首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Energy-saving mechanism based on tidal characteristic in computing power network 计算能力网络中基于潮汐特性的节能机制
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00033
Ran Pang, Hui Li, Yuefeng Ji, Guangquan Wang, Chang Cao
In the Computing power network, based on the tidal characteristic of computing power nodes, with the goal of reducing the overall network energy consumption, the classification between tidal computing power nodes and non-tidal computing power nodes is proposed. This paper also proposes a new anycast routing algorithm with weighted wakeup routing penalty for tidal computing power nodes in sleep state. The simulation results show that the proposed anycast routing algorithm with tidal node classification and wake-up penalty weighted can effectively reduce energy consumption under the premise of meeting the service delay requirements.
在计算能力网络中,基于计算能力节点的潮汐特性,以降低网络整体能耗为目标,提出潮汐计算能力节点与非潮汐计算能力节点的分类。针对处于休眠状态的潮汐计算能力节点,提出了一种新的带加权唤醒补偿的任播路由算法。仿真结果表明,提出的潮汐节点分类和唤醒惩罚加权的任播路由算法能够在满足业务延迟要求的前提下有效降低能耗。
{"title":"Energy-saving mechanism based on tidal characteristic in computing power network","authors":"Ran Pang, Hui Li, Yuefeng Ji, Guangquan Wang, Chang Cao","doi":"10.1109/NaNA53684.2021.00033","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00033","url":null,"abstract":"In the Computing power network, based on the tidal characteristic of computing power nodes, with the goal of reducing the overall network energy consumption, the classification between tidal computing power nodes and non-tidal computing power nodes is proposed. This paper also proposes a new anycast routing algorithm with weighted wakeup routing penalty for tidal computing power nodes in sleep state. The simulation results show that the proposed anycast routing algorithm with tidal node classification and wake-up penalty weighted can effectively reduce energy consumption under the premise of meeting the service delay requirements.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125451604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A permission generation and configuration method based on Rules and FP-Growth algorithm 一种基于规则和FP-Growth算法的权限生成和配置方法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00092
Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He
With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security is the primary task of platform, and data access control, especially the fine-grained access control model, had become an important means to enhance the security of platform. In this paper, we propose a data access permission configuration method based on rules and FP-growth. Specifically, FP-Growth algorithm is first used to obtain the frequent items and the association relations of data, which can be transformed into the enumerable permission configuration items. Then, the correspondence and frequency of data items are calculated to acquire the frequent items, the permission configuration acting on the data table columns is obtained according to the frequency of used data items. By filtering the strong association relation, the data items that are more closely related in the association relation and the corresponding data item values are finally obtained, and they are converted into the permission configuration that acts on the rows of the data table. The proposed method has been tested and verified to meet business needs, and the performance consumption is below the threshold. Moreover, it is feasible to utilize classical data mining algorithms to generate permission configuration, which has begun to apply the Blueking Data Platform.
随着计算机技术的发展,许多企业已经开始搭建数据平台,数据及其服务已经在企业中扮演着重要的角色。然而,保证数据安全是平台的首要任务,数据访问控制,特别是细粒度访问控制模型,已成为增强平台安全性的重要手段。本文提出了一种基于规则和fp增长的数据访问权限配置方法。首先使用FP-Growth算法获取数据的频繁项和关联关系,并将其转化为可枚举的权限配置项。然后,计算数据项的对应关系和频率,获得频繁项,根据数据项的使用频率,得到作用在数据表列上的权限配置。通过对强关联关系的过滤,最终获得关联关系中相关度较高的数据项及其对应的数据项值,并将其转换为作用于数据表行上的权限配置。所提出的方法经过测试和验证,满足业务需求,性能消耗低于阈值。此外,利用经典的数据挖掘算法生成权限配置是可行的,这已经开始在蓝king数据平台上得到应用。
{"title":"A permission generation and configuration method based on Rules and FP-Growth algorithm","authors":"Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He","doi":"10.1109/NaNA53684.2021.00092","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00092","url":null,"abstract":"With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security is the primary task of platform, and data access control, especially the fine-grained access control model, had become an important means to enhance the security of platform. In this paper, we propose a data access permission configuration method based on rules and FP-growth. Specifically, FP-Growth algorithm is first used to obtain the frequent items and the association relations of data, which can be transformed into the enumerable permission configuration items. Then, the correspondence and frequency of data items are calculated to acquire the frequent items, the permission configuration acting on the data table columns is obtained according to the frequency of used data items. By filtering the strong association relation, the data items that are more closely related in the association relation and the corresponding data item values are finally obtained, and they are converted into the permission configuration that acts on the rows of the data table. The proposed method has been tested and verified to meet business needs, and the performance consumption is below the threshold. Moreover, it is feasible to utilize classical data mining algorithms to generate permission configuration, which has begun to apply the Blueking Data Platform.