NeuroMax设备记录他们的大脑信号。典型的轮椅受到设计的限制,因为这些轮椅的运动受到手动操作的限制或受到触觉传感器和致动器的控制。这项工作的主要目标是使用基于机器学习的知识设计一种具有更好可用性和控制性的轮椅,这通常是一种数据驱动的方法。然而,所提出的方法是为了从人类手势和大脑感觉活动中获取输入,从而为轮椅提供更好的可用性。本文提出的注意力冥想成本效益分析(AMCBA)旨在通过考虑各种成本效益参数来降低不适当结果的风险并提高性能。所述分类器旨在通过使用特征选择方法从EEG信号中过滤特征来提高情绪识别的质量。所提出的方法的操作分两步描述:在第一步中,我们为不同的通道分配权重,用于从人类行为中提取空间和时间信息。第二步提出了成本效益模型,以提高决策的准确性。此外,我们试图评估轮椅在各种假设和技术规范下的性能。最后,这项研究在最困难的情况下提高了表现,为行动不便的人提供了更好的体验。
{"title":"Data-driven approach to designing a BCI-integrated smart wheelchair through cost–benefit analysis","authors":"Jenamani Chandrakanta Badajena,&nbsp;Srinivas Sethi,&nbsp;Ramesh Kumar Sahoo","doi":"10.1016/j.hcc.2023.100118","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100118","url":null,"abstract":"<div><p>A smart wheelchair provides mobility assistance to persons with motor disabilities by processing sensory inputs from the person. This involves accurately collecting inputs from the user during various movement activities and using them to determine their intended motion. These smart wheelchairs work by collecting brain signals in the form of electroencephalography (EEG) signals and by processing them into a quantized format to provide movement assistance to people. Such systems can be referred to as brain–computer interface (BCI) systems that work with EEG signals. Acquiring data from human beings in the form of brain signals through EEG, along with processing of those signals and ensuring the correctness of actions instigated by those brain signals involve a huge amount of data. In this work, we carried out an experiment by taking 100 human subjects and recording their brain signals using a <em>NeuroMax</em> device. Typical wheelchairs are constrained by design as the motion of those is limited either by manual operation or controlled by haptic sensors and actuators. The main objective in this work was to design a wheelchair with better usability and control using machine learning-based knowledge, which is typically a data-driven approach. However, the proposed approach was designed to take inputs from human gestures and brain sensory activities to provide better usability to the wheelchair. The attention meditation cost–benefit analysis (AMCBA) proposed in this paper aims to reduce the risk of inappropriate results and improve performance by considering various cost–benefit parameters. The said classifier aims to improve the quality of emotion recognition by filtering features from EEG signals using methods of feature selection. The operation of the proposed method is described in two steps: in the first step, we assign weights to different channels for the extraction of spatial and temporal information from human behavior. The second step presents the cost–benefit model to improve the accuracy to help in decision-making. Moreover, we tried to assess the performance of the wheelchair for various assumptions and technical specifications. Finally, this study achieves improved performance in the most difficult circumstances to provide a better experience to persons with immobility.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100118"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralizing access control system for data sharing in smart grid 智能电网数据共享的分散访问控制系统
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.1016/j.hcc.2023.100113
Kunpeng Liu , Chenfei Wang , Xiaotong Zhou

Smart grid enhances the intelligence of the traditional power grid, which allows sharing varied data such as consumer, production, or energy with service consumers. Due to the untrustworthy networks, there exist potential security threats (e.g., unauthorized access and modification, malicious data theft) hindering the development of smart grid. While several access control schemes have been proposed for smart grid to achieve sensitive data protection and fine-grained identity management, most of them cannot satisfy the requirements of decentralizing smart grid environment and suffer from key escrow problems. In addition, some existing solutions cannot achieve dynamic user management for lacking the privilege revocation mechanism. In this paper, we propose a decentralizing access control system with user revocation to relieve the above problems. We design a new multiple-authority attribute-based encryption (MABE) scheme to keep data confidentiality and adapt decentralizing smart grid applications. We also compare our proposal with the similar solution from both security and performance. The comparing results show that our access control system can achieve a trade-off among confidentiality, authentication, distribution and efficiency in smart grid.

智能电网增强了传统电网的智能性,允许与服务消费者共享消费者、生产或能源等各种数据。由于网络不可信,存在潜在的安全威胁(如未经授权的访问和修改、恶意数据盗窃),阻碍了智能电网的发展。虽然已经为智能电网提出了几种访问控制方案,以实现敏感数据保护和细粒度身份管理,但大多数方案都不能满足去中心化智能电网环境的要求,并且存在关键托管问题。此外,由于缺乏权限撤销机制,现有的一些解决方案无法实现动态用户管理。在本文中,我们提出了一个具有用户撤销的去中心化访问控制系统来缓解上述问题。我们设计了一种新的基于多权限属性的加密(MABE)方案,以保持数据机密性并适应去中心化的智能电网应用。我们还从安全性和性能两个方面将我们的方案与类似的解决方案进行了比较。比较结果表明,我们的访问控制系统可以在智能电网中实现保密性、认证性、分布性和效率之间的权衡。
{"title":"Decentralizing access control system for data sharing in smart grid","authors":"Kunpeng Liu ,&nbsp;Chenfei Wang ,&nbsp;Xiaotong Zhou","doi":"10.1016/j.hcc.2023.100113","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100113","url":null,"abstract":"<div><p>Smart grid enhances the intelligence of the traditional power grid, which allows sharing varied data such as consumer, production, or energy with service consumers. Due to the untrustworthy networks, there exist potential security threats (e.g., unauthorized access and modification, malicious data theft) hindering the development of smart grid. While several access control schemes have been proposed for smart grid to achieve sensitive data protection and fine-grained identity management, most of them cannot satisfy the requirements of decentralizing smart grid environment and suffer from key escrow problems. In addition, some existing solutions cannot achieve dynamic user management for lacking the privilege revocation mechanism. In this paper, we propose a decentralizing access control system with user revocation to relieve the above problems. We design a new multiple-authority attribute-based encryption (MABE) scheme to keep data confidentiality and adapt decentralizing smart grid applications. We also compare our proposal with the similar solution from both security and performance. The comparing results show that our access control system can achieve a trade-off among confidentiality, authentication, distribution and efficiency in smart grid.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 2","pages":"Article 100113"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50200499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1