首页 > 最新文献

ACM Computing Surveys (CSUR)最新文献

英文 中文
A Survey of Oblivious Transfer Protocol 无关传输协议综述
Pub Date : 2022-01-05 DOI: 10.1145/3503045
V. K. Yadav, Nitish Andola, S. Verma, S. Venkatesan
Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide range of applications such as secure multi-party computation, private information retrieval, private set intersection, contract signing, and privacy-preserving location-based services. The OT protocol has different variants such as one-out-of-2, one-out-of-n, k-out-of-n, and OT extension. In the OT (one-out-of-2, one-out-of-n, and OT extension) protocol, the sender has a set of messages, whereas the receiver has a key. The receiver sends that key to the sender in a secure way; the sender cannot get any information about the received key. The sender encrypts every message by operating on every message using the received key and sends all the encrypted messages to the receiver. The receiver is able to extract only the required message using his key. However, in the k-out-of-n OT protocol, the receiver sends a set of k keys to the sender, and in replay, the sender sends all the encrypted messages. The receiver uses his keys and extracts the required messages, but it cannot gain any information about the messages that it has not requested. Generally, the OT protocol requires high communication and computation cost if we transfer millions of oblivious messages. The OT extension protocol provides a solution for this, where the receiver transfers a set of keys to the sender by executing a few numbers of OT protocols. Then, the sender encrypts all the messages using cheap symmetric key cryptography with the help of a received set of keys and transfers millions of oblivious messages to the receiver. In this work, we present different variants of OT protocols such as one-out-of-2, one-out-of-n, k-out-of-n, and OT extension. Furthermore, we cover various aspects of theoretical security guarantees such as semi-honest and malicious adversaries, universally composable, used techniques, computation, and communication efficiency aspects. From the analysis, we found that the semi-honest adversary-based OT protocols required low communication and computation costs as compared to malicious adversary-based OT protocols.
遗忘传输(OT)协议是密码学中的一个重要工具,它提供了广泛的应用,如安全多方计算、私有信息检索、私有集合交叉、合同签署和基于位置的隐私保护服务。OT协议有不同的变体,如1 of-2、1 of-n、k of-n和OT扩展。在OT(1 / 2、1 / n和OT扩展)协议中,发送方拥有一组消息,而接收方拥有一个密钥。接收方以安全的方式将密钥发送给发送方;发送方无法获得有关所接收密钥的任何信息。发送方使用接收到的密钥对每条消息进行操作,从而对每条消息进行加密,并将所有加密消息发送给接收方。接收方只能使用其密钥提取所需的消息。然而,在k-out- n OT协议中,接收方向发送方发送一组k个密钥,在重播中,发送方发送所有加密消息。接收方使用他的密钥并提取所需的消息,但是它不能获得关于它没有请求的消息的任何信息。通常情况下,如果传输数百万条无关消息,OT协议需要很高的通信和计算成本。OT扩展协议为此提供了一种解决方案,其中接收方通过执行少量OT协议将一组密钥传输给发送方。然后,发送方借助接收到的一组密钥,使用便宜的对称密钥加密所有消息,并将数百万条无关消息传输给接收方。在这项工作中,我们提出了OT协议的不同变体,如1 -out- 2, 1 -out- n, k-out- n和OT扩展。此外,我们还涵盖了理论上安全保证的各个方面,例如半诚实和恶意对手,普遍可组合,使用的技术,计算和通信效率方面。从分析中,我们发现与基于恶意对手的OT协议相比,半诚实的基于对手的OT协议需要较低的通信和计算成本。
{"title":"A Survey of Oblivious Transfer Protocol","authors":"V. K. Yadav, Nitish Andola, S. Verma, S. Venkatesan","doi":"10.1145/3503045","DOIUrl":"https://doi.org/10.1145/3503045","url":null,"abstract":"Oblivious transfer (OT) protocol is an essential tool in cryptography that provides a wide range of applications such as secure multi-party computation, private information retrieval, private set intersection, contract signing, and privacy-preserving location-based services. The OT protocol has different variants such as one-out-of-2, one-out-of-n, k-out-of-n, and OT extension. In the OT (one-out-of-2, one-out-of-n, and OT extension) protocol, the sender has a set of messages, whereas the receiver has a key. The receiver sends that key to the sender in a secure way; the sender cannot get any information about the received key. The sender encrypts every message by operating on every message using the received key and sends all the encrypted messages to the receiver. The receiver is able to extract only the required message using his key. However, in the k-out-of-n OT protocol, the receiver sends a set of k keys to the sender, and in replay, the sender sends all the encrypted messages. The receiver uses his keys and extracts the required messages, but it cannot gain any information about the messages that it has not requested. Generally, the OT protocol requires high communication and computation cost if we transfer millions of oblivious messages. The OT extension protocol provides a solution for this, where the receiver transfers a set of keys to the sender by executing a few numbers of OT protocols. Then, the sender encrypts all the messages using cheap symmetric key cryptography with the help of a received set of keys and transfers millions of oblivious messages to the receiver. In this work, we present different variants of OT protocols such as one-out-of-2, one-out-of-n, k-out-of-n, and OT extension. Furthermore, we cover various aspects of theoretical security guarantees such as semi-honest and malicious adversaries, universally composable, used techniques, computation, and communication efficiency aspects. From the analysis, we found that the semi-honest adversary-based OT protocols required low communication and computation costs as compared to malicious adversary-based OT protocols.