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117009880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of symmetric cryptographic algorithms 对称密码算法的比较研究
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00026
Alibek Nurgaliyev, Hua Wang
This article provides an unbiased comparison of the most popular and commonly used algorithms in the field of data encryption. The capacity to secure data from various attacks, as well as the elapsed time and efficiency of data encryption, are the main features that distinguish encryption algorithms. We compared the most prevalent symmetric encryption algorithms, including DES, 3DES, Blowfish, MARS, and AES, in this study. Each algorithm was compared by processing data blocks of various sizes to estimate encryption and decryption speeds and compare entropy. The given comparison takes into account the behavior and performance of the algorithms while utilizing varied data loads because the main objective is to execute these algorithms with various settings. We also looked at characteristics including flexibility, key extension possibilities, potential attacks, entropy, and security vulnerability of the algorithms, all of which affect the cryptosystem’s efficiency.
本文对数据加密领域中最流行和最常用的算法进行了公正的比较。保护数据免受各种攻击的能力,以及数据加密的耗时和效率,是区分加密算法的主要特征。在本研究中,我们比较了最流行的对称加密算法,包括DES、3DES、Blowfish、MARS和AES。通过处理不同大小的数据块来比较每种算法,以估计加密和解密速度并比较熵。在使用不同的数据负载时,给出的比较考虑了算法的行为和性能,因为主要目标是用不同的设置执行这些算法。我们还研究了算法的灵活性、密钥扩展可能性、潜在攻击、熵和安全漏洞等特征,所有这些都会影响密码系统的效率。
{"title":"Comparative study of symmetric cryptographic algorithms","authors":"Alibek Nurgaliyev, Hua Wang","doi":"10.1109/NaNA53684.2021.00026","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00026","url":null,"abstract":"This article provides an unbiased comparison of the most popular and commonly used algorithms in the field of data encryption. The capacity to secure data from various attacks, as well as the elapsed time and efficiency of data encryption, are the main features that distinguish encryption algorithms. We compared the most prevalent symmetric encryption algorithms, including DES, 3DES, Blowfish, MARS, and AES, in this study. Each algorithm was compared by processing data blocks of various sizes to estimate encryption and decryption speeds and compare entropy. The given comparison takes into account the behavior and performance of the algorithms while utilizing varied data loads because the main objective is to execute these algorithms with various settings. We also looked at characteristics including flexibility, key extension possibilities, potential attacks, entropy, and security vulnerability of the algorithms, all of which affect the cryptosystem’s efficiency.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Access Control Scheme Supporting Attribute Revocation in Cloud Computing 云计算中支持属性撤销的访问控制方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00072
Yachen He, Guishan Dong, Dong Liu, Haiyang Peng, Yuxiang Chen
To break the data barrier of the information island and explore the value of data in the past few years, it has become a trend of uploading data to the cloud by data owners for data sharing. At the same time, they also hope that the uploaded data can still be controlled, which makes access control of cloud data become an intractable problem. As a famous cryptographic technology, ciphertext policy-based attribute encryption (CP-ABE) not only assures data confidentiality but implements fine-grained access control. However, the actual application of CP-ABE has its inherent challenge in attribute revocation. To address this challenge, we proposed an access control solution supporting attribute revocation in cloud computing. Unlike previous attribute revocation schemes, to solve the problem of excessive attribute revocation overhead, we use symmetric encryption technology to encrypt the plaintext data firstly, and then, encrypting the symmetric key by utilizing public-key encryption technology according to the access structure, so that only the key ciphertext is necessary to update when the attributes are revoked, which reduces the spending of ciphertext update to a great degree. The comparative analysis demonstrates that our solution is reasonably efficient and more secure to support attribute revocation and access control after data sharing.
