首页 > 最新文献

Journal of Surveillance, Security and Safety最新文献

英文 中文
TENNER: intrusion detection models for industrial networks based on ensemble learning TENNER:基于集合学习的工业网络入侵检测模型
Pub Date : 2024-04-20 DOI: 10.20517/jsss.2023.51
Nicole do Vale Dalarmelina, Pallavi Arora, Geraldo Pereira Rocha Filho, Rodolfo Ipolito Meneguette, Marcio Andrey Teixeira
In the pursuit of discerning patterns within computer network attacks, the utilization of Machine Learning and Deep Learning algorithms has been prevalent for crafting detection models based on extensive network traffic datasets. Furthermore, enhancing detection efficacy is feasible by applying cluster learning techniques, wherein multiple Machine Learning models collaborate to yield detection outcomes. Nevertheless, it is imperative to discern the optimal features within the dataset for training the intrusion detection model. In the present study, we proffer a novel framework for feature selection and intrusion detection within industrial networks, employing Ensemble Learning to achieve commendable performance in terms of both high predictive accuracy and efficient learning duration. The outcomes evince that the proposed model exhibits an accuracy of 99.93%, with a mere one h and 34 min required for comprehensive training. In contrast, a model trained without the framework presented in this paper attains an accuracy of 99.94%, necessitating an extensive training period of 156 h. Notably, the detection model derived from the proposed solution demonstrates superior results in prediction time, accomplishing predictions within 0.0009 seconds, compared to the alternative model which requires 0.0076 seconds for predictions.
为了辨别计算机网络攻击的模式,利用机器学习和深度学习算法在广泛的网络流量数据集基础上建立检测模型的做法十分普遍。此外,通过应用集群学习技术,多个机器学习模型协同产生检测结果,从而提高检测效率也是可行的。不过,必须在数据集中找出最佳特征来训练入侵检测模型。在本研究中,我们为工业网络中的特征选择和入侵检测提供了一个新颖的框架,采用了集合学习(Ensemble Learning)技术,在高预测准确性和高效学习持续时间方面都取得了值得称道的性能。研究结果表明,所提出的模型准确率高达 99.93%,全面训练仅需 1 小时 34 分钟。值得注意的是,与需要 0.0076 秒进行预测的替代模型相比,由本文提出的解决方案衍生出的检测模型在预测时间上表现优异,可在 0.0009 秒内完成预测。
{"title":"TENNER: intrusion detection models for industrial networks based on ensemble learning","authors":"Nicole do Vale Dalarmelina, Pallavi Arora, Geraldo Pereira Rocha Filho, Rodolfo Ipolito Meneguette, Marcio Andrey Teixeira","doi":"10.20517/jsss.2023.51","DOIUrl":"https://doi.org/10.20517/jsss.2023.51","url":null,"abstract":"In the pursuit of discerning patterns within computer network attacks, the utilization of Machine Learning and Deep Learning algorithms has been prevalent for crafting detection models based on extensive network traffic datasets. Furthermore, enhancing detection efficacy is feasible by applying cluster learning techniques, wherein multiple Machine Learning models collaborate to yield detection outcomes. Nevertheless, it is imperative to discern the optimal features within the dataset for training the intrusion detection model. In the present study, we proffer a novel framework for feature selection and intrusion detection within industrial networks, employing Ensemble Learning to achieve commendable performance in terms of both high predictive accuracy and efficient learning duration. The outcomes evince that the proposed model exhibits an accuracy of 99.93%, with a mere one h and 34 min required for comprehensive training. In contrast, a model trained without the framework presented in this paper attains an accuracy of 99.94%, necessitating an extensive training period of 156 h. Notably, the detection model derived from the proposed solution demonstrates superior results in prediction time, accomplishing predictions within 0.0009 seconds, compared to the alternative model which requires 0.0076 seconds for predictions.","PeriodicalId":509397,"journal":{"name":"Journal of Surveillance, Security and Safety","volume":" 1127","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140681998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved differential fault analysis of Grain128-AEAD 改进的 Grain128-AEAD 差分故障分析
Pub Date : 2024-03-30 DOI: 10.20517/jsss.2023.42
Tianyu Fang, Iftekhar Salam, Wei‐Chuen Yau