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"149 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81497327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Serverless Computing Survey: A Technical Primer for Design Architecture 无服务器计算调查:设计体系结构的技术入门
Pub Date : 2021-12-24 DOI: 10.1145/3508360
Zijun Li, Linsong Guo, Jiagan Cheng, Quan Chen, Bingsheng He, M. Guo
The development of cloud infrastructures inspires the emergence of cloud-native computing. As the most promising architecture for deploying microservices, serverless computing has recently attracted more and more attention in both industry and academia. Due to its inherent scalability and flexibility, serverless computing becomes attractive and more pervasive for ever-growing Internet services. Despite the momentum in the cloud-native community, the existing challenges and compromises still wait for more advanced research and solutions to further explore the potential of the serverless computing model. As a contribution to this knowledge, this article surveys and elaborates the research domains in the serverless context by decoupling the architecture into four stack layers: Virtualization, Encapsule, System Orchestration, and System Coordination. Inspired by the security model, we highlight the key implications and limitations of these works in each layer, and make suggestions for potential challenges to the field of future serverless computing.
云基础设施的发展激发了云原生计算的出现。无服务器计算作为部署微服务最有前途的架构,近年来越来越受到业界和学术界的关注。由于其固有的可伸缩性和灵活性,无服务器计算对于不断增长的Internet服务变得越来越有吸引力和普及。尽管云原生社区势头强劲,但现有的挑战和妥协仍然需要更先进的研究和解决方案来进一步探索无服务器计算模型的潜力。作为对这方面知识的贡献,本文通过将体系结构解耦为四个堆栈层:虚拟化、封装、系统编排和系统协调,调查并详细阐述了无服务器上下文中的研究领域。受安全模型的启发,我们在每一层强调了这些工作的关键含义和局限性,并对未来无服务器计算领域的潜在挑战提出了建议。
{"title":"The Serverless Computing Survey: A Technical Primer for Design Architecture","authors":"Zijun Li, Linsong Guo, Jiagan Cheng, Quan Chen, Bingsheng He, M. Guo","doi":"10.1145/3508360","DOIUrl":"https://doi.org/10.1145/3508360","url":null,"abstract":"The development of cloud infrastructures inspires the emergence of cloud-native computing. As the most promising architecture for deploying microservices, serverless computing has recently attracted more and more attention in both industry and academia. Due to its inherent scalability and flexibility, serverless computing becomes attractive and more pervasive for ever-growing Internet services. Despite the momentum in the cloud-native community, the existing challenges and compromises still wait for more advanced research and solutions to further explore the potential of the serverless computing model. As a contribution to this knowledge, this article surveys and elaborates the research domains in the serverless context by decoupling the architecture into four stack layers: Virtualization, Encapsule, System Orchestration, and System Coordination. Inspired by the security model, we highlight the key implications and limitations of these works in each layer, and make suggestions for potential challenges to the field of future serverless computing.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"7 1","pages":"1 - 34"},"PeriodicalIF":0.0,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74769668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
BFT in Blockchains: From Protocols to Use Cases 区块链中的BFT:从协议到用例
Pub Date : 2021-12-22 DOI: 10.1145/3503042
Xin Wang, Sisi Duan, James R. Clavin, Haibin Zhang
A blockchain is a distributed system that achieves strong security guarantees in storing, managing, and processing data. All blockchains achieve a common goal: building a decentralized system that provides a trustworthy service in an untrustworthy environment. A blockchain builds a Byzantine fault-tolerant (BFT) system in which decentralized nodes run a protocol to reach an agreement on the common system state. In this article, we focus on the research of BFT protocols. In particular, we categorize BFT protocols according to both the system models and workflow. We seek to answer these important questions: How has the research in BFT evolved in the past four decades, especially with the rise of blockchains? What are the driven needs for BFT research in the future?
