首页 > 最新文献

IEEE Transactions on Sustainable Computing最新文献

英文 中文
FedGCN: A Federated Graph Convolutional Network for Privacy-Preserving Traffic Prediction 基于联邦图卷积网络的保密性交通预测
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-22 DOI: 10.1109/TSUSC.2024.3395350
Na Hu;Wei Liang;Dafang Zhang;Kun Xie;Kuanching Li;Albert Y. Zomaya
Traffic prediction is crucial for intelligent transportation systems, assisting in making travel decisions, minimizing traffic congestion, and improving traffic operation efficiency. Although effective, existing centralized traffic prediction methods have privacy leakage risks. Federated learning-based traffic prediction methods keep raw data local and train the global model in a distributed way, thus preserving data privacy. Nevertheless, the spatial correlations between local clients will be broken as data exchange between local clients is not allowed in federated learning, leading to missing spatial information and inferior prediction accuracy. To this end, we propose a federated graph neural network with spatial information completion (FedGCN) for privacy-preserving traffic prediction by adopting a federated learning scheme to protect confidentiality and presenting a mending graph convolutional neural network to mend the missing spatial information during capturing spatial dependency to improve prediction accuracy. To complete the missing spatial information efficiently and capture the client-specific spatial pattern, we design a personalized training scheme for the mending graph neural network, reducing communication overhead. The experiments on four public traffic datasets demonstrate that the proposed model outperforms the best baseline with a ratio of 3.82%, 1.82%, 2.13%, and 1.49% in terms of absolute mean error while preserving privacy.
交通预测对智能交通系统至关重要,有助于制定出行决策,减少交通拥堵,提高交通运行效率。现有集中式流量预测方法虽然有效,但存在隐私泄露风险。基于联邦学习的交通预测方法将原始数据保持在本地,并以分布式的方式训练全局模型,从而保护了数据的隐私性。然而,在联邦学习中,由于不允许本地客户端之间的数据交换,会破坏本地客户端之间的空间相关性,导致空间信息缺失,预测精度降低。为此,我们提出了一种具有空间信息补全的联邦图神经网络(FedGCN)用于保护隐私的流量预测,采用联邦学习方案来保护机密性,并提出了一种修复图卷积神经网络来修复捕获空间依赖时缺失的空间信息,以提高预测精度。为了有效地完成缺失的空间信息并捕获客户特定的空间模式,我们设计了一种个性化的补图神经网络训练方案,减少了通信开销。在4个公共交通数据集上的实验表明,该模型在保护隐私的情况下,绝对平均误差分别为3.82%、1.82%、2.13%和1.49%,优于最佳基线。
{"title":"FedGCN: A Federated Graph Convolutional Network for Privacy-Preserving Traffic Prediction","authors":"Na Hu;Wei Liang;Dafang Zhang;Kun Xie;Kuanching Li;Albert Y. Zomaya","doi":"10.1109/TSUSC.2024.3395350","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3395350","url":null,"abstract":"Traffic prediction is crucial for intelligent transportation systems, assisting in making travel decisions, minimizing traffic congestion, and improving traffic operation efficiency. Although effective, existing centralized traffic prediction methods have privacy leakage risks. Federated learning-based traffic prediction methods keep raw data local and train the global model in a distributed way, thus preserving data privacy. Nevertheless, the spatial correlations between local clients will be broken as data exchange between local clients is not allowed in federated learning, leading to missing spatial information and inferior prediction accuracy. To this end, we propose a federated graph neural network with spatial information completion (FedGCN) for privacy-preserving traffic prediction by adopting a federated learning scheme to protect confidentiality and presenting a mending graph convolutional neural network to mend the missing spatial information during capturing spatial dependency to improve prediction accuracy. To complete the missing spatial information efficiently and capture the client-specific spatial pattern, we design a personalized training scheme for the mending graph neural network, reducing communication overhead. The experiments on four public traffic datasets demonstrate that the proposed model outperforms the best baseline with a ratio of 3.82%, 1.82%, 2.13%, and 1.49% in terms of absolute mean error while preserving privacy.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"925-935"},"PeriodicalIF":3.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Third-Party Auditor to Help Federated Learning: An Efficient Byzantine-Robust Federated Learning 使用第三方审计师帮助联邦学习:一个高效的拜占庭-鲁棒联邦学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-20 DOI: 10.1109/TSUSC.2024.3379440
Zhuangzhuang Zhang;Libing Wu;Debiao He;Jianxin Li;Na Lu;Xuejiang Wei
Federated Learning (FL), as a distributed machine learning technique, has promise for training models with distributed data in Artificial Intelligence of Things (AIoT). However, FL is vulnerable to Byzantine attacks from diverse participants. While numerous Byzantine-robust FL solutions have been proposed, most of them involve deploying defenses at either the aggregation server or the participant level, significantly impacting the original FL process. Moreover, it will bring extra computational burden to the server or the participant, which is especially unsuitable for the resource-constrained AIoT domain. To resolve the aforementioned concerns, we propose FL-Auditor, a Byzantine-robust FL approach based on public auditing. Its core idea is to use a Third-Party Auditor (TPA) to audit samples from the FL training process, analyzing the trustworthiness of different participants, thereby helping FL obtain a more robust global model. In addition, we also design a lazy update mechanism to reduce the negative impact of sampling audit on the performance of the global model. Extensive experiments have demonstrated the effectiveness of our FL-Auditor in terms of accuracy, robustness against attacks, and flexibility. In particular, compared to the existing method, our FL-Auditor significantly reduces the computation time on the aggregation server by 8×-17×.
