首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge Computing 基于边缘计算的人工智能与工业自动化课程研究综述
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00045
Mingbo Pan, Weibin Su, Yikai Wang
In the background of edge computing becoming an important technology of China’s new infrastructure construction, it is necessary for colleges and universities to set up a new professional curriculum system for edge computing. It is construction and learning from the refinement of artificial intelligence which is easier to industrialize. Through the interdisciplinary integration and optimization construction of the curriculum, this course system is suitable for universities. According to developed course content, design the teaching schedule, and then, based on this scheme, we will cultivate edge computing research and application-oriented talents, and support the transformation and upgrading of industrial automation to intelligent.
在边缘计算成为中国新基础设施建设重要技术的背景下,高校有必要建立新的边缘计算专业课程体系。是对人工智能的建构和提炼,更容易产业化。通过跨学科的整合和课程的优化建设,使该课程体系适合高校。根据制定的课程内容,设计教学时间表,并以此方案为基础,培养边缘计算研究型和应用型人才,支持工业自动化向智能化转型升级。
{"title":"Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge Computing","authors":"Mingbo Pan, Weibin Su, Yikai Wang","doi":"10.1109/NaNA53684.2021.00045","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00045","url":null,"abstract":"In the background of edge computing becoming an important technology of China’s new infrastructure construction, it is necessary for colleges and universities to set up a new professional curriculum system for edge computing. It is construction and learning from the refinement of artificial intelligence which is easier to industrialize. Through the interdisciplinary integration and optimization construction of the curriculum, this course system is suitable for universities. According to developed course content, design the teaching schedule, and then, based on this scheme, we will cultivate edge computing research and application-oriented talents, and support the transformation and upgrading of industrial automation to intelligent.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127081832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access Control Scheme Supporting Attribute Revocation in Cloud Computing 云计算中支持属性撤销的访问控制方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00072
Yachen He, Guishan Dong, Dong Liu, Haiyang Peng, Yuxiang Chen
To break the data barrier of the information island and explore the value of data in the past few years, it has become a trend of uploading data to the cloud by data owners for data sharing. At the same time, they also hope that the uploaded data can still be controlled, which makes access control of cloud data become an intractable problem. As a famous cryptographic technology, ciphertext policy-based attribute encryption (CP-ABE) not only assures data confidentiality but implements fine-grained access control. However, the actual application of CP-ABE has its inherent challenge in attribute revocation. To address this challenge, we proposed an access control solution supporting attribute revocation in cloud computing. Unlike previous attribute revocation schemes, to solve the problem of excessive attribute revocation overhead, we use symmetric encryption technology to encrypt the plaintext data firstly, and then, encrypting the symmetric key by utilizing public-key encryption technology according to the access structure, so that only the key ciphertext is necessary to update when the attributes are revoked, which reduces the spending of ciphertext update to a great degree. The comparative analysis demonstrates that our solution is reasonably efficient and more secure to support attribute revocation and access control after data sharing.