The number of smart devices connected to the Internet has been constantly increasing, and as a result, lightweight cryptography (LWC) has become more important in the past decade. The Lightweight Cryptography (LWC) Project is an initiative taken by the National Institute of Standards and Technology (NIST) to standardize such LWC algorithms. Grain128-AEAD, which was submitted to the NIST LWC project, is an encryption algorithm that provides both confidentiality and integrity assurance. Third-party security analysis of the submitted ciphers is an important aspect of the evaluation of the submission to the NIST LWC project. Although several pieces of existing research, such as the bit-flipping attack, random fault attack, and deterministic random fault attack, have examined the security of Grain128-AEAD, there is still room for improvement in the fault attack models of these studies. This work aims to fill this research gap by analyzing the security margin of Grain128-AEAD against a series of improved differential fault attacks. In this study, we developed a probabilistic random fault attack and applied it to Grain128-AEAD. As an improvement of the existing research, a probabilistic approach can be applied to a more relaxed moderate control attack model. The existing moderate control model assumes the fault to be injected within any bit of a given byte, whereas the faults in our improved approach can be injected within any bits of a two-byte/four-byte segment, thereby relaxing the fault precision. The results indicate that the improved moderate control requires 388 keystreams for the two-byte model and 279 for the four-byte model to identify the target fault locations for implementing a state recovery attack. The relaxed fault attack models presented in this work are more practical to implement; hence, the findings of this research have improved the existing studies and narrowed the current research gap on the fault attack models of Grain128-AEAD. % To maintain consistency in terminology, "Grain-128AEAD" has been revised to "Grain128-AEAD" in both the abstract and the main text. Please confirm this revision.
连接到互联网的智能设备数量不断增加,因此,轻量级密码学(LWC)在过去十年中变得越来越重要。轻量级密码学(LWC)项目是由美国国家标准与技术研究院(NIST)发起的一项倡议,旨在将此类轻量级密码学算法标准化。提交给 NIST LWC 项目的 Grain128-AEAD 是一种既能保证机密性又能保证完整性的加密算法。对提交的密码进行第三方安全分析,是对提交给 NIST LWC 项目的密码进行评估的一个重要方面。尽管现有的一些研究,如比特翻转攻击、随机故障攻击和确定性随机故障攻击等,都对 Grain128-AEAD 的安全性进行了研究,但这些研究的故障攻击模型仍有改进的余地。本研究旨在通过分析 Grain128-AEAD 抵御一系列改进的差分故障攻击的安全裕度来填补这一研究空白。在这项研究中,我们开发了一种概率随机故障攻击,并将其应用于 Grain128-AEAD。作为对现有研究的改进,概率方法可应用于更宽松的适度控制攻击模型。现有的适度控制模型假定故障在给定字节的任意位内注入,而我们改进方法中的故障可以在两字节/四字节段的任意位内注入,从而放宽了故障精度。结果表明,改进后的适度控制方法在双字节模型中需要 388 个关键流,在四字节模型中需要 279 个关键流,才能确定实施状态恢复攻击的目标故障位置。本研究中提出的宽松故障攻击模型在实施上更加实用;因此,本研究的结果改进了现有研究,缩小了目前在 Grain128-AEAD 故障攻击模型方面的研究差距。为保持术语的一致性,摘要和正文中的 "Grain-128AEAD "均已修改为 "Grain128-AEAD"。请确认这一修改。
{"title":"Improved differential fault analysis of Grain128-AEAD","authors":"Tianyu Fang, Iftekhar Salam, Wei‐Chuen Yau","doi":"10.20517/jsss.2023.42","DOIUrl":"https://doi.org/10.20517/jsss.2023.42","url":null,"abstract":"The number of smart devices connected to the Internet has been constantly increasing, and as a result, lightweight cryptography (LWC) has become more important in the past decade. The Lightweight Cryptography (LWC) Project is an initiative taken by the National Institute of Standards and Technology (NIST) to standardize such LWC algorithms. Grain128-AEAD, which was submitted to the NIST LWC project, is an encryption algorithm that provides both confidentiality and integrity assurance. Third-party security analysis of the submitted ciphers is an important aspect of the evaluation of the submission to the NIST LWC project. Although several pieces of existing research, such as the bit-flipping attack, random fault attack, and deterministic random fault attack, have examined the security of Grain128-AEAD, there is still room for improvement in the fault attack models of these studies. This work aims to fill this research gap by analyzing the security margin of Grain128-AEAD against a series of improved differential fault attacks. In this study, we developed a probabilistic random fault attack and applied it to Grain128-AEAD. As an improvement of the existing research, a probabilistic approach can be applied to a more relaxed moderate control attack model. The existing moderate control model assumes the fault to be injected within any bit of a given byte, whereas the faults in our improved approach can be injected within any bits of a two-byte/four-byte segment, thereby relaxing the fault precision. The results indicate that the improved moderate control requires 388 keystreams for the two-byte model and 279 for the four-byte model to identify