联邦学习(FL)作为一种分布式机器学习技术,在人工智能(AIoT)中具有广泛的应用前景。然而,FL很容易受到来自不同参与者的拜占庭式攻击。虽然已经提出了许多拜占庭健壮的FL解决方案,但其中大多数都涉及在聚合服务器或参与者级别部署防御,这对原始FL进程产生了重大影响。此外,它会给服务器或参与者带来额外的计算负担,尤其不适合资源受限的AIoT领域。为了解决上述问题,我们提出FL- auditor,这是一种基于公共审计的拜占庭式稳健FL方法。其核心思想是使用第三方审计师(TPA)对FL培训过程中的样本进行审计,分析不同参与者的可信度,从而帮助FL获得更稳健的全球模型。此外,我们还设计了一个延迟更新机制,以减少抽样审计对全局模型性能的负面影响。大量的实验证明了我们的FL-Auditor在准确性、抗攻击稳健性和灵活性方面的有效性。特别是,与现有方法相比,我们的FL-Auditor通过8×-17×显著减少了聚合服务器上的计算时间。
{"title":"Using Third-Party Auditor to Help Federated Learning: An Efficient Byzantine-Robust Federated Learning","authors":"Zhuangzhuang Zhang;Libing Wu;Debiao He;Jianxin Li;Na Lu;Xuejiang Wei","doi":"10.1109/TSUSC.2024.3379440","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3379440","url":null,"abstract":"Federated Learning (FL), as a distributed machine learning technique, has promise for training models with distributed data in Artificial Intelligence of Things (AIoT). However, FL is vulnerable to Byzantine attacks from diverse participants. While numerous Byzantine-robust FL solutions have been proposed, most of them involve deploying defenses at either the aggregation server or the participant level, significantly impacting the original FL process. Moreover, it will bring extra computational burden to the server or the participant, which is especially unsuitable for the resource-constrained AIoT domain. To resolve the aforementioned concerns, we propose FL-Auditor, a Byzantine-robust FL approach based on public auditing. Its core idea is to use a Third-Party Auditor (TPA) to audit samples from the FL training process, analyzing the trustworthiness of different participants, thereby helping FL obtain a more robust global model. In addition, we also design a lazy update mechanism to reduce the negative impact of sampling audit on the performance of the global model. Extensive experiments have demonstrated the effectiveness of our FL-Auditor in terms of accuracy, robustness against attacks, and flexibility. In particular, compared to the existing method, our FL-Auditor significantly reduces the computation time on the aggregation server by 8×-17×.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"848-861"},"PeriodicalIF":3.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation 利用基于相似性的模型聚合实现安全、准确的个性化联合学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-20 DOI: 10.1109/TSUSC.2024.3403427
Zhouyong Tan;Junqing Le;Fan Yang;Min Huang;Tao Xiang;Xiaofeng Liao
Personalized federated learning (PFL) combines client needs and data characteristics to train personalized models for local clients. However, the most of previous PFL schemes encountered challenges such as low model prediction accuracy and privacy leakage when applied to practical datasets. Besides, the existing privacy protection methods fail to achieve satisfactory results in terms of model prediction accuracy and security simultaneously. In this paper, we propose a Privacy-preserving Personalized Federated Learning under Secure Multi-party Computation (SMC-PPFL), which can preserve privacy while obtaining a local personalized model with high prediction accuracy. In SMC-PPFL, noise perturbation is utilized to protect similarity computation, and secure multi-party computation is employed for model sub-aggregations. This combination ensures that clients’ privacy is preserved, and the computed values remain unbiased without compromising security. Then, we propose a weighted sub-aggregation strategy based on the similarity of clients and introduce a regularization term in the local training to improve prediction accuracy. Finally, we evaluate the performance of SMC-PPFL on three common datasets. The experimental results show that SMC-PPFL achieves $2%!sim! 15%$ higher prediction accuracy compared to the previous PFL schemes. Besides, the security analysis also verifies that SMC-PPFL can resist model inversion attacks and membership inference attacks.