为了打破信息孤岛的数据壁垒,挖掘数据的价值,在过去的几年里,数据所有者将数据上传到云端进行数据共享已成为一种趋势。同时,他们也希望上传的数据仍然可以被控制,这使得云数据的访问控制成为一个棘手的问题。密文策略属性加密(cipher policy-based attribute encryption, CP-ABE)作为一种著名的密码学技术,既保证了数据的保密性,又实现了细粒度的访问控制。然而,CP-ABE的实际应用在属性撤销方面存在着固有的挑战。为了应对这一挑战,我们提出了一种支持云计算中属性撤销的访问控制解决方案。与以往的属性撤销方案不同,为了解决属性撤销开销过大的问题,我们首先采用对称加密技术对明文数据进行加密,然后根据访问结构利用公钥加密技术对对称密钥进行加密,这样在撤销属性时只需要更新密钥密文,大大减少了密文更新的开销。对比分析表明,该方案在支持数据共享后的属性撤销和访问控制方面具有较高的效率和安全性。
{"title":"Access Control Scheme Supporting Attribute Revocation in Cloud Computing","authors":"Yachen He, Guishan Dong, Dong Liu, Haiyang Peng, Yuxiang Chen","doi":"10.1109/NaNA53684.2021.00072","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00072","url":null,"abstract":"To break the data barrier of the information island and explore the value of data in the past few years, it has become a trend of uploading data to the cloud by data owners for data sharing. At the same time, they also hope that the uploaded data can still be controlled, which makes access control of cloud data become an intractable problem. As a famous cryptographic technology, ciphertext policy-based attribute encryption (CP-ABE) not only assures data confidentiality but implements fine-grained access control. However, the actual application of CP-ABE has its inherent challenge in attribute revocation. To address this challenge, we proposed an access control solution supporting attribute revocation in cloud computing. Unlike previous attribute revocation schemes, to solve the problem of excessive attribute revocation overhead, we use symmetric encryption technology to encrypt the plaintext data firstly, and then, encrypting the symmetric key by utilizing public-key encryption technology according to the access structure, so that only the key ciphertext is necessary to update when the attributes are revoked, which reduces the spending of ciphertext update to a great degree. The comparative analysis demonstrates that our solution is reasonably efficient and more secure to support attribute revocation and access control after data sharing.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Construction Using Overlapping Histogram under Local Differential Privacy 局部差分隐私下基于重叠直方图的网络构建
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00088
Cuicui Niu, Zhengzhi Pan, Wuchao Shi, Hai Liu
Network construction is beneficial to extract global structural information from vector data. However, node-link information is easy to bring the problem of privacy leakage in network construction. Thus, we provided node-link preserving in network construction via overlapping histogram under local differential privacy. First, we present the general model of network construction using overlapping histogram under local differential privacy. Second, we present algorithm of random perturbation-linking in network construction via overlapping histogram to preserve node-link. Finally, our theoretical and experimental results show that the proposed scheme can achieve the tradeoff between node-link protection and network utility. The proposed scheme provides a basic method against node-link leakage in network construction via overlapping histogram.
网络构造有利于从矢量数据中提取全局结构信息。然而,节点链路信息在网络建设中容易带来隐私泄露问题。因此,我们在局部差分隐私下通过重叠直方图提供了网络构建中的节点-链路保留。首先,我们提出了局部差分隐私下使用重叠直方图构建网络的一般模型。其次,提出了利用重叠直方图构建网络的随机扰动连接算法,以保持节点连接。最后,理论和实验结果表明,该方案可以实现节点链路保护和网络效用之间的平衡。该方案通过重叠直方图提供了一种防止网络构建中节点链路泄漏的基本方法。
{"title":"Network Construction Using Overlapping Histogram under Local Differential Privacy","authors":"Cuicui Niu, Zhengzhi Pan, Wuchao Shi, Hai Liu","doi":"10.1109/NaNA53684.2021.00088","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00088","url":null,"abstract":"Network construction is beneficial to extract global structural information from vector data. However, node-link information is easy to bring the problem of privacy leakage in network construction. Thus, we provided node-link preserving in network construction via overlapping histogram under local differential privacy. First, we present the general model of network construction using overlapping histogram under local differential privacy. Second, we present algorithm of random perturbation-linking in network construction via overlapping histogram to preserve node-link. Finally, our theoretical and experimental results show that the proposed scheme can achieve the tradeoff between node-link protection and network utility. The proposed scheme provides a basic method against node-link leakage in network construction via overlapping histogram.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Petri net modeling and vulnerability analysis of the Heartbleed 心脏出血的Petri网建模与漏洞分析
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00034
Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu
In recent years, a variety of network attacks emerge in an endless stream, and network attacks gradually show the characteristics of higher secrecy and greater harm. At present, the analysis of system vulnerabilities is generally focused on the characteristics analysis and impact hazard level, and lack of formal modeling and vulnerability analysis methods. In this paper, we model the OpenSSL service’s Heartbleed vulnerability based on Petri net. We build a formal model combined with the source code and system state, analyze the vulnerability of the system running state, and propose an automatic vulnerability repair scheme. Experiments show that this model can carry out fine-grained formal analysis and simulation of the Heartbleed, which is of great significance to explore the system vulnerability modeling method.