the target fault locations for implementing a state recovery attack. The relaxed fault attack models presented in this work are more practical to implement; hence, the findings of this research have improved the existing studies and narrowed the current research gap on the fault attack models of Grain128-AEAD. % To maintain consistency in terminology, \"Grain-128AEAD\" has been revised to \"Grain128-AEAD\" in both the abstract and the main text. Please confirm this revision.","PeriodicalId":509397,"journal":{"name":"Journal of Surveillance, Security and Safety","volume":"2 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140362588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on wireless-communication vulnerabilities of ERTMS in the railway sector 关于铁路部门 ERTMS 无线通信漏洞的调查
Pub Date : 2024-02-25 DOI: 10.20517/jsss.2023.35
G. Gaggero, Mario Marchese, Paola Girdinio
Railways represent a critical infrastructure in modern societies. In the past few years, cyber attacks on these infrastructures have been rising, and there is a need to properly analyze the vulnerabilities of field devices. This work focuses on the wireless communication that is defined in the European Rail Traffic Management System standard and proposes a survey of the vulnerabilities of the main employed protocols. Also, it provides some research lines. This study shows how several issues still exist within wireless communication in the railway sector.
铁路是现代社会的重要基础设施。在过去几年中,针对这些基础设施的网络攻击不断增加,因此有必要对现场设备的漏洞进行适当分析。这项工作的重点是欧洲铁路交通管理系统标准中定义的无线通信,并对主要使用协议的漏洞进行了调查。此外,它还提供了一些研究思路。这项研究表明,在铁路领域的无线通信中仍然存在一些问题。
{"title":"A survey on wireless-communication vulnerabilities of ERTMS in the railway sector","authors":"G. Gaggero, Mario Marchese, Paola Girdinio","doi":"10.20517/jsss.2023.35","DOIUrl":"https://doi.org/10.20517/jsss.2023.35","url":null,"abstract":"Railways represent a critical infrastructure in modern societies. In the past few years, cyber attacks on these infrastructures have been rising, and there is a need to properly analyze the vulnerabilities of field devices. This work focuses on the wireless communication that is defined in the European Rail Traffic Management System standard and proposes a survey of the vulnerabilities of the main employed protocols. Also, it provides some research lines. This study shows how several issues still exist within wireless communication in the railway sector.","PeriodicalId":509397,"journal":{"name":"Journal of Surveillance, Security and Safety","volume":"21 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140433012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A TPRF-based pseudo-random number generator 基于 TPRF 的伪随机数生成器
Pub Date : 2024-01-28 DOI: 10.20517/jsss.2023.45
Elena Andreeva, Andreas Weninger
Most cryptographic applications use randomness that is generated by pseudo-random number generators (PRNGs). A popular PRNG practical choice is the NIST standardized $$ rm{CTR_DRBG}$$ . In their recent ACNS 2023 publication, Andreeva and Weninger proposed a new and more efficient and secure PRNG called $$ mathtt{FCRNG}$$ . $$ mathtt{FCRNG}$$ is based on $$ rm{CTR_DRBG}$$ and uses the $$ n $$ -to-$$ 2n $$ forkcipher expanding primitive ForkSkinny as a building block. In this work, we create a new BKRNG PRNG, which is based on $$ mathtt{FCRNG}$$ and employs the novel $$ n $$ -to-$$ 8n $$ expanding primitive Butterknife. Butterknife is based on the Deoxys tweakable blockcipher (and thus AES) and realizes a tweakable expanding pseudo-random function. While both blockciphers and forkciphers are invertible primitives, tweakable expanding pseudo-random functions are not. This functional simplification enables security benefits for BKRNG in the robustness security game - the standard security goal for a PRNG. Contrary to the security bound of $$ rm{CTR_DRBG}$$ , we show that the security of our BKRNG construction does not degrade with the length of the random inputs, nor the number of requested output pseudo-random bits. We also empirically verify the BKRNG security with the NIST PRNG test suite and the TestU01 suite. Furthermore, we show the $$ n $$ -to-$$ 8n $$ multi-branch expanding nature of Butterknife contributes to a significant speed-up in the efficiency of BKRNG compared to $$ mathtt{FCRNG}$$ . More concretely, producing random bits with BKRNG is 30.0% faster than $$ mathtt{FCRNG}$$ and 49.2% faster than $$ rm{CTR_DRBG}$$ .