{"title":"Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation","authors":"Zhouyong Tan;Junqing Le;Fan Yang;Min Huang;Tao Xiang;Xiaofeng Liao","doi":"10.1109/TSUSC.2024.3403427","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3403427","url":null,"abstract":"Personalized federated learning (PFL) combines client needs and data characteristics to train personalized models for local clients. However, the most of previous PFL schemes encountered challenges such as low model prediction accuracy and privacy leakage when applied to practical datasets. Besides, the existing privacy protection methods fail to achieve satisfactory results in terms of model prediction accuracy and security simultaneously. In this paper, we propose a <u>P</u>rivacy-preserving <u>P</u>ersonalized <u>F</u>ederated <u>L</u>earning under <u>S</u>ecure <u>M</u>ulti-party <u>C</u>omputation (SMC-PPFL), which can preserve privacy while obtaining a local personalized model with high prediction accuracy. In SMC-PPFL, noise perturbation is utilized to protect similarity computation, and secure multi-party computation is employed for model sub-aggregations. This combination ensures that clients’ privacy is preserved, and the computed values remain unbiased without compromising security. Then, we propose a weighted sub-aggregation strategy based on the similarity of clients and introduce a regularization term in the local training to improve prediction accuracy. Finally, we evaluate the performance of SMC-PPFL on three common datasets. The experimental results show that SMC-PPFL achieves <inline-formula><tex-math>$2%!sim! 15%$</tex-math></inline-formula> higher prediction accuracy compared to the previous PFL schemes. Besides, the security analysis also verifies that SMC-PPFL can resist model inversion attacks and membership inference attacks.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"132-145"},"PeriodicalIF":3.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of Increasing Temperature and Relative Humidity in Air-Cooled Tropical Data Centers 气冷式热带数据中心温度和相对湿度上升的影响
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-20 DOI: 10.1109/TSUSC.2024.3379550
Duc Van Le;Jing Zhou;Rongrong Wang;Rui Tan;Fei Duan
Data centers (DCs) are power-intensive facilities which use a significant amount of energy for cooling the servers. Increasing the temperature and relative humidity (RH) setpoints is a rule-of-thumb approach to reducing the DC energy usage. However, the high temperature and RH may undermine the server's reliability. Before we can choose the proper temperature and RH settings, it is essential to understand how the temperature and RH setpoints affect the DC power usage and server's reliability. To this end, we constructed and experimented with an air-cooled DC testbed in Singapore, which consists of a direct expansion cooling system and 521 servers running real-world application workloads. This paper presents the key measurement results and observations from our 11-month experiments. Our results suggest that by operating at a supply air temperature setpoints of 29$^{circ }$C, our testbed achieves substantial cooling power saving with little impact on the server's reliability. Furthermore, we present a total cost of ownership (TCO) analysis framework which guides settings of the temperature and RH for a DC. Our observations and TCO analysis framework will be useful to future efforts in building and operating air-cooled DCs in tropics and beyond.