为了打破信息孤岛的数据壁垒,挖掘数据的价值,在过去的几年里,数据所有者将数据上传到云端进行数据共享已成为一种趋势。同时,他们也希望上传的数据仍然可以被控制,这使得云数据的访问控制成为一个棘手的问题。密文策略属性加密(cipher policy-based attribute encryption, CP-ABE)作为一种著名的密码学技术,既保证了数据的保密性,又实现了细粒度的访问控制。然而,CP-ABE的实际应用在属性撤销方面存在着固有的挑战。为了应对这一挑战,我们提出了一种支持云计算中属性撤销的访问控制解决方案。与以往的属性撤销方案不同,为了解决属性撤销开销过大的问题,我们首先采用对称加密技术对明文数据进行加密,然后根据访问结构利用公钥加密技术对对称密钥进行加密,这样在撤销属性时只需要更新密钥密文,大大减少了密文更新的开销。对比分析表明,该方案在支持数据共享后的属性撤销和访问控制方面具有较高的效率和安全性。
{"title":"Access Control Scheme Supporting Attribute Revocation in Cloud Computing","authors":"Yachen He, Guishan Dong, Dong Liu, Haiyang Peng, Yuxiang Chen","doi":"10.1109/NaNA53684.2021.00072","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00072","url":null,"abstract":"To break the data barrier of the information island and explore the value of data in the past few years, it has become a trend of uploading data to the cloud by data owners for data sharing. At the same time, they also hope that the uploaded data can still be controlled, which makes access control of cloud data become an intractable problem. As a famous cryptographic technology, ciphertext policy-based attribute encryption (CP-ABE) not only assures data confidentiality but implements fine-grained access control. However, the actual application of CP-ABE has its inherent challenge in attribute revocation. To address this challenge, we proposed an access control solution supporting attribute revocation in cloud computing. Unlike previous attribute revocation schemes, to solve the problem of excessive attribute revocation overhead, we use symmetric encryption technology to encrypt the plaintext data firstly, and then, encrypting the symmetric key by utilizing public-key encryption technology according to the access structure, so that only the key ciphertext is necessary to update when the attributes are revoked, which reduces the spending of ciphertext update to a great degree. The comparative analysis demonstrates that our solution is reasonably efficient and more secure to support attribute revocation and access control after data sharing.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exact Evaluation of Total Variation Distance in Covert Communications 隐蔽通信中总变异距离的精确估计
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00028
Ahmed Salem, Huihui Wu, Xiaohong Jiang
This paper investigates the parameters of covert communications in a finite blocklength regime. The optimal hypothesis test in covert communications is directly related to the total variation distance (TVD), where obtaining it becomes crucial when practical covert communication is considered. The current literature provides different TVD calculation methods that are inaccurate, especially when the blocklength n is large. We provide an exact evaluation for TVD theoretically based on the incomplete Gamma function. We also provide an accurate approach to calculate TVD when n is small (n ≤ 140). Extensive numerical results were provided to verify the accuracy of our proposed expressions.