区块链是一个分布式系统,在存储、管理和处理数据方面实现了强大的安全保障。所有区块链都实现了一个共同的目标:建立一个去中心化的系统,在一个不可信的环境中提供可信的服务。区块链构建了一个拜占庭式容错(BFT)系统,在这个系统中,分散的节点运行一个协议,就共同的系统状态达成一致。本文主要对BFT协议进行了研究。特别地,我们根据系统模型和工作流对BFT协议进行了分类。我们试图回答这些重要的问题:在过去的四十年里,尤其是随着区块链的兴起,BFT的研究是如何发展的?未来对BFT研究的驱动需求是什么?
{"title":"BFT in Blockchains: From Protocols to Use Cases","authors":"Xin Wang, Sisi Duan, James R. Clavin, Haibin Zhang","doi":"10.1145/3503042","DOIUrl":"https://doi.org/10.1145/3503042","url":null,"abstract":"A blockchain is a distributed system that achieves strong security guarantees in storing, managing, and processing data. All blockchains achieve a common goal: building a decentralized system that provides a trustworthy service in an untrustworthy environment. A blockchain builds a Byzantine fault-tolerant (BFT) system in which decentralized nodes run a protocol to reach an agreement on the common system state. In this article, we focus on the research of BFT protocols. In particular, we categorize BFT protocols according to both the system models and workflow. We seek to answer these important questions: How has the research in BFT evolved in the past four decades, especially with the rise of blockchains? What are the driven needs for BFT research in the future?","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"24 1","pages":"1 - 37"},"PeriodicalIF":0.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73048013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Survey on Perfectly Secure Verifiable Secret-sharing 完全安全可验证秘密共享研究综述
Pub Date : 2021-12-21 DOI: 10.1145/3512344
Anirudh Chandramouli, Ashish Choudhury, A. Patra
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly secure VSS schemes in three different communication settings, namely, synchronous, asynchronous, and hybrid setting and provide full details of the existing schemes in these settings. The aim of this survey is to provide a clear knowledge and foundation to researchers who are interested in knowing and extending the state-of-the-art perfectly secure VSS schemes.
可验证秘密共享(VSS)是安全分布式计算的基本原理。它被用作若干分布式计算任务的构建块,例如拜占庭协议和安全多方计算。在本文中,我们考虑具有完美安全性的VSS方案,可以容忍计算无界的对手。我们在同步、异步和混合三种不同的通信设置下全面调查了现有的完全安全的VSS方案,并提供了这些设置下现有方案的全部细节。这项调查的目的是提供一个明确的知识和基础,研究人员有兴趣了解和扩展国家的最先进的完全安全的VSS计划。
{"title":"A Survey on Perfectly Secure Verifiable Secret-sharing","authors":"Anirudh Chandramouli, Ashish Choudhury, A. Patra","doi":"10.1145/3512344","DOIUrl":"https://doi.org/10.1145/3512344","url":null,"abstract":"Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly secure VSS schemes in three different communication settings, namely, synchronous, asynchronous, and hybrid setting and provide full details of the existing schemes in these settings. The aim of this survey is to provide a clear knowledge and foundation to researchers who are interested in knowing and extending the state-of-the-art perfectly secure VSS schemes.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"24 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74988920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Unified Perspective for Disinformation Detection and Truth Discovery in Social Sensing: A Survey 社会感知中虚假信息检测与真相发现的统一视角:综述
Pub Date : 2021-11-23 DOI: 10.1145/3477138
Fan Xu, V. Sheng, Mingwen Wang
With the proliferation of social sensing, large amounts of observation are contributed by people or devices. However, these observations contain disinformation. Disinformation can propagate across online social networks at a relatively low cost, but result in a series of major problems in our society. In this survey, we provide a comprehensive overview of disinformation and truth discovery in social sensing under a unified perspective, including basic concepts and the taxonomy of existing methodologies. Furthermore, we summarize the mechanism of disinformation from four different perspectives (i.e., text only, text with image/multi-modal, text with propagation, and fusion models). In addition, we review existing solutions based on these requirements and compare their pros and cons and give a sort of guide to usage based on a detailed lesson learned. To facilitate future studies in this field, we summarize related publicly accessible real-world data sets and open source codes. Last but the most important, we emphasize potential future research topics and challenges in this domain through a deep analysis of most recent methods.