数据中心(DC)是电力密集型设施,需要消耗大量能源来冷却服务器。提高温度和相对湿度(RH)设定值是减少 DC 能源消耗的一个常用方法。然而,高温和相对湿度可能会降低服务器的可靠性。在选择合适的温度和相对湿度设置之前,我们必须了解温度和相对湿度设置点如何影响直流电能使用和服务器的可靠性。为此,我们在新加坡建造了一个风冷直流试验台并进行了实验,该试验台由直接膨胀冷却系统和运行实际应用工作负载的 521 台服务器组成。本文介绍了为期 11 个月实验的主要测量结果和观察结果。我们的结果表明,通过在 29$^{circ }$C 的供气温度设定值下运行,我们的测试平台实现了大量的制冷节能,而对服务器的可靠性影响很小。此外,我们还提出了一个总拥有成本(TCO)分析框架,用于指导直流电的温度和相对湿度设置。我们的观察结果和总拥有成本分析框架将有助于今后在热带地区及其他地区建造和运行风冷直流电。
{"title":"Impacts of Increasing Temperature and Relative Humidity in Air-Cooled Tropical Data Centers","authors":"Duc Van Le;Jing Zhou;Rongrong Wang;Rui Tan;Fei Duan","doi":"10.1109/TSUSC.2024.3379550","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3379550","url":null,"abstract":"Data centers (DCs) are power-intensive facilities which use a significant amount of energy for cooling the servers. Increasing the temperature and relative humidity (RH) setpoints is a rule-of-thumb approach to reducing the DC energy usage. However, the high temperature and RH may undermine the server's reliability. Before we can choose the proper temperature and RH settings, it is essential to understand how the temperature and RH setpoints affect the DC power usage and server's reliability. To this end, we constructed and experimented with an air-cooled DC testbed in Singapore, which consists of a direct expansion cooling system and 521 servers running real-world application workloads. This paper presents the key measurement results and observations from our 11-month experiments. Our results suggest that by operating at a supply air temperature setpoints of 29\u0000<inline-formula><tex-math>$^{circ }$</tex-math></inline-formula>\u0000C, our testbed achieves substantial cooling power saving with little impact on the server's reliability. Furthermore, we present a total cost of ownership (TCO) analysis framework which guides settings of the temperature and RH for a DC. Our observations and TCO analysis framework will be useful to future efforts in building and operating air-cooled DCs in tropics and beyond.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 5","pages":"790-802"},"PeriodicalIF":3.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constrained Multiobjective Optimization for UAV-Assisted Mobile Edge Computing in Smart Agriculture: Minimizing Delay and Energy Consumption 智能农业中无人机辅助移动边缘计算的约束多目标优化:最小化延迟和能耗
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-17 DOI: 10.1109/TSUSC.2024.3401003
Kangshun Li;Shumin Xie;Tianjin Zhu;Hui Wang
With the development of technology, unmanned aerial vehicles (UAVs) and Internet of Things devices are widely used in smart agriculture, resulting in significant energy consumption. In this paper, the optimization problem for UAV-assisted mobile computing in smart agriculture is modeled as a constrained multiobjective optimization problem. By jointly optimizing the deployment position of UAVs, the offloading location of the tasks, the transmit power of the devices, and the resource allocation of the UAVs, two optimization objectives (total delay and energy consumption) are minimized simultaneously. In view of the complex constraints, a constrained multiobjective algorithm named JO-DPTS is proposed. The algorithm adopts dual-population and two-stage approach to improve population convergence and diversity. The simulation results substantiate that JO-DPTS exhibits superior performance compared to the other three state-of-the-art constrained multiobjective evolutionary algorithms.
随着科技的发展,无人机和物联网设备在智慧农业中的广泛应用,造成了巨大的能源消耗。本文将智能农业中无人机辅助移动计算的优化问题建模为一个约束多目标优化问题。通过对无人机部署位置、任务卸载位置、设备发射功率和无人机资源分配进行联合优化,实现总时延和能耗两个优化目标同时最小化。针对约束条件的复杂性,提出了一种约束多目标算法JO-DPTS。该算法采用双种群和两阶段算法,提高了种群的收敛性和多样性。仿真结果表明,JO-DPTS与其他三种最先进的约束多目标进化算法相比,具有优越的性能。
{"title":"Constrained Multiobjective Optimization for UAV-Assisted Mobile Edge Computing in Smart Agriculture: Minimizing Delay and Energy Consumption","authors":"Kangshun Li;Shumin Xie;Tianjin Zhu;Hui Wang","doi":"10.1109/TSUSC.2024.3401003","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3401003","url":null,"abstract":"With the development of technology, unmanned aerial vehicles (UAVs) and Internet of Things devices are widely used in smart agriculture, resulting in significant energy consumption. In this paper, the optimization problem for UAV-assisted mobile computing in smart agriculture is modeled as a constrained multiobjective optimization problem. By jointly optimizing the deployment position of UAVs, the offloading location of the tasks, the transmit power of the devices, and the resource allocation of the UAVs, two optimization objectives (total delay and energy consumption) are minimized simultaneously. In view of the complex constraints, a constrained multiobjective algorithm named JO-DPTS is proposed. The algorithm adopts dual-population and two-stage approach to improve population convergence and diversity. The simulation results substantiate that JO-DPTS exhibits superior performance compared to the other three state-of-the-art constrained multiobjective evolutionary algorithms.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"948-957"},"PeriodicalIF":3.0,"publicationDate":"2024-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving Link Privacy in Uncertain Directed Social Graphs With Formal Guarantees
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-13 DOI: 10.1109/TSUSC.2024.3399754
Jiajun Chen;Chunqiang Hu;Ruifeng Zhao;Shaojiang Deng;Xiaoshuang Xing;Jiguo Yu
Data privacy breaches have prompted growing concerns regarding privacy issues on social networks. Preserving the privacy of links in the directed social graph, where edges signify the information flow or data contributions, poses a formidable challenge. However, existing methods for uncertain graphs primarily target undirected graphs and lack rigorous privacy guarantees. In this paper, we present a personal evidence protection algorithm called PEPA, which provides formally dual privacy guarantees for directed social links. Specifically, we implement out-link privacy to protect the out-links of nodes. Despite this protection, the exposure of in-links can still compromise privacy, potentially affecting service quality. To address this, we further introduce an uncertain directed graph algorithm as a post-processing approach for out-link privacy. This algorithm injects uncertainty into nodes’ in-links, effectively transforming the original directed graph into a probability-driven uncertain structure. Additionally, we propose an effective noise optimization method. Finally, we evaluate the trade-off between privacy and utility achieved by PEPA through comparative experiments. The results demonstrate privacy enhancements of PEPA compared to the $(k, varepsilon )$-obfuscation algorithm and utility improvements over the RandWalk algorithm and UG-NDP. Particularly, PEPA demonstrates approximately a 2-fold improvement in utility compared to PEPA without noise optimization.