大多数加密应用都使用由伪随机数发生器(PRNG)生成的随机性。在最近发表的 ACNS 2023 中,Andreeva 和 Weninger 提出了一种名为 $$ mathtt{FCRNG}$ 的更高效、更安全的新型 PRNG。mathtt{FCRNG}$$ 基于 rm{CTR_DRBG}$$ 并使用 $$ n $ -to $$ 2n $ forkcipher 扩展基元 ForkSkinny 作为构建模块。在这项工作中,我们创建了一种新的 BKRNG PRNG,它基于 $$ mathtt{FCRNG}$$,并采用了新颖的 $$ n $ -to-$$ 8n $ 扩展基元 Butterknife。Butterknife 基于 Deoxys 可调整块密码(以及 AES),实现了可调整扩展伪随机函数。虽然分块密码器和叉密码器都是可逆基元,但可调整扩展伪随机函数却不是。这种功能简化使 BKRNG 在鲁棒性安全博弈中获得了安全优势--鲁棒性安全博弈是 PRNG 的标准安全目标。与 $$ rm{CTR_DRBG}$ 的安全边界相反,我们证明了我们的 BKRNG 结构的安全性不会随着随机输入的长度或所要求的输出伪随机比特的数量而降低。我们还通过 NIST PRNG 测试套件和 TestU01 套件验证了 BKRNG 的安全性。此外,我们还展示了 Butterknife 的 $$ n $ -to$ 8n $ 多分支扩展特性,与 $$ mathtt{FCRNG}$ 相比,BKRNG 的效率显著提高。更具体地说,使用 BKRNG 生成随机比特的速度比 $$ mathtt{FCRNG}$ 快 30.0%,比 $$ rm{CTR_DRBG}$ 快 49.2%。
{"title":"A TPRF-based pseudo-random number generator","authors":"Elena Andreeva, Andreas Weninger","doi":"10.20517/jsss.2023.45","DOIUrl":"https://doi.org/10.20517/jsss.2023.45","url":null,"abstract":"Most cryptographic applications use randomness that is generated by pseudo-random number generators (PRNGs). A popular PRNG practical choice is the NIST standardized $$ rm{CTR_DRBG}$$ . In their recent ACNS 2023 publication, Andreeva and Weninger proposed a new and more efficient and secure PRNG called $$ mathtt{FCRNG}$$ . $$ mathtt{FCRNG}$$ is based on $$ rm{CTR_DRBG}$$ and uses the $$ n $$ -to-$$ 2n $$ forkcipher expanding primitive ForkSkinny as a building block. In this work, we create a new BKRNG PRNG, which is based on $$ mathtt{FCRNG}$$ and employs the novel $$ n $$ -to-$$ 8n $$ expanding primitive Butterknife. Butterknife is based on the Deoxys tweakable blockcipher (and thus AES) and realizes a tweakable expanding pseudo-random function. While both blockciphers and forkciphers are invertible primitives, tweakable expanding pseudo-random functions are not. This functional simplification enables security benefits for BKRNG in the robustness security game - the standard security goal for a PRNG. Contrary to the security bound of $$ rm{CTR_DRBG}$$ , we show that the security of our BKRNG construction does not degrade with the length of the random inputs, nor the number of requested output pseudo-random bits. We also empirically verify the BKRNG security with the NIST PRNG test suite and the TestU01 suite.\u0000 Furthermore, we show the $$ n $$ -to-$$ 8n $$ multi-branch expanding nature of Butterknife contributes to a significant speed-up in the efficiency of BKRNG compared to $$ mathtt{FCRNG}$$ . More concretely, producing random bits with BKRNG is 30.0% faster than $$ mathtt{FCRNG}$$ and 49.2% faster than $$ rm{CTR_DRBG}$$ .","PeriodicalId":509397,"journal":{"name":"Journal of Surveillance, Security and Safety","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140491196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bias and fairness in software and automation tools in digital forensics 数字取证软件和自动化工具的偏见和公平性
Pub Date : 2024-01-26 DOI: 10.20517/jsss.2023.41
Razaq Jinad, Khushi Gupta, Ecem Simsek, Bing Zhou
The proliferation of software tools and automated techniques in digital forensics has brought about some controversies regarding bias and fairness. Different biases exist and have been proven in some civil and criminal cases. In our research, we analyze and discuss these biases present in software tools and automation systems used by law enforcement organizations and in court proceedings. Furthermore, we present real-life cases and scenarios where some of these biases have determined or influenced these cases. We were also able to provide recommendations for reducing bias in software tools, which we hope will be the foundation for a framework that reduces or eliminates bias from software tools used in digital forensics. In conclusion, we anticipate that this research can help increase validation in digital forensics software tools and ensure users' trust in the tools and automation techniques.