随着社会传感的普及,大量的观测是由人或设备贡献的。然而,这些观察含有虚假信息。虚假信息可以以相对较低的成本在网络社交网络上传播,但却给我们的社会带来了一系列重大问题。在本调查中,我们从一个统一的角度对社会感知中的虚假信息和真相发现进行了全面的概述,包括基本概念和现有方法的分类。此外,我们从四个不同的角度(即纯文本、带有图像/多模态的文本、带有传播模型的文本和融合模型)总结了虚假信息的机制。此外,我们将根据这些需求回顾现有的解决方案,比较它们的优缺点,并根据所获得的详细经验给出一种使用指南。为了促进这一领域的未来研究,我们总结了相关的可公开访问的真实世界数据集和开源代码。最后但最重要的是,我们通过对最新方法的深入分析,强调了该领域潜在的未来研究主题和挑战。
{"title":"A Unified Perspective for Disinformation Detection and Truth Discovery in Social Sensing: A Survey","authors":"Fan Xu, V. Sheng, Mingwen Wang","doi":"10.1145/3477138","DOIUrl":"https://doi.org/10.1145/3477138","url":null,"abstract":"With the proliferation of social sensing, large amounts of observation are contributed by people or devices. However, these observations contain disinformation. Disinformation can propagate across online social networks at a relatively low cost, but result in a series of major problems in our society. In this survey, we provide a comprehensive overview of disinformation and truth discovery in social sensing under a unified perspective, including basic concepts and the taxonomy of existing methodologies. Furthermore, we summarize the mechanism of disinformation from four different perspectives (i.e., text only, text with image/multi-modal, text with propagation, and fusion models). In addition, we review existing solutions based on these requirements and compare their pros and cons and give a sort of guide to usage based on a detailed lesson learned. To facilitate future studies in this field, we summarize related publicly accessible real-world data sets and open source codes. Last but the most important, we emphasize potential future research topics and challenges in this domain through a deep analysis of most recent methods.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"1 1","pages":"1 - 33"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73302991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking 实用有效的动态信息流跟踪的挑战与机遇
Pub Date : 2021-11-23 DOI: 10.1145/3483790
Christopher Brant, P. Shrestha, Ben Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira
Information flow tracking was proposed more than 40 years ago to address the limitations of access control mechanisms to guarantee the confidentiality and integrity of information flowing within a system, but has not yet been widely applied in practice for security solutions. Here, we survey and systematize literature on dynamic information flow tracking (DIFT) to discover challenges and opportunities to make it practical and effective for security solutions. We focus on common knowledge in the literature and lingering research gaps from two dimensions— (i) the layer of abstraction where DIFT is implemented (software, software/hardware, or hardware) and (ii) the security goal (confidentiality and/or integrity). We observe that two major limitations hinder the practical application of DIFT for on-the-fly security applications: (i) high implementation overhead and (ii) incomplete information flow tracking (low accuracy). We posit, after review of the literature, that addressing these major impedances via hardware parallelism can potentially unleash DIFT’s great potential for systems security, as it can allow security policies to be implemented in a built-in and standardized fashion. Furthermore, we provide recommendations for the next generation of practical and efficient DIFT systems with an eye towards hardware-supported implementations.
