Verifiable data mining against malicious adversaries in industrial internet of things

With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely...

全面介紹

Saved in:
書目詳細資料
Main Authors: MA, Zhuoran, MA, Jianfeng, MIAO, Yinbin, LIU, Ximeng, CHOO, Kim-Kwang Raymond, GAO, Yu, DENG, Robert H.
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2022
主題:
在線閱讀:https://ink.library.smu.edu.sg/sis_research/7243
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Singapore Management University
語言: English
id sg-smu-ink.sis_research-8246
record_format dspace
spelling sg-smu-ink.sis_research-82462022-09-02T06:16:53Z Verifiable data mining against malicious adversaries in industrial internet of things MA, Zhuoran MA, Jianfeng MIAO, Yinbin LIU, Ximeng CHOO, Kim-Kwang Raymond GAO, Yu DENG, Robert H. With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely mining IIoT data, however, the openness of security-critical IIoT becomes challenging in terms of unbearable privacy issues. Most existing privacy-preserving data mining (PPDM) techniques are designed to resist honest-but-curious adversaries (i.e., cloud servers and data users). Due to the complexity and openness in IIoT, PPDM is significantly difficult with the presence of malicious adversaries in IIoT who may incur incorrect learned models and inference results. To solve the aforementioned issues, we propose a framework to extend existing PPDM to guard linear regression against malicious behaviors (hereafter referred to as GuardLR). To prevent dishonest computations of cloud servers and inconsistent inputs of data users, we first design a privacy-preserving verifiable learning scheme for linear regression, which guarantees the correctness of learning. In this article, to avoid malicious clouds from returning incorrect inference results, we design a privacy-preserving prediction scheme with lightweight verification. Our formal security analysis shows that GuardLR achieves privacy, completeness, and soundness. Empirical experiments using real-world datasets also demonstrate that GuardLR has high computational efficiency and accuracy. 2022-02-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/7243 info:doi/10.1109/TII.2021.3077005 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Industrial Internet of Things Servers Cloud computing Cryptography Training Computational modeling Informatics Industrial Internet of Things (IIoT) linear regression (LR) malicious adversaries privacy-preserving verifiable Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Industrial Internet of Things
Servers
Cloud computing
Cryptography
Training
Computational modeling
Informatics
Industrial Internet of Things (IIoT)
linear regression (LR)
malicious adversaries
privacy-preserving
verifiable
Information Security
spellingShingle Industrial Internet of Things
Servers
Cloud computing
Cryptography
Training
Computational modeling
Informatics
Industrial Internet of Things (IIoT)
linear regression (LR)
malicious adversaries
privacy-preserving
verifiable
Information Security
MA, Zhuoran
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
CHOO, Kim-Kwang Raymond
GAO, Yu
DENG, Robert H.
Verifiable data mining against malicious adversaries in industrial internet of things
description With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely mining IIoT data, however, the openness of security-critical IIoT becomes challenging in terms of unbearable privacy issues. Most existing privacy-preserving data mining (PPDM) techniques are designed to resist honest-but-curious adversaries (i.e., cloud servers and data users). Due to the complexity and openness in IIoT, PPDM is significantly difficult with the presence of malicious adversaries in IIoT who may incur incorrect learned models and inference results. To solve the aforementioned issues, we propose a framework to extend existing PPDM to guard linear regression against malicious behaviors (hereafter referred to as GuardLR). To prevent dishonest computations of cloud servers and inconsistent inputs of data users, we first design a privacy-preserving verifiable learning scheme for linear regression, which guarantees the correctness of learning. In this article, to avoid malicious clouds from returning incorrect inference results, we design a privacy-preserving prediction scheme with lightweight verification. Our formal security analysis shows that GuardLR achieves privacy, completeness, and soundness. Empirical experiments using real-world datasets also demonstrate that GuardLR has high computational efficiency and accuracy.
format text
author MA, Zhuoran
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
CHOO, Kim-Kwang Raymond
GAO, Yu
DENG, Robert H.
author_facet MA, Zhuoran
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
CHOO, Kim-Kwang Raymond
GAO, Yu
DENG, Robert H.
author_sort MA, Zhuoran
title Verifiable data mining against malicious adversaries in industrial internet of things
title_short Verifiable data mining against malicious adversaries in industrial internet of things
title_full Verifiable data mining against malicious adversaries in industrial internet of things
title_fullStr Verifiable data mining against malicious adversaries in industrial internet of things
title_full_unstemmed Verifiable data mining against malicious adversaries in industrial internet of things
title_sort verifiable data mining against malicious adversaries in industrial internet of things
publisher Institutional Knowledge at Singapore Management University
publishDate 2022
url https://ink.library.smu.edu.sg/sis_research/7243
_version_ 1770576289650966528