近年来,各种网络攻击层出不穷,网络攻击逐渐呈现出保密性更高、危害更大的特点。目前,对系统漏洞的分析一般侧重于特征分析和影响危害等级,缺乏形式化的建模和漏洞分析方法。本文基于Petri网对OpenSSL服务的Heartbleed漏洞进行建模。结合源代码和系统状态建立形式化模型,分析系统运行状态的漏洞,提出漏洞自动修复方案。实验表明,该模型可以对“心脏出血”进行细粒度形式化分析和仿真,对探索系统漏洞建模方法具有重要意义。
{"title":"Petri net modeling and vulnerability analysis of the Heartbleed","authors":"Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu","doi":"10.1109/NaNA53684.2021.00034","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00034","url":null,"abstract":"In recent years, a variety of network attacks emerge in an endless stream, and network attacks gradually show the characteristics of higher secrecy and greater harm. At present, the analysis of system vulnerabilities is generally focused on the characteristics analysis and impact hazard level, and lack of formal modeling and vulnerability analysis methods. In this paper, we model the OpenSSL service’s Heartbleed vulnerability based on Petri net. We build a formal model combined with the source code and system state, analyze the vulnerability of the system running state, and propose an automatic vulnerability repair scheme. Experiments show that this model can carry out fine-grained formal analysis and simulation of the Heartbleed, which is of great significance to explore the system vulnerability modeling method.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115996748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced Data 基于半监督集成学习算法的非平衡数据网络入侵检测
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00065
Zhang Lin
In many practical applications, due to the high cost of data annotation, the training dataset includes a large number of unlabeled samples and a small number of labeled samples. At the same time, there are a large number of normal behavior data and a small number of intrusion data in the network data. In order to solve this problem, this paper proposes a semi-supervised ensemble learning algorithm for imbalanced data. This algorithm uses the relationship between class samples to define the sampling probability of samples, and then constructs the initial training subset and the base classifier according to the sampling probability. Then, the evaluation index for imbalanced data is defined to evaluate and select base classifiers. Then the weighted voting method is used to integrate the selected base classifier. Finally, the simulation results of UCI data set and NSL-KDD data set show that the algorithm can improve the detection accuracy, especially the recognition rate of unknown intrusion behavior.
在许多实际应用中,由于数据标注成本高,训练数据集包含大量未标记的样本和少量标记的样本。同时,网络数据中存在着大量的正常行为数据和少量的入侵数据。为了解决这一问题,本文提出了一种针对不平衡数据的半监督集成学习算法。该算法利用类样本之间的关系来定义样本的采样概率,然后根据采样概率构造初始训练子集和基分类器。然后,定义不平衡数据的评价指标来评价和选择基本分类器。然后采用加权投票法对选取的基分类器进行积分。最后,UCI数据集和NSL-KDD数据集的仿真结果表明,该算法可以提高检测精度,特别是对未知入侵行为的识别率。
{"title":"Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced Data","authors":"Zhang Lin","doi":"10.1109/NaNA53684.2021.00065","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00065","url":null,"abstract":"In many practical applications, due to the high cost of data annotation, the training dataset includes a large number of unlabeled samples and a small number of labeled samples. At the same time, there are a large number of normal behavior data and a small number of intrusion data in the network data. In order to solve this problem, this paper proposes a semi-supervised ensemble learning algorithm for imbalanced data. This algorithm uses the relationship between class samples to define the sampling probability of samples, and then constructs the initial training subset and the base classifier according to the sampling probability. Then, the evaluation index for imbalanced data is defined to evaluate and select base classifiers. Then the weighted voting method is used to integrate the selected base classifier. Finally, the simulation results of UCI data set and NSL-KDD data set show that the algorithm can improve the detection accuracy, especially the recognition rate of unknown intrusion behavior.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125310268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey on security and privacy threats to federated learning 联邦学习的安全和隐私威胁调查
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00062
Junpeng Zhang, Mengqian Li, Shuiguang Zeng, B. Xie, Dongmei Zhao
Federated learning (FL) has nourished a promising scheme to solve the data silo, which enables multiple clients to construct a joint model without centralizing data. The critical concerns for flourishing FL applications are that build a security and privacy-preserving learning environment. It is thus highly necessary to comprehensively identify and classify potential threats to utilize FL under security guarantees. This paper starts from the perspective of launched attacks with different computing participants to construct the unique threats classification, highlighting the significant attacks, e.g., poisoning attacks, inference attacks, and generative adversarial networks (GAN) attacks. Our study shows that existing FL protocols do not always provide sufficient security, containing various attacks from both clients and servers. GAN attacks lead to larger significant threats among the kinds of threats given the invisible of the attack process. Moreover, we summarize a detailed review of several defense mechanisms and approaches to resist privacy risks and security breaches. Then advantages and weaknesses are generalized, respectively. Finally, we conclude the paper to prospect the challenges and some potential research directions.