信息流跟踪是在40多年前提出的,旨在解决访问控制机制的局限性,以保证系统内流动的信息的保密性和完整性,但尚未在实践中广泛应用于安全解决方案。在这里,我们对动态信息流跟踪(DIFT)的文献进行了调查和系统化,以发现挑战和机会,使其成为安全解决方案的实用和有效。我们从两个维度关注文献中的常识和遗留的研究差距- (i)实现DIFT的抽象层(软件,软件/硬件或硬件)和(ii)安全目标(机密性和/或完整性)。我们观察到两个主要的限制阻碍了DIFT在动态安全应用中的实际应用:(i)高实现开销和(ii)不完整的信息流跟踪(低准确性)。在回顾文献之后,我们假设,通过硬件并行解决这些主要的阻抗可以潜在地释放DIFT对系统安全性的巨大潜力,因为它可以允许以内置和标准化的方式实现安全策略。此外,我们为下一代实用高效的DIFT系统提供了建议,并着眼于硬件支持的实现。
{"title":"Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking","authors":"Christopher Brant, P. Shrestha, Ben Mixon-Baca, Kejun Chen, Said Varlioglu, Nelly Elsayed, Yier Jin, Jedidiah R. Crandall, Daniela Oliveira","doi":"10.1145/3483790","DOIUrl":"https://doi.org/10.1145/3483790","url":null,"abstract":"Information flow tracking was proposed more than 40 years ago to address the limitations of access control mechanisms to guarantee the confidentiality and integrity of information flowing within a system, but has not yet been widely applied in practice for security solutions. Here, we survey and systematize literature on dynamic information flow tracking (DIFT) to discover challenges and opportunities to make it practical and effective for security solutions. We focus on common knowledge in the literature and lingering research gaps from two dimensions— (i) the layer of abstraction where DIFT is implemented (software, software/hardware, or hardware) and (ii) the security goal (confidentiality and/or integrity). We observe that two major limitations hinder the practical application of DIFT for on-the-fly security applications: (i) high implementation overhead and (ii) incomplete information flow tracking (low accuracy). We posit, after review of the literature, that addressing these major impedances via hardware parallelism can potentially unleash DIFT’s great potential for systems security, as it can allow security policies to be implemented in a built-in and standardized fashion. Furthermore, we provide recommendations for the next generation of practical and efficient DIFT systems with an eye towards hardware-supported implementations.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"5 1","pages":"1 - 33"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87728963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions 工业物联网互操作性综合调查:分类、标准和未来方向
Pub Date : 2021-11-23 DOI: 10.1145/3485130
A. Hazra, Mainak Adhikari, Tarachand Amgoth, S. Srirama
In the era of Industry 4.0, the Internet-of-Things (IoT) performs the driving position analogous to the initial industrial metamorphosis. IoT affords the potential to couple machine-to-machine intercommunication and real-time information-gathering within the industry domain. Hence, the enactment of IoT in the industry magnifies effective optimization, authority, and data-driven judgment. However, this field undergoes several interoperable issues, including large numbers of heterogeneous IoT gadgets, tools, software, sensing, and processing components, joining through the Internet, despite the deficiency of communication protocols and standards. Recently, various interoperable protocols, platforms, standards, and technologies are enhanced and altered according to the specifications of the applicability in industrial applications. However, there are no recent survey papers that primarily examine various interoperability issues that Industrial IoT (IIoT) faces. In this review, we investigate the conventional and recent developments of relevant state-of-the-art IIoT technologies, frameworks, and solutions for facilitating interoperability between different IIoT components. We also discuss several interoperable IIoT standards, protocols, and models for digitizing the industrial revolution. Finally, we conclude this survey with an inherent discussion of open challenges and directions for future research.