本文研究了有限块长状态下隐蔽通信的参数。隐蔽通信中的最优假设检验与总变异距离(TVD)直接相关,在考虑实际隐蔽通信时,获得最佳假设检验变得至关重要。目前的文献提供了不同的TVD计算方法,这些方法都是不准确的,特别是当块长度n较大时。我们从理论上给出了基于不完全伽马函数的TVD的精确评价。我们还提供了当n很小(n≤140)时计算TVD的精确方法。提供了大量的数值结果来验证我们提出的表达式的准确性。
{"title":"Exact Evaluation of Total Variation Distance in Covert Communications","authors":"Ahmed Salem, Huihui Wu, Xiaohong Jiang","doi":"10.1109/NaNA53684.2021.00028","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00028","url":null,"abstract":"This paper investigates the parameters of covert communications in a finite blocklength regime. The optimal hypothesis test in covert communications is directly related to the total variation distance (TVD), where obtaining it becomes crucial when practical covert communication is considered. The current literature provides different TVD calculation methods that are inaccurate, especially when the blocklength n is large. We provide an exact evaluation for TVD theoretically based on the incomplete Gamma function. We also provide an accurate approach to calculate TVD when n is small (n ≤ 140). Extensive numerical results were provided to verify the accuracy of our proposed expressions.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123469593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on security and privacy threats to federated learning 联邦学习的安全和隐私威胁调查
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00062
Junpeng Zhang, Mengqian Li, Shuiguang Zeng, B. Xie, Dongmei Zhao
Federated learning (FL) has nourished a promising scheme to solve the data silo, which enables multiple clients to construct a joint model without centralizing data. The critical concerns for flourishing FL applications are that build a security and privacy-preserving learning environment. It is thus highly necessary to comprehensively identify and classify potential threats to utilize FL under security guarantees. This paper starts from the perspective of launched attacks with different computing participants to construct the unique threats classification, highlighting the significant attacks, e.g., poisoning attacks, inference attacks, and generative adversarial networks (GAN) attacks. Our study shows that existing FL protocols do not always provide sufficient security, containing various attacks from both clients and servers. GAN attacks lead to larger significant threats among the kinds of threats given the invisible of the attack process. Moreover, we summarize a detailed review of several defense mechanisms and approaches to resist privacy risks and security breaches. Then advantages and weaknesses are generalized, respectively. Finally, we conclude the paper to prospect the challenges and some potential research directions.
联邦学习(FL)为解决数据竖井提供了一个很有前途的方案,它使多个客户端能够在不集中数据的情况下构建联合模型。蓬勃发展的FL应用程序的关键问题是建立一个安全和保护隐私的学习环境。因此,全面识别和分类潜在威胁,在安全保障下利用FL是非常必要的。本文从不同计算参与者发起的攻击的角度出发,构建了独特的威胁分类,突出了重要的攻击,如投毒攻击、推理攻击和生成式对抗网络(GAN)攻击。我们的研究表明,现有的FL协议并不总是提供足够的安全性,包含来自客户端和服务器的各种攻击。在各种威胁中,由于攻击过程的不可见性,GAN攻击会导致更大的重大威胁。此外,我们总结了几种防御机制和方法,以抵御隐私风险和安全漏洞的详细审查。然后分别概括了优点和缺点。最后,对本文面临的挑战和可能的研究方向进行了展望。
{"title":"A survey on security and privacy threats to federated learning","authors":"Junpeng Zhang, Mengqian Li, Shuiguang Zeng, B. Xie, Dongmei Zhao","doi":"10.1109/NaNA53684.2021.00062","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00062","url":null,"abstract":"Federated learning (FL) has nourished a promising scheme to solve the data silo, which enables multiple clients to construct a joint model without centralizing data. The critical concerns for flourishing FL applications are that build a security and privacy-preserving learning environment. It is thus highly necessary to comprehensively identify and classify potential threats to utilize FL under security guarantees. This paper starts from the perspective of launched attacks with different computing participants to construct the unique threats classification, highlighting the significant attacks, e.g., poisoning attacks, inference attacks, and generative adversarial networks (GAN) attacks. Our study shows that existing FL protocols do not always provide sufficient security, containing various attacks from both clients and servers. GAN attacks lead to larger significant threats among the kinds of threats given the invisible of the attack process. Moreover, we summarize a detailed review of several defense mechanisms and approaches to resist privacy risks and security breaches. Then advantages and weaknesses are generalized, respectively. Finally, we conclude the paper to prospect the challenges and some potential research directions.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Expression Tree-based Policy Conflict Detection Algorithm 基于表达式树的策略冲突检测算法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00069
Xue Wang, Hao Zhang, Kaijun Wu
In attribute-based access control services, there are problems such as cumbersome policy control, prone to authorization conflicts, and conflicts caused by complex attribute structures are not easy to identify. Due to the difficulty of the conflict detection problem, most of the detection methods have strict requirements for policy structure. Normally, the priority strategy are chosen uniformly when using the directed acyclic graph approach to disambiguate conflict rule pairs. The present methods are not thorough, flexible and user-friendly for the policy design in practical applications. To address these problems, an access control policy conflict detection algorithm based on intersection of target expression trees under the XACML (eXtensible Access Control Markup Language) specification is proposed. The method efficiently locates the conflict rule pairs based on the index structure through policy tree and rule effects, determines the conflict by expression comparison n, and marks the possible causes of the conflict, provides analysis of the disambiguation scheme, and achieves access control with fine granularity.