软件工具和自动化技术在数字取证领域的普及引发了一些关于偏见和公平性的争议。在一些民事和刑事案件中,存在并证明了不同的偏见。在我们的研究中,我们分析并讨论了执法机构和法庭程序中使用的软件工具和自动化系统中存在的这些偏见。此外,我们还介绍了现实生活中的案例和场景,其中一些偏见已经决定或影响了这些案件。我们还能够为减少软件工具中的偏见提供建议,希望这些建议能够成为减少或消除数字取证中所用软件工具偏见的框架的基础。总之,我们希望这项研究能有助于提高数字取证软件工具的验证,确保用户对工具和自动化技术的信任。
{"title":"Bias and fairness in software and automation tools in digital forensics","authors":"Razaq Jinad, Khushi Gupta, Ecem Simsek, Bing Zhou","doi":"10.20517/jsss.2023.41","DOIUrl":"https://doi.org/10.20517/jsss.2023.41","url":null,"abstract":"The proliferation of software tools and automated techniques in digital forensics has brought about some controversies regarding bias and fairness. Different biases exist and have been proven in some civil and criminal cases. In our research, we analyze and discuss these biases present in software tools and automation systems used by law enforcement organizations and in court proceedings. Furthermore, we present real-life cases and scenarios where some of these biases have determined or influenced these cases. We were also able to provide recommendations for reducing bias in software tools, which we hope will be the foundation for a framework that reduces or eliminates bias from software tools used in digital forensics. In conclusion, we anticipate that this research can help increase validation in digital forensics software tools and ensure users' trust in the tools and automation techniques.","PeriodicalId":509397,"journal":{"name":"Journal of Surveillance, Security and Safety","volume":"5 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140493344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preserving vertical distributed learning for health data 健康数据的隐私保护垂直分布式学习
Pub Date : 2024-01-01 DOI: 10.20517/jsss.2023.28
T. Islam, Noman Mohammed, Dima Alhadidi
Federated learning has become a pivotal tool in healthcare, enabling valuable insights to be gleaned from disparate datasets held by cautious data owners concerned about data privacy. This method involves the analysis of data from diverse locations, which is subsequently aggregated and trained on a central server. Data distribution can occur vertically or horizontally in this decentralized setup. In our approach, we employ a unique vertical partition learning process, segmenting data by characteristics or columns for each record across all local sites, known as Vertical Distributed Learning or features distributed machine learning. Our collaborative learning approach utilizes Stochastic Gradient Descent to collectively learn from each local site and compute the final result on a central server. Notably, during the training phase, no raw data or model parameters are exchanged; only local prediction results are shared and aggregated. Yet, sharing local prediction results raises privacy concerns, which we mitigate by introducing noise into the local results using a Differential Privacy algorithm. This paper introduces a robust vertical distributed learning system that emphasizes user privacy for healthcare data. To assess our approach, we conducted experiments using the sensitive healthcare data in the Medical Information Mart for Intensive Care-Ⅲ dataset and the publicly available Adult dataset. Our experimental results demonstrate that our approach achieves an accuracy level similar to that of a fully centralized model, significantly surpassing training based solely on local features. Consequently, our solution offers an effective federated learning approach for healthcare, preserving data locality and privacy while efficiently harnessing vertically partitioned data.