在工业4.0时代,物联网(IoT)扮演着类似于最初工业蜕变的驱动角色。物联网提供了在工业领域内耦合机器对机器的互连和实时信息收集的潜力。因此,物联网在行业中的实施放大了有效的优化、权威和数据驱动的判断。然而,该领域经历了几个可互操作的问题,包括大量异构物联网设备、工具、软件、传感和处理组件,尽管缺乏通信协议和标准,但通过互联网连接。近年来,各种可互操作的协议、平台、标准和技术根据工业应用的适用性规范进行了增强和修改。然而,最近没有调查论文主要研究工业物联网(IIoT)面临的各种互操作性问题。在这篇综述中,我们研究了用于促进不同工业物联网组件之间互操作性的相关最先进工业物联网技术、框架和解决方案的传统和最新发展。我们还讨论了数字化工业革命的几种可互操作的工业物联网标准、协议和模型。最后,我们对未来研究的挑战和方向进行了固有的讨论。
{"title":"A Comprehensive Survey on Interoperability for IIoT: Taxonomy, Standards, and Future Directions","authors":"A. Hazra, Mainak Adhikari, Tarachand Amgoth, S. Srirama","doi":"10.1145/3485130","DOIUrl":"https://doi.org/10.1145/3485130","url":null,"abstract":"In the era of Industry 4.0, the Internet-of-Things (IoT) performs the driving position analogous to the initial industrial metamorphosis. IoT affords the potential to couple machine-to-machine intercommunication and real-time information-gathering within the industry domain. Hence, the enactment of IoT in the industry magnifies effective optimization, authority, and data-driven judgment. However, this field undergoes several interoperable issues, including large numbers of heterogeneous IoT gadgets, tools, software, sensing, and processing components, joining through the Internet, despite the deficiency of communication protocols and standards. Recently, various interoperable protocols, platforms, standards, and technologies are enhanced and altered according to the specifications of the applicability in industrial applications. However, there are no recent survey papers that primarily examine various interoperability issues that Industrial IoT (IIoT) faces. In this review, we investigate the conventional and recent developments of relevant state-of-the-art IIoT technologies, frameworks, and solutions for facilitating interoperability between different IIoT components. We also discuss several interoperable IIoT standards, protocols, and models for digitizing the industrial revolution. Finally, we conclude this survey with an inherent discussion of open challenges and directions for future research.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"69 1","pages":"1 - 35"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84071865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
A Comprehensive Taxonomy of Dynamic Texture Representation 动态纹理表示的综合分类
Pub Date : 2021-11-23 DOI: 10.1145/3487892
Thanh Tuan Nguyen, T. Nguyen
Representing dynamic textures (DTs) plays an important role in many real implementations in the computer vision community. Due to the turbulent and non-directional motions of DTs along with the negative impacts of different factors (e.g., environmental changes, noise, illumination, etc.), efficiently analyzing DTs has raised considerable challenges for the state-of-the-art approaches. For 20 years, many different techniques have been introduced to handle the above well-known issues for enhancing the performance. Those methods have shown valuable contributions, but the problems have been incompletely dealt with, particularly recognizing DTs on large-scale datasets. In this article, we present a comprehensive taxonomy of DT representation in order to purposefully give a thorough overview of the existing methods along with overall evaluations of their obtained performances. Accordingly, we arrange the methods into six canonical categories. Each of them is then taken in a brief presentation of its principal methodology stream and various related variants. The effectiveness levels of the state-of-the-art methods are then investigated and thoroughly discussed with respect to quantitative and qualitative evaluations in classifying DTs on benchmark datasets. Finally, we point out several potential applications and the remaining challenges that should be addressed in further directions. In comparison with two existing shallow DT surveys (i.e., the first one is out of date as it was made in 2005, while the newer one (published in 2016) is an inadequate overview), we believe that our proposed comprehensive taxonomy not only provides a better view of DT representation for the target readers but also stimulates future research activities.