数据隐私泄露引发了人们对社交网络隐私问题的日益关注。在有向社交图中,边代表信息流或数据贡献,保护有向图中链接的隐私是一项艰巨的挑战。然而,现有的不确定图方法主要针对无向图,缺乏严格的隐私保证。在本文中,我们提出了一种名为 PEPA 的个人证据保护算法,它为有向社交链接提供了形式上的双重隐私保证。具体来说,我们实现了外链隐私保护,以保护节点的外链。尽管有这种保护,但内链的暴露仍然会损害隐私,从而可能影响服务质量。为了解决这个问题,我们进一步引入了不确定有向图算法,作为外链隐私的后处理方法。该算法将不确定性注入节点的内链接,从而有效地将原始有向图转化为概率驱动的不确定结构。此外,我们还提出了一种有效的噪声优化方法。最后,我们通过对比实验评估了 PEPA 在隐私和效用之间的权衡。结果表明,与 $(k, varepsilon )$-obfuscation 算法相比,PEPA 提高了隐私性;与 RandWalk 算法和 UG-NDP 相比,PEPA 提高了实用性。特别是,与未进行噪声优化的 PEPA 相比,PEPA 的实用性提高了约 2 倍。
{"title":"Preserving Link Privacy in Uncertain Directed Social Graphs With Formal Guarantees","authors":"Jiajun Chen;Chunqiang Hu;Ruifeng Zhao;Shaojiang Deng;Xiaoshuang Xing;Jiguo Yu","doi":"10.1109/TSUSC.2024.3399754","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3399754","url":null,"abstract":"Data privacy breaches have prompted growing concerns regarding privacy issues on social networks. Preserving the privacy of links in the directed social graph, where edges signify the information flow or data contributions, poses a formidable challenge. However, existing methods for uncertain graphs primarily target undirected graphs and lack rigorous privacy guarantees. In this paper, we present a personal evidence protection algorithm called PEPA, which provides formally dual privacy guarantees for directed social links. Specifically, we implement out-link privacy to protect the out-links of nodes. Despite this protection, the exposure of in-links can still compromise privacy, potentially affecting service quality. To address this, we further introduce an uncertain directed graph algorithm as a post-processing approach for out-link privacy. This algorithm injects uncertainty into nodes’ in-links, effectively transforming the original directed graph into a probability-driven uncertain structure. Additionally, we propose an effective noise optimization method. Finally, we evaluate the trade-off between privacy and utility achieved by PEPA through comparative experiments. The results demonstrate privacy enhancements of PEPA compared to the <inline-formula><tex-math>$(k, varepsilon )$</tex-math></inline-formula>-obfuscation algorithm and utility improvements over the RandWalk algorithm and UG-NDP. Particularly, PEPA demonstrates approximately a 2-fold improvement in utility compared to PEPA without noise optimization.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"108-119"},"PeriodicalIF":3.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Timed-Release E-Voting Scheme Based on Paillier Homomorphic Encryption 基于派利尔同态加密的定时释放电子投票方案
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-08 DOI: 10.1109/TSUSC.2024.3371544
Ke Yuan;Peng Sang;Jian Ge;Bingcai Zhou;Chunfu Jia
E-Voting is widely used in many social, economic, political and cultural fields for its convenience, efficiency and greenness, but how to guarantee the fairness of e-voting and the controllability of human intervention needs further in-depth research and exploration. Although the introduction of homomorphic encryption algorithm solves the problem of ballot privacy calculation, and most of these schemes solve the problem of private key confidentiality by using or overlaying multiple different methods of saving private keys, its security will be questioned as long as there is a possibility of human intervention in the saving process. To solve this problem, we propose a timed-release e-voting scheme based on Paillier homomorphic encryption. We analyze the semantic security of the ballot formally by defining the security game, and realize the legitimacy check of the ballot ciphertext through the idea of partial knowledge proof. Property analysis shows that this scheme satisfies the basic properties of the security requirements of the e-voting scheme. Performance analysis shows that this scheme is feasible to implement in practical voting.