联邦学习(FL)为解决数据竖井提供了一个很有前途的方案,它使多个客户端能够在不集中数据的情况下构建联合模型。蓬勃发展的FL应用程序的关键问题是建立一个安全和保护隐私的学习环境。因此,全面识别和分类潜在威胁,在安全保障下利用FL是非常必要的。本文从不同计算参与者发起的攻击的角度出发,构建了独特的威胁分类,突出了重要的攻击,如投毒攻击、推理攻击和生成式对抗网络(GAN)攻击。我们的研究表明,现有的FL协议并不总是提供足够的安全性,包含来自客户端和服务器的各种攻击。在各种威胁中,由于攻击过程的不可见性,GAN攻击会导致更大的重大威胁。此外,我们总结了几种防御机制和方法,以抵御隐私风险和安全漏洞的详细审查。然后分别概括了优点和缺点。最后,对本文面临的挑战和可能的研究方向进行了展望。
{"title":"A survey on security and privacy threats to federated learning","authors":"Junpeng Zhang, Mengqian Li, Shuiguang Zeng, B. Xie, Dongmei Zhao","doi":"10.1109/NaNA53684.2021.00062","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00062","url":null,"abstract":"Federated learning (FL) has nourished a promising scheme to solve the data silo, which enables multiple clients to construct a joint model without centralizing data. The critical concerns for flourishing FL applications are that build a security and privacy-preserving learning environment. It is thus highly necessary to comprehensively identify and classify potential threats to utilize FL under security guarantees. This paper starts from the perspective of launched attacks with different computing participants to construct the unique threats classification, highlighting the significant attacks, e.g., poisoning attacks, inference attacks, and generative adversarial networks (GAN) attacks. Our study shows that existing FL protocols do not always provide sufficient security, containing various attacks from both clients and servers. GAN attacks lead to larger significant threats among the kinds of threats given the invisible of the attack process. Moreover, we summarize a detailed review of several defense mechanisms and approaches to resist privacy risks and security breaches. Then advantages and weaknesses are generalized, respectively. Finally, we conclude the paper to prospect the challenges and some potential research directions.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A fine-grained petri model for SQL time-blind injection 用于SQL时间盲注入的细粒度petri模型
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00035
Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji
With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technology, this paper takes SQL time-blind injection as an example to model its process with Petri Net. The validity of the model is verified by quantitative analysis and qualitative analysis. Try to inject 10, 20, 30, 40 and 50 times into target aircraft and Petri Net model respectively. The blind injection time is recorded and compared. The results show that the injection time increases with the increase of injection times. Under the same injection times, the Petri Net model takes less time. The sending time in the token can be set. When the sending time is short, the injection speed is fast, and super real-time simulation can be realized, which can realize the rapid prediction of attacks and resource vulnerability effects. When the sending time is long, the injection process slows down. It is beneficial to observe the details of the injection process and whether conflicts occur at a fine-grained level, analyze the purpose of the attack and achieve the purpose of building a patch model. The patch model can effectively take countermeasures against attacks, predict unknown vulnerabilities and ensure network information security.