动态纹理表示在计算机视觉领域的许多实际实现中起着重要的作用。由于dt的湍流和非定向运动以及不同因素(例如环境变化,噪声,照明等)的负面影响,有效分析dt对最先进的方法提出了相当大的挑战。20年来,为了提高性能,已经引入了许多不同的技术来处理上述众所周知的问题。这些方法已经显示出有价值的贡献,但是问题还没有完全解决,特别是在大规模数据集上识别dt。在本文中,我们提出了DT表示的综合分类,以便有目的地对现有方法进行全面概述,并对其获得的性能进行全面评估。因此,我们将这些方法分为六个典型的类别。然后对它们中的每一个进行简要介绍,介绍其主要方法流和各种相关变体。然后,对最先进的方法的有效性水平进行调查,并就基准数据集上对dt进行分类的定量和定性评估进行彻底讨论。最后,我们指出了几个潜在的应用和应该在进一步的方向上解决的剩余挑战。与现有的两个浅DT调查(即,第一个调查于2005年发布,已经过时,而较新的调查(2016年发布)是一个不充分的概述)相比,我们认为我们提出的综合分类不仅为目标读者提供了更好的DT表示视图,而且还激发了未来的研究活动。
{"title":"A Comprehensive Taxonomy of Dynamic Texture Representation","authors":"Thanh Tuan Nguyen, T. Nguyen","doi":"10.1145/3487892","DOIUrl":"https://doi.org/10.1145/3487892","url":null,"abstract":"Representing dynamic textures (DTs) plays an important role in many real implementations in the computer vision community. Due to the turbulent and non-directional motions of DTs along with the negative impacts of different factors (e.g., environmental changes, noise, illumination, etc.), efficiently analyzing DTs has raised considerable challenges for the state-of-the-art approaches. For 20 years, many different techniques have been introduced to handle the above well-known issues for enhancing the performance. Those methods have shown valuable contributions, but the problems have been incompletely dealt with, particularly recognizing DTs on large-scale datasets. In this article, we present a comprehensive taxonomy of DT representation in order to purposefully give a thorough overview of the existing methods along with overall evaluations of their obtained performances. Accordingly, we arrange the methods into six canonical categories. Each of them is then taken in a brief presentation of its principal methodology stream and various related variants. The effectiveness levels of the state-of-the-art methods are then investigated and thoroughly discussed with respect to quantitative and qualitative evaluations in classifying DTs on benchmark datasets. Finally, we point out several potential applications and the remaining challenges that should be addressed in further directions. In comparison with two existing shallow DT surveys (i.e., the first one is out of date as it was made in 2005, while the newer one (published in 2016) is an inadequate overview), we believe that our proposed comprehensive taxonomy not only provides a better view of DT representation for the target readers but also stimulates future research activities.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"11 6","pages":"1 - 39"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91438395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Artificial Intelligence Security: Threats and Countermeasures 人工智能安全:威胁与对策
Pub Date : 2021-11-23 DOI: 10.1145/3487890
Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wei Li, Kuan-Ching Li
In recent years, with rapid technological advancement in both computing hardware and algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human being in a wide range of fields, such as image recognition, education, autonomous vehicles, finance, and medical diagnosis. However, AI-based systems are generally vulnerable to various security threats throughout the whole process, ranging from the initial data collection and preparation to the training, inference, and final deployment. In an AI-based system, the data collection and pre-processing phase are vulnerable to sensor spoofing attacks and scaling attacks, respectively, while the training and inference phases of the model are subject to poisoning attacks and adversarial attacks, respectively. To address these severe security threats against the AI-based systems, in this article, we review the challenges and recent research advances for security issues in AI, so as to depict an overall blueprint for AI security. More specifically, we first take the lifecycle of an AI-based system as a guide to introduce the security threats that emerge at each stage, which is followed by a detailed summary for corresponding countermeasures. Finally, some of the future challenges and opportunities for the security issues in AI will also be discussed.
近年来,随着计算硬件和算法的快速发展,人工智能(AI)在图像识别、教育、自动驾驶汽车、金融、医疗诊断等广泛领域显示出对人类的显著优势。然而,从最初的数据收集和准备到训练、推理和最终部署,基于ai的系统在整个过程中通常容易受到各种安全威胁。在基于人工智能的系统中,数据收集和预处理阶段分别容易受到传感器欺骗攻击和缩放攻击,而模型的训练和推理阶段分别容易受到投毒攻击和对抗性攻击。为了解决这些针对基于人工智能系统的严重安全威胁,本文回顾了人工智能安全问题的挑战和最新研究进展,从而描绘了人工智能安全的总体蓝图。更具体地说,我们首先以基于人工智能的系统的生命周期为指导,介绍在每个阶段出现的安全威胁,然后详细总结相应的对策。最后,还将讨论人工智能安全问题的一些未来挑战和机遇。