电子投票以其便捷、高效、绿色等特点被广泛应用于社会、经济、政治、文化等诸多领域,但如何保证电子投票的公平性和人为干预的可控性还需要进一步深入研究和探索。虽然同态加密算法的引入解决了选票隐私计算的问题,而且这些方案大多通过使用或叠加多种不同的私钥保存方式解决了私钥保密的问题,但只要在保存过程中存在人为干预的可能,其安全性就会受到质疑。为了解决这个问题,我们提出了一种基于 Paillier 同态加密的定时释放电子投票方案。我们通过定义安全博弈正式分析了选票的语义安全性,并通过部分知识证明的思想实现了选票密文的合法性检查。属性分析表明,该方案满足电子投票方案安全要求的基本属性。性能分析表明,该方案在实际投票中是可行的。
{"title":"A Timed-Release E-Voting Scheme Based on Paillier Homomorphic Encryption","authors":"Ke Yuan;Peng Sang;Jian Ge;Bingcai Zhou;Chunfu Jia","doi":"10.1109/TSUSC.2024.3371544","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3371544","url":null,"abstract":"E-Voting is widely used in many social, economic, political and cultural fields for its convenience, efficiency and greenness, but how to guarantee the fairness of e-voting and the controllability of human intervention needs further in-depth research and exploration. Although the introduction of homomorphic encryption algorithm solves the problem of ballot privacy calculation, and most of these schemes solve the problem of private key confidentiality by using or overlaying multiple different methods of saving private keys, its security will be questioned as long as there is a possibility of human intervention in the saving process. To solve this problem, we propose a timed-release e-voting scheme based on Paillier homomorphic encryption. We analyze the semantic security of the ballot formally by defining the security game, and realize the legitimacy check of the ballot ciphertext through the idea of partial knowledge proof. Property analysis shows that this scheme satisfies the basic properties of the security requirements of the e-voting scheme. Performance analysis shows that this scheme is feasible to implement in practical voting.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 5","pages":"740-753"},"PeriodicalIF":3.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedPKR: Federated Learning With Non-IID Data via Periodic Knowledge Review in Edge Computing FedPKR:边缘计算中基于周期性知识评审的非iid数据联邦学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-06 DOI: 10.1109/TSUSC.2024.3374049
Jinbo Wang;Ruijin Wang;Guangquan Xu;Donglin He;Xikai Pei;Fengli Zhang;Jie Gan
Federated learning is a distributed learning paradigm, which is usually combined with edge computing to meet the joint training of IoT devices. A significant challenge in federated learning lies in the statistical heterogeneity, characterized by non-independent and identically distributed (non-IID) local data across diverse parties. This heterogeneity can result in inconsistent optimization within individual local models. Although previous research has endeavored to tackle issues stemming from heterogeneous data, our findings indicate that these attempts have not yielded high-performance neural network models. To overcome this fundamental challenge, we introduce the framework called FedPKR in this paper, which facilitates efficient federated learning through knowledge review. The core principle of FedPKR involves leveraging the knowledge representation generated by the global and local model layers to conduct periodic layer-by-layer comparative learning in a reciprocal manner. This strategy rectifies local model training, leading to enhanced outcomes. Our experimental results and subsequent analysis substantiate that FedPKR effectively augments model accuracy in image classification tasks, meanwhile demonstrating resilience to statistical heterogeneity across all participating entities.