在SQL注入攻击严重的背景下,现有的SQL注入建模方法无法细粒度地反映SQL注入攻击的过程。在讨论攻击技术的基础上,以SQL时间盲注入为例,利用Petri网对其过程进行建模。通过定量分析和定性分析验证了模型的有效性。分别尝试在目标飞行器和Petri网模型中注入10、20、30、40、50次。记录并比较盲注时间。结果表明,注射时间随注射次数的增加而增加。在相同的注入次数下,Petri网模型所需的时间更短。可以设置令牌中的发送时间。发送时间短,注入速度快,可以实现超实时仿真,可以实现对攻击和资源漏洞效果的快速预测。发送时间越长,注入速度越慢。有利于在细粒度层面观察注入过程的细节和是否发生冲突,分析攻击目的,达到构建补丁模型的目的。补丁模型可以有效地应对攻击,预测未知漏洞,保障网络信息安全。
{"title":"A fine-grained petri model for SQL time-blind injection","authors":"Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji","doi":"10.1109/NaNA53684.2021.00035","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00035","url":null,"abstract":"With the background of severe SQL injection attacks, the existing SQL injection modeling methods cannot reflect the process of SQL injection attacks in a fine-grained manner. Based on the discussion of attack technology, this paper takes SQL time-blind injection as an example to model its process with Petri Net. The validity of the model is verified by quantitative analysis and qualitative analysis. Try to inject 10, 20, 30, 40 and 50 times into target aircraft and Petri Net model respectively. The blind injection time is recorded and compared. The results show that the injection time increases with the increase of injection times. Under the same injection times, the Petri Net model takes less time. The sending time in the token can be set. When the sending time is short, the injection speed is fast, and super real-time simulation can be realized, which can realize the rapid prediction of attacks and resource vulnerability effects. When the sending time is long, the injection process slows down. It is beneficial to observe the details of the injection process and whether conflicts occur at a fine-grained level, analyze the purpose of the attack and achieve the purpose of building a patch model. The patch model can effectively take countermeasures against attacks, predict unknown vulnerabilities and ensure network information security.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message from the General Conference Chairs 大会主席的致辞
Pub Date : 2021-10-01 DOI: 10.1109/nana53684.2021.00005
{"title":"Message from the General Conference Chairs","authors":"","doi":"10.1109/nana53684.2021.00005","DOIUrl":"https://doi.org/10.1109/nana53684.2021.00005","url":null,"abstract":"","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Calibrating Privacy Budgets for Locally Private Graph Neural Networks 局部私有图神经网络的隐私预算校准
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00012
Wentao Du, Xinyv Ma, Wenxiang Dong, Dong Zhang, Chi Zhang, Qibin Sun
Graph neural networks have shown excellent performance in learning graph representations. In many cases, the graph structured data are crowd-sourced and may contain sensitive information, thus causing privacy issues. Therefore, privacy-preserving graph neural networks have spurred increasing interest nowadays. A promising approach for privacy-preserving graph neural networks is to apply local differential privacy (LDP). Though LDP provides protection against privacy attacks, the calibration of the privacy budget is not well understood and the relationship between privacy protection level and model utility is not well established. In this paper, we propose an evaluation method to characterize the trade-off between utility and privacy for locally private graph neural networks (LPGNNs). More specifically, we leverage the effect of attribute inference attacks as a privacy measurement to bridge the gaps among the model utility, privacy leakage, and the value of the privacy budget. Our experimental results show that the LPGNNs model may fulfill the promise of providing privacy protection against powerful opponents by providing poor model utility, and when it provides acceptable utility, it shows moderate vulnerability to the attribute inference attacks. Moreover, one of the direct applications of our method is visualizing the adjusting of privacy budgets and facilitating the deployment of LDP.