{"title":"Artificial Intelligence Security: Threats and Countermeasures","authors":"Yupeng Hu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wei Li, Kuan-Ching Li","doi":"10.1145/3487890","DOIUrl":"https://doi.org/10.1145/3487890","url":null,"abstract":"In recent years, with rapid technological advancement in both computing hardware and algorithm, Artificial Intelligence (AI) has demonstrated significant advantage over human being in a wide range of fields, such as image recognition, education, autonomous vehicles, finance, and medical diagnosis. However, AI-based systems are generally vulnerable to various security threats throughout the whole process, ranging from the initial data collection and preparation to the training, inference, and final deployment. In an AI-based system, the data collection and pre-processing phase are vulnerable to sensor spoofing attacks and scaling attacks, respectively, while the training and inference phases of the model are subject to poisoning attacks and adversarial attacks, respectively. To address these severe security threats against the AI-based systems, in this article, we review the challenges and recent research advances for security issues in AI, so as to depict an overall blueprint for AI security. More specifically, we first take the lifecycle of an AI-based system as a guide to introduce the security threats that emerge at each stage, which is followed by a detailed summary for corresponding countermeasures. Finally, some of the future challenges and opportunities for the security issues in AI will also be discussed.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"37 1","pages":"1 - 36"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76496468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Survey on Privacy Preservation in Fog-Enabled Internet of Things 基于雾的物联网隐私保护研究
Pub Date : 2021-11-23 DOI: 10.1145/3474554
Kinza Sarwar, Sira Yongchareon, Jian Yu, S. Rehman
Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical challenges that need to be addressed before the full adoption of the IoT. Data privacy is one of the hurdles towards the adoption of IoT as there might be potential misuse of users’ data and their identity in IoT applications. Several researchers have proposed different approaches to reduce privacy risks. However, most of the existing solutions still suffer from various drawbacks, such as huge bandwidth utilization and network latency, heavyweight cryptosystems, and policies that are applied on sensor devices and in the cloud. To address these issues, fog computing has been introduced for IoT network edges providing low latency, computation, and storage services. In this survey, we comprehensively review and classify privacy requirements for an in-depth understanding of privacy implications in IoT applications. Based on the classification, we highlight ongoing research efforts and limitations of the existing privacy-preservation techniques and map the existing IoT schemes with Fog-enabled IoT schemes to elaborate on the benefits and improvements that Fog-enabled IoT can bring to preserve data privacy in IoT applications. Lastly, we enumerate key research challenges and point out future research directions.
尽管物联网(IoT)发展迅速,但在全面采用物联网之前,仍有一些关键挑战需要解决。数据隐私是采用物联网的障碍之一,因为在物联网应用中可能存在滥用用户数据及其身份的潜在问题。几位研究人员提出了不同的方法来降低隐私风险。然而,大多数现有解决方案仍然存在各种缺点,例如巨大的带宽利用率和网络延迟、重量级密码系统以及应用于传感器设备和云中的策略。为了解决这些问题,在物联网网络边缘引入了雾计算,提供低延迟、计算和存储服务。在本调查中,我们全面审查和分类隐私需求,以深入了解物联网应用中的隐私影响。基于分类,我们强调了正在进行的研究工作和现有隐私保护技术的局限性,并将现有的物联网方案与支持fog的物联网方案进行了映射,以详细说明支持fog的物联网可以为保护物联网应用中的数据隐私带来的好处和改进。最后,我们列举了关键的研究挑战,并指出了未来的研究方向。
{"title":"A Survey on Privacy Preservation in Fog-Enabled Internet of Things","authors":"Kinza Sarwar, Sira Yongchareon, Jian Yu, S. Rehman","doi":"10.1145/3474554","DOIUrl":"https://doi.org/10.1145/3474554","url":null,"abstract":"Despite the rapid growth and advancement in the Internet of Things (IoT), there are critical challenges that need to be addressed before the full adoption of the IoT. Data privacy is one of the hurdles towards the adoption of IoT as there might be potential misuse of users’ data and their identity in IoT applications. Several researchers have proposed different approaches to reduce privacy risks. However, most of the existing solutions still suffer from various drawbacks, such as huge bandwidth utilization and network latency, heavyweight cryptosystems, and policies that are applied on sensor devices and in the cloud. To address these issues, fog computing has been introduced for IoT network edges providing low latency, computation, and storage services. In this survey, we comprehensively review and classify privacy requirements for an in-depth understanding of privacy implications in IoT applications. Based on the classification, we highlight ongoing research efforts and limitations of the existing privacy-preservation techniques and map the existing IoT schemes with Fog-enabled IoT schemes to elaborate on the benefits and improvements that Fog-enabled IoT can bring to preserve data privacy in IoT applications. Lastly, we enumerate key research challenges and point out future research directions.","PeriodicalId":7000,"journal":{"name":"ACM Computing Surveys (CSUR)","volume":"151 1","pages":"1 - 39"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89232286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
ACM Computing Surveys (CSUR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1