在基于属性的访问控制服务中,存在策略控制繁琐、容易发生授权冲突、属性结构复杂导致的冲突不易识别等问题。由于冲突检测问题的难度,大多数检测方法对策略结构都有严格的要求。通常使用有向无环图方法对冲突规则对进行消歧时,优先级策略是统一选择的。目前的方法对于实际应用中的政策设计不够彻底、灵活和人性化。针对这些问题,提出了一种基于XACML (eXtensible access control Markup Language,可扩展访问控制标记语言)规范下目标表达式树交集的访问控制策略冲突检测算法。该方法通过策略树和规则效果有效地定位基于索引结构的冲突规则对,通过表达式比较n确定冲突,并标记冲突的可能原因,提供消歧方案分析,实现细粒度访问控制。
{"title":"Expression Tree-based Policy Conflict Detection Algorithm","authors":"Xue Wang, Hao Zhang, Kaijun Wu","doi":"10.1109/NaNA53684.2021.00069","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00069","url":null,"abstract":"In attribute-based access control services, there are problems such as cumbersome policy control, prone to authorization conflicts, and conflicts caused by complex attribute structures are not easy to identify. Due to the difficulty of the conflict detection problem, most of the detection methods have strict requirements for policy structure. Normally, the priority strategy are chosen uniformly when using the directed acyclic graph approach to disambiguate conflict rule pairs. The present methods are not thorough, flexible and user-friendly for the policy design in practical applications. To address these problems, an access control policy conflict detection algorithm based on intersection of target expression trees under the XACML (eXtensible Access Control Markup Language) specification is proposed. The method efficiently locates the conflict rule pairs based on the index structure through policy tree and rule effects, determines the conflict by expression comparison n, and marks the possible causes of the conflict, provides analysis of the disambiguation scheme, and achieves access control with fine granularity.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124250124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Calibrating Privacy Budgets for Locally Private Graph Neural Networks 局部私有图神经网络的隐私预算校准
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00012
Wentao Du, Xinyv Ma, Wenxiang Dong, Dong Zhang, Chi Zhang, Qibin Sun
Graph neural networks have shown excellent performance in learning graph representations. In many cases, the graph structured data are crowd-sourced and may contain sensitive information, thus causing privacy issues. Therefore, privacy-preserving graph neural networks have spurred increasing interest nowadays. A promising approach for privacy-preserving graph neural networks is to apply local differential privacy (LDP). Though LDP provides protection against privacy attacks, the calibration of the privacy budget is not well understood and the relationship between privacy protection level and model utility is not well established. In this paper, we propose an evaluation method to characterize the trade-off between utility and privacy for locally private graph neural networks (LPGNNs). More specifically, we leverage the effect of attribute inference attacks as a privacy measurement to bridge the gaps among the model utility, privacy leakage, and the value of the privacy budget. Our experimental results show that the LPGNNs model may fulfill the promise of providing privacy protection against powerful opponents by providing poor model utility, and when it provides acceptable utility, it shows moderate vulnerability to the attribute inference attacks. Moreover, one of the direct applications of our method is visualizing the adjusting of privacy budgets and facilitating the deployment of LDP.