联合学习已成为医疗保健领域的一项重要工具,它能从数据所有者因担心数据隐私而谨慎持有的不同数据集中获取有价值的见解。这种方法涉及对来自不同地点的数据进行分析,然后在中央服务器上进行汇总和训练。在这种分散式设置中,数据分布可以是纵向的,也可以是横向的。在我们的方法中,我们采用了独特的垂直分区学习流程,对所有本地站点的每条记录按特征或列进行数据分割,这被称为垂直分布式学习或特征分布式机器学习。我们的协作学习方法利用随机梯度下降法对每个本地站点进行集体学习,并在中央服务器上计算最终结果。值得注意的是,在训练阶段,不交换原始数据或模型参数;只共享和汇总本地预测结果。然而,共享本地预测结果会引发隐私问题,我们通过使用差分隐私算法在本地结果中引入噪声来缓解这一问题。本文介绍了一种强调医疗保健数据用户隐私的稳健垂直分布式学习系统。为了评估我们的方法,我们使用重症监护医疗信息市场-Ⅲ数据集和公开的成人数据集中的敏感医疗数据进行了实验。实验结果表明,我们的方法达到了与完全集中式模型相似的准确率水平,大大超过了仅基于局部特征的训练。因此,我们的解决方案为医疗保健提供了一种有效的联合学习方法,在有效利用垂直分区数据的同时,保护了数据的本地性和隐私性。
{"title":"Privacy preserving vertical distributed learning for health data","authors":"T. Islam, Noman Mohammed, Dima Alhadidi","doi":"10.20517/jsss.2023.28","DOIUrl":"https://doi.org/10.20517/jsss.2023.28","url":null,"abstract":"Federated learning has become a pivotal tool in healthcare, enabling valuable insights to be gleaned from disparate datasets held by cautious data owners concerned about data privacy. This method involves the analysis of data from diverse locations, which is subsequently aggregated and trained on a central server. Data distribution can occur vertically or horizontally in this decentralized setup. In our approach, we employ a unique vertical partition learning process, segmenting data by characteristics or columns for each record across all local sites, known as Vertical Distributed Learning or features distributed machine learning. Our collaborative learning approach utilizes Stochastic Gradient Descent to collectively learn from each local site and compute the final result on a central server. Notably, during the training phase, no raw data or model parameters are exchanged; only local prediction results are shared and aggregated. Yet, sharing local prediction results raises privacy concerns, which we mitigate by introducing noise into the local results using a Differential Privacy algorithm. This paper introduces a robust vertical distributed learning system that emphasizes user privacy for healthcare data. To assess our approach, we conducted experiments using the sensitive healthcare data in the Medical Information Mart for Intensive Care-Ⅲ dataset and the publicly available Adult dataset. Our experimental results demonstrate that our approach achieves an accuracy level similar to that of a fully centralized model, significantly surpassing training based solely on local features. Consequently, our solution offers an effective federated learning approach for healthcare, preserving data locality and privacy while efficiently harnessing vertically partitioned data.","PeriodicalId":509397,"journal":{"name":"Journal of Surveillance, Security and Safety","volume":" 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139392292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Surveillance, Security and Safety
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1