With the development of Big Data technology, the power industry has also entered the data-driven intelligence era. Cloud computing-based smart grids give the power industry stronger capabilities in data analytics. Electricity load forecasting in the cloud helps smart grids allocate resources appropriately. However, the users’ privacy is easily compromised in the load forecasting process with cloud computing. The electricity usage data collected by the system may contain sensitive information about the users, which could lead to serious privacy leakage. In order to solve the issues, we propose a novel privacy-preserving cloud-aided load forecasting scheme for the cloud computing-based smart grid. It contains a secure online training algorithm and an efficient real-time forecasting algorithm. Meanwhile, the two-party interaction security scheme is more suitable for real-world applications. Before being sent to the cloud server, the control center of the smart grids encrypts the data using homomorphic encryption. During the process of model training and forecasting, the data remains securely encrypted at all times to avoid the risk of data privacy breaches. Finally, security and experimental analyses show that our scheme effectively avoids privacy leakage while reducing resource consumption.
{"title":"Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid","authors":"Chunqiang Hu;Huijun Zhuang;Jiajun Chen;Pengfei Hu;Tao Xiang;Jiguo Yu","doi":"10.1109/TCC.2024.3399771","DOIUrl":"10.1109/TCC.2024.3399771","url":null,"abstract":"With the development of Big Data technology, the power industry has also entered the data-driven intelligence era. Cloud computing-based smart grids give the power industry stronger capabilities in data analytics. Electricity load forecasting in the cloud helps smart grids allocate resources appropriately. However, the users’ privacy is easily compromised in the load forecasting process with cloud computing. The electricity usage data collected by the system may contain sensitive information about the users, which could lead to serious privacy leakage. In order to solve the issues, we propose a novel privacy-preserving cloud-aided load forecasting scheme for the cloud computing-based smart grid. It contains a secure online training algorithm and an efficient real-time forecasting algorithm. Meanwhile, the two-party interaction security scheme is more suitable for real-world applications. Before being sent to the cloud server, the control center of the smart grids encrypts the data using homomorphic encryption. During the process of model training and forecasting, the data remains securely encrypted at all times to avoid the risk of data privacy breaches. Finally, security and experimental analyses show that our scheme effectively avoids privacy leakage while reducing resource consumption.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140934347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-12DOI: 10.1109/tcc.2024.3375801
Khlood Jastaniah, Ning Zhang, Mustafa A. Mustafa
{"title":"Efficient User-Centric Privacy-Friendly and Flexible Wearable Data Aggregation and Sharing","authors":"Khlood Jastaniah, Ning Zhang, Mustafa A. Mustafa","doi":"10.1109/tcc.2024.3375801","DOIUrl":"https://doi.org/10.1109/tcc.2024.3375801","url":null,"abstract":"","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140115315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-11DOI: 10.1109/TCC.2024.3374798
Kewei Wang;Changzhen Hu;Chun Shan
Cloud native application is especially susceptible to application layer DDoS attack. This attributes to the internal service calls, by which microservices cooperate and communicate with each other, amplifying the effect of application layer DDoS attack. Since different services have varying degrees of sensitivity to an attack, a sophisticated attacker can take advantage of those especially expensive API calls to produce serious damage to the availability of services and applications with ease. To better analyze the severity of and mitigate application layer DDoS attacks in cloud native applications, we propose a novel method to evaluate the effect of application layer DDoS attack, that is able to quantitatively characterize the amplifying effect introduced by the complex structure of application system. We first present the descriptive model of the scenario. Then, Riemannian manifolds are constructed as the state spaces of the attack scenarios, in which attacks are described as homeomorphisms. Finally, we apply differential geometry principles to quantitatively calculate the attack effect, which is derived from the action of an attack and the movement it produces in the state spaces. The proposed method is validated in various application scenarios. We show that our approach provides accurate evaluation results, and outperforms existing solutions.
{"title":"Evaluation of Application Layer DDoS Attack Effect in Cloud Native Applications","authors":"Kewei Wang;Changzhen Hu;Chun Shan","doi":"10.1109/TCC.2024.3374798","DOIUrl":"10.1109/TCC.2024.3374798","url":null,"abstract":"Cloud native application is especially susceptible to application layer DDoS attack. This attributes to the internal service calls, by which microservices cooperate and communicate with each other, amplifying the effect of application layer DDoS attack. Since different services have varying degrees of sensitivity to an attack, a sophisticated attacker can take advantage of those especially expensive API calls to produce serious damage to the availability of services and applications with ease. To better analyze the severity of and mitigate application layer DDoS attacks in cloud native applications, we propose a novel method to evaluate the effect of application layer DDoS attack, that is able to quantitatively characterize the amplifying effect introduced by the complex structure of application system. We first present the descriptive model of the scenario. Then, Riemannian manifolds are constructed as the state spaces of the attack scenarios, in which attacks are described as homeomorphisms. Finally, we apply differential geometry principles to quantitatively calculate the attack effect, which is derived from the action of an attack and the movement it produces in the state spaces. The proposed method is validated in various application scenarios. We show that our approach provides accurate evaluation results, and outperforms existing solutions.","PeriodicalId":13202,"journal":{"name":"IEEE Transactions on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":6.5,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140105636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-10DOI: 10.1109/TCC.2024.3399616
Xueyu Hou;Yongjie Guan;Nakjung Choi;Tao Han
Users on edge generate deep inference requests continuously over time. Mobile/edge devices located near users can undertake the computation of inference locally for users, e.g., the embedded edge device on an autonomous vehicle. Due to limited computing resources on one mobile/edge device, it may be challenging to process the inference requests from users with high throughput. An attractive solution is to (partially) offload the computation to a remote device in the network. In this paper, we examine the existing inference execution solutions across local and remote devices and propose an adaptive scheduler, a BPS scheduler, for continuous deep inference on collaborative edge intelligence. By leveraging data parallel, neurosurgeon, reinforcement learning techniques, BPS can boost the overall inference performance by up to $8.2 times$