图神经网络在学习图表示方面表现出优异的性能。在许多情况下,图形结构化数据是众包的,可能包含敏感信息,从而导致隐私问题。因此,保护隐私的图神经网络引起了人们越来越多的兴趣。局部差分隐私(LDP)是保护图神经网络隐私的一种很有前途的方法。虽然LDP提供了对隐私攻击的保护,但隐私预算的校准并没有很好地理解,隐私保护水平与模型效用之间的关系也没有很好地建立。在本文中,我们提出了一种评估方法来表征局部私有图神经网络(lpgnn)效用与隐私之间的权衡。更具体地说,我们利用属性推理攻击的影响作为隐私度量来弥合模型效用、隐私泄漏和隐私预算价值之间的差距。实验结果表明,lpgnn模型通过提供较差的模型效用来实现对强大对手提供隐私保护的承诺,当提供可接受的效用时,它对属性推理攻击表现出适度的脆弱性。此外,该方法的直接应用之一是将隐私预算的调整可视化,从而促进LDP的部署。
{"title":"Calibrating Privacy Budgets for Locally Private Graph Neural Networks","authors":"Wentao Du, Xinyv Ma, Wenxiang Dong, Dong Zhang, Chi Zhang, Qibin Sun","doi":"10.1109/NaNA53684.2021.00012","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00012","url":null,"abstract":"Graph neural networks have shown excellent performance in learning graph representations. In many cases, the graph structured data are crowd-sourced and may contain sensitive information, thus causing privacy issues. Therefore, privacy-preserving graph neural networks have spurred increasing interest nowadays. A promising approach for privacy-preserving graph neural networks is to apply local differential privacy (LDP). Though LDP provides protection against privacy attacks, the calibration of the privacy budget is not well understood and the relationship between privacy protection level and model utility is not well established. In this paper, we propose an evaluation method to characterize the trade-off between utility and privacy for locally private graph neural networks (LPGNNs). More specifically, we leverage the effect of attribute inference attacks as a privacy measurement to bridge the gaps among the model utility, privacy leakage, and the value of the privacy budget. Our experimental results show that the LPGNNs model may fulfill the promise of providing privacy protection against powerful opponents by providing poor model utility, and when it provides acceptable utility, it shows moderate vulnerability to the attribute inference attacks. Moreover, one of the direct applications of our method is visualizing the adjusting of privacy budgets and facilitating the deployment of LDP.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122615468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced Data 基于半监督集成学习算法的非平衡数据网络入侵检测
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00065
Zhang Lin
In many practical applications, due to the high cost of data annotation, the training dataset includes a large number of unlabeled samples and a small number of labeled samples. At the same time, there are a large number of normal behavior data and a small number of intrusion data in the network data. In order to solve this problem, this paper proposes a semi-supervised ensemble learning algorithm for imbalanced data. This algorithm uses the relationship between class samples to define the sampling probability of samples, and then constructs the initial training subset and the base classifier according to the sampling probability. Then, the evaluation index for imbalanced data is defined to evaluate and select base classifiers. Then the weighted voting method is used to integrate the selected base classifier. Finally, the simulation results of UCI data set and NSL-KDD data set show that the algorithm can improve the detection accuracy, especially the recognition rate of unknown intrusion behavior.
在许多实际应用中,由于数据标注成本高,训练数据集包含大量未标记的样本和少量标记的样本。同时,网络数据中存在着大量的正常行为数据和少量的入侵数据。为了解决这一问题,本文提出了一种针对不平衡数据的半监督集成学习算法。该算法利用类样本之间的关系来定义样本的采样概率,然后根据采样概率构造初始训练子集和基分类器。然后,定义不平衡数据的评价指标来评价和选择基本分类器。然后采用加权投票法对选取的基分类器进行积分。最后,UCI数据集和NSL-KDD数据集的仿真结果表明,该算法可以提高检测精度,特别是对未知入侵行为的识别率。
{"title":"Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced Data","authors":"Zhang Lin","doi":"10.1109/NaNA53684.2021.00065","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00065","url":null,"abstract":"In many practical applications, due to the high cost of data annotation, the training dataset includes a large number of unlabeled samples and a small number of labeled samples. At the same time, there are a large number of normal behavior data and a small number of intrusion data in the network data. In order to solve this problem, this paper proposes a semi-supervised ensemble learning algorithm for imbalanced data. This algorithm uses the relationship between class samples to define the sampling probability of samples, and then constructs the initial training subset and the base classifier according to the sampling probability. Then, the evaluation index for imbalanced data is defined to evaluate and select base classifiers. Then the weighted voting method is used to integrate the selected base classifier. Finally, the simulation results of UCI data set and NSL-KDD data set show that the algorithm can improve the detection accuracy, especially the recognition rate of unknown intrusion behavior.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125310268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message from the General Conference Chairs 大会主席的致辞
Pub Date : 2021-10-01 DOI: 10.1109/nana53684.2021.00005
{"title":"Message from the General Conference Chairs","authors":"","doi":"10.1109/nana53684.2021.00005","DOIUrl":"https://doi.org/10.1109/nana53684.2021.00005","url":null,"abstract":"","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116150998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1