联邦学习是一种分布式学习范式,通常与边缘计算相结合,以满足物联网设备的联合训练。联邦学习的一个重大挑战在于统计异质性,其特征是跨不同方的非独立和同分布(non-IID)本地数据。这种异质性可能导致各个局部模型中的优化不一致。虽然以前的研究已经努力解决来自异构数据的问题,但我们的研究结果表明,这些尝试并没有产生高性能的神经网络模型。为了克服这一根本性的挑战,我们在本文中引入了名为FedPKR的框架,它通过知识复习促进了有效的联邦学习。FedPKR的核心原则包括利用由全局和局部模型层生成的知识表示,以相互的方式进行周期性的逐层比较学习。这一战略纠正了当地的模式培训,从而提高了成果。我们的实验结果和随后的分析证实,FedPKR有效地提高了模型在图像分类任务中的准确性,同时展示了对所有参与实体的统计异质性的弹性。
{"title":"FedPKR: Federated Learning With Non-IID Data via Periodic Knowledge Review in Edge Computing","authors":"Jinbo Wang;Ruijin Wang;Guangquan Xu;Donglin He;Xikai Pei;Fengli Zhang;Jie Gan","doi":"10.1109/TSUSC.2024.3374049","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3374049","url":null,"abstract":"Federated learning is a distributed learning paradigm, which is usually combined with edge computing to meet the joint training of IoT devices. A significant challenge in federated learning lies in the statistical heterogeneity, characterized by non-independent and identically distributed (non-IID) local data across diverse parties. This heterogeneity can result in inconsistent optimization within individual local models. Although previous research has endeavored to tackle issues stemming from heterogeneous data, our findings indicate that these attempts have not yielded high-performance neural network models. To overcome this fundamental challenge, we introduce the framework called FedPKR in this paper, which facilitates efficient federated learning through knowledge review. The core principle of FedPKR involves leveraging the knowledge representation generated by the global and local model layers to conduct periodic layer-by-layer comparative learning in a reciprocal manner. This strategy rectifies local model training, leading to enhanced outcomes. Our experimental results and subsequent analysis substantiate that FedPKR effectively augments model accuracy in image classification tasks, meanwhile demonstrating resilience to statistical heterogeneity across all participating entities.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"902-912"},"PeriodicalIF":3.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sustainable Energy Management Framework for Smart Homes
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-03-02 DOI: 10.1109/TSUSC.2024.3396381
Soteris Constantinou;Constantinos Costa;Andreas Konstantinidis;Panos K. Chrysanthis;Demetrios Zeinalipour-Yazti
The escalating global energy crisis and the increasing ${text{CO}_{2}}$ emissions have necessitated the optimization of energy efficiency. The proliferation of Internet of Things (IoTs) devices, expected to reach 100 billion by 2030, contributed to this energy crisis and subsequently to the global ${text{CO}_{2}}$ emissions increase. Concomitantly, climate and energy targets have paved the way for an escalating adoption of solar photovoltaic power generation in residences. The IoT integration into home energy management systems holds the potential to yield energy and peak demand savings. Optimizing device planning to mitigate ${text{CO}_{2}}$ emissions poses significant challenges due to the complexity of user-defined preferences and consumption patterns. In this article, we propose an innovative IoT data platform, coined Sustainable Energy Management Framework (SEMF), which aims to balance the trade-off between the imported energy from the grid, users’ comfort, and ${text{CO}_{2}}$ emissions. SEMF incorporates a Green Planning evolutionary algorithm, coined GreenCap$^+$+, to facilitate load shifting of IoT-enabled devices, taking into consideration the integration of renewable energy sources, multiple constraints, peak-demand times, and dynamic pricing. Based on our experimental evaluation utilizing real-world data, our prototype system has outperformed the state-of-the-art approach by up to $approx$29% reduction in imported energy, $approx$35% increase in self-consumption of renewable energy, and $approx$34% decrease in ${text{CO}_{2}}$ emissions, while maintaining a high level of user comfort $approx$94%-99%.