图神经网络在学习图表示方面表现出优异的性能。在许多情况下,图形结构化数据是众包的,可能包含敏感信息,从而导致隐私问题。因此,保护隐私的图神经网络引起了人们越来越多的兴趣。局部差分隐私(LDP)是保护图神经网络隐私的一种很有前途的方法。虽然LDP提供了对隐私攻击的保护,但隐私预算的校准并没有很好地理解,隐私保护水平与模型效用之间的关系也没有很好地建立。在本文中,我们提出了一种评估方法来表征局部私有图神经网络(lpgnn)效用与隐私之间的权衡。更具体地说,我们利用属性推理攻击的影响作为隐私度量来弥合模型效用、隐私泄漏和隐私预算价值之间的差距。实验结果表明,lpgnn模型通过提供较差的模型效用来实现对强大对手提供隐私保护的承诺,当提供可接受的效用时,它对属性推理攻击表现出适度的脆弱性。此外,该方法的直接应用之一是将隐私预算的调整可视化,从而促进LDP的部署。
{"title":"Calibrating Privacy Budgets for Locally Private Graph Neural Networks","authors":"Wentao Du, Xinyv Ma, Wenxiang Dong, Dong Zhang, Chi Zhang, Qibin Sun","doi":"10.1109/NaNA53684.2021.00012","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00012","url":null,"abstract":"Graph neural networks have shown excellent performance in learning graph representations. In many cases, the graph structured data are crowd-sourced and may contain sensitive information, thus causing privacy issues. Therefore, privacy-preserving graph neural networks have spurred increasing interest nowadays. A promising approach for privacy-preserving graph neural networks is to apply local differential privacy (LDP). Though LDP provides protection against privacy attacks, the calibration of the privacy budget is not well understood and the relationship between privacy protection level and model utility is not well established. In this paper, we propose an evaluation method to characterize the trade-off between utility and privacy for locally private graph neural networks (LPGNNs). More specifically, we leverage the effect of attribute inference attacks as a privacy measurement to bridge the gaps among the model utility, privacy leakage, and the value of the privacy budget. Our experimental results show that the LPGNNs model may fulfill the promise of providing privacy protection against powerful opponents by providing poor model utility, and when it provides acceptable utility, it shows moderate vulnerability to the attribute inference attacks. Moreover, one of the direct applications of our method is visualizing the adjusting of privacy budgets and facilitating the deployment of LDP.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signature Scheme Based on The SM2 Algorithm in Fabric 基于Fabric中SM2算法的签名方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00083
Yaling Zhang, Hongtao Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu
Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied to Hyperledger Fabric. Firstly, two elliptic curve public-key cryptography algorithms are analyzed, and the feasibility of the SM2 in Fabric system is studied. Secondly, the Fabric system using the SM2 algorithm is designed and implemented, and the generation process of the Fabric chain address using the SM2 algorithm is given. Finally, experimental verification of the availability and performance of the Fabric system after the replacement of national cryptography algorithms is carried out. The experimental results show that the SM2 interface of the new Fabric alliance chain has good usability, and the average latency is reduced by 51.8%, and the transaction throughput is increased by 33.1%.
在对目前广泛应用的Hyperledger Fabric联盟链结构进行分析和研究的基础上,提出了一种可应用于Hyperledger Fabric的基于国家密码算法SM2的数字签名方案。首先,分析了两种椭圆曲线公钥加密算法,研究了椭圆曲线公钥加密算法在Fabric系统中的可行性。其次,设计并实现了基于SM2算法的Fabric系统,给出了基于SM2算法的Fabric链地址生成过程。最后,对替换国家密码算法后的Fabric系统的可用性和性能进行了实验验证。实验结果表明,新型Fabric联盟链的SM2接口具有良好的可用性,平均延迟降低了51.8%,交易吞吐量提高了33.1%。
{"title":"Signature Scheme Based on The SM2 Algorithm in Fabric","authors":"Yaling Zhang, Hongtao Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu","doi":"10.1109/NaNA53684.2021.00083","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00083","url":null,"abstract":"Based on the analysis and research of the widely used Hyperledger Fabric alliance chain structure, this paper proposes a digital signature scheme based on the national cryptographic algorithm SM2 which can be applied to Hyperledger Fabric. Firstly, two elliptic curve public-key cryptography algorithms are analyzed, and the feasibility of the SM2 in Fabric system is studied. Secondly, the Fabric system using the SM2 algorithm is designed and implemented, and the generation process of the Fabric chain address using the SM2 algorithm is given. Finally, experimental verification of the availability and performance of the Fabric system after the replacement of national cryptography algorithms is carried out. The experimental results show that the SM2 interface of the new Fabric alliance chain has good usability, and the average latency is reduced by 51.8%, and the transaction throughput is increased by 33.1%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1