{"title":"A Sustainable Energy Management Framework for Smart Homes","authors":"Soteris Constantinou;Constantinos Costa;Andreas Konstantinidis;Panos K. Chrysanthis;Demetrios Zeinalipour-Yazti","doi":"10.1109/TSUSC.2024.3396381","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3396381","url":null,"abstract":"The escalating global energy crisis and the increasing <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions have necessitated the optimization of energy efficiency. The proliferation of Internet of Things (IoTs) devices, expected to reach 100 billion by 2030, contributed to this energy crisis and subsequently to the global <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions increase. Concomitantly, climate and energy targets have paved the way for an escalating adoption of solar photovoltaic power generation in residences. The IoT integration into home energy management systems holds the potential to yield energy and peak demand savings. Optimizing device planning to mitigate <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions poses significant challenges due to the complexity of user-defined preferences and consumption patterns. In this article, we propose an innovative IoT data platform, coined <i>Sustainable Energy Management Framework (SEMF)</i>, which aims to balance the trade-off between the imported energy from the grid, users’ comfort, and <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions. <i>SEMF</i> incorporates a Green Planning evolutionary algorithm, coined <i>GreenCap<inline-formula><tex-math>$^+$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic></alternatives></inline-formula></i>, to facilitate load shifting of IoT-enabled devices, taking into consideration the integration of renewable energy sources, multiple constraints, peak-demand times, and dynamic pricing. Based on our experimental evaluation utilizing real-world data, our prototype system has outperformed the state-of-the-art approach by up to <inline-formula><tex-math>$approx$</tex-math></inline-formula>29% reduction in imported energy, <inline-formula><tex-math>$approx$</tex-math></inline-formula>35% increase in self-consumption of renewable energy, and <inline-formula><tex-math>$approx$</tex-math></inline-formula>34% decrease in <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions, while maintaining a high level of user comfort <inline-formula><tex-math>$approx$</tex-math></inline-formula>94%-99%.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"70-81"},"PeriodicalIF":3.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust and Privacy-Aware Federated Learning Framework for Non-Intrusive Load Monitoring 用于非侵入式负载监控的稳健且注重隐私的联合学习框架
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-02-28 DOI: 10.1109/TSUSC.2024.3370837
Vidushi Agarwal;Omid Ardakanian;Sujata Pal
With the rollout of smart meters, a vast amount of energy time-series became available from homes, enabling applications such as non-intrusive load monitoring (NILM). The inconspicuous collection of this data, however, poses a risk to the privacy of customers. Federated Learning (FL) eliminates the problem of sharing raw data with a cloud service provider by allowing machine learning models to be trained in a collaborative fashion on decentralized data. Although several NILM techniques that rely on FL to train a deep neural network for identifying the energy consumption of individual appliances have been proposed in recent years, the robustness of these techniques to malicious users and their ability to fully protect the user privacy remain unexplored. In this paper, we present a robust and privacy-preserving FL-based framework to train a bidirectional transformer architecture for NILM. This framework takes advantage of a meta-learning algorithm to handle the data heterogeneity prevalent in real-world settings. The efficacy of the proposed framework is corroborated through comparative experiments using two real-world NILM datasets. The results show that this framework can attain an accuracy that is on par with a centrally-trained energy disaggregation model, while preserving user privacy.
随着智能电表的推广,人们可以从家庭中获取大量的能源时间序列,从而实现非侵入式负荷监控(NILM)等应用。然而,这些数据的收集并不显眼,会对客户的隐私造成威胁。联合学习(FL)允许机器学习模型以协作方式在分散数据上进行训练,从而消除了与云服务提供商共享原始数据的问题。虽然近年来已经提出了几种依赖 FL 来训练深度神经网络以识别单个电器能耗的 NILM 技术,但这些技术对恶意用户的鲁棒性以及全面保护用户隐私的能力仍有待探索。在本文中,我们提出了一种基于 FL 的稳健且保护隐私的框架,用于训练 NILM 的双向变压器架构。该框架利用元学习算法来处理现实世界中普遍存在的数据异质性问题。通过使用两个真实世界的 NILM 数据集进行对比实验,证实了所提框架的功效。结果表明,该框架可以达到与集中训练的能量分解模型相当的准确度,同时还能保护用户隐私。
{"title":"A Robust and Privacy-Aware Federated Learning Framework for Non-Intrusive Load Monitoring","authors":"Vidushi Agarwal;Omid Ardakanian;Sujata Pal","doi":"10.1109/TSUSC.2024.3370837","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3370837","url":null,"abstract":"With the rollout of smart meters, a vast amount of energy time-series became available from homes, enabling applications such as non-intrusive load monitoring (NILM). The inconspicuous collection of this data, however, poses a risk to the privacy of customers. Federated Learning (FL) eliminates the problem of sharing raw data with a cloud service provider by allowing machine learning models to be trained in a collaborative fashion on decentralized data. Although several NILM techniques that rely on FL to train a deep neural network for identifying the energy consumption of individual appliances have been proposed in recent years, the robustness of these techniques to malicious users and their ability to fully protect the user privacy remain unexplored. In this paper, we present a robust and privacy-preserving FL-based framework to train a bidirectional transformer architecture for NILM. This framework takes advantage of a meta-learning algorithm to handle the data heterogeneity prevalent in real-world settings. The efficacy of the proposed framework is corroborated through comparative experiments using two real-world NILM datasets. The results show that this framework can attain an accuracy that is on par with a centrally-trained energy disaggregation model, while preserving user privacy.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 5","pages":"766-777"},"PeriodicalIF":3.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Sustainable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1