Verifiable data mining against malicious adversaries in industrial internet of things

With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely...

Full description

Saved in:
Bibliographic Details
Main Authors: MA, Zhuoran, MA, Jianfeng, MIAO, Yinbin, LIU, Ximeng, CHOO, Kim-Kwang Raymond, GAO, Yu, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2022
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7243
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8246
record_format dspace
spelling sg-smu-ink.sis_research-82462022-09-02T06:16:53Z Verifiable data mining against malicious adversaries in industrial internet of things MA, Zhuoran MA, Jianfeng MIAO, Yinbin LIU, Ximeng CHOO, Kim-Kwang Raymond GAO, Yu DENG, Robert H. With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely mining IIoT data, however, the openness of security-critical IIoT becomes challenging in terms of unbearable privacy issues. Most existing privacy-preserving data mining (PPDM) techniques are designed to resist honest-but-curious adversaries (i.e., cloud servers and data users). Due to the complexity and openness in IIoT, PPDM is significantly difficult with the presence of malicious adversaries in IIoT who may incur incorrect learned models and inference results. To solve the aforementioned issues, we propose a framework to extend existing PPDM to guard linear regression against malicious behaviors (hereafter referred to as GuardLR). To prevent dishonest computations of cloud servers and inconsistent inputs of data users, we first design a privacy-preserving verifiable learning scheme for linear regression, which guarantees the correctness of learning. In this article, to avoid malicious clouds from returning incorrect inference results, we design a privacy-preserving prediction scheme with lightweight verification. Our formal security analysis shows that GuardLR achieves privacy, completeness, and soundness. Empirical experiments using real-world datasets also demonstrate that GuardLR has high computational efficiency and accuracy. 2022-02-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/7243 info:doi/10.1109/TII.2021.3077005 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Industrial Internet of Things Servers Cloud computing Cryptography Training Computational modeling Informatics Industrial Internet of Things (IIoT) linear regression (LR) malicious adversaries privacy-preserving verifiable Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Industrial Internet of Things
Servers
Cloud computing
Cryptography
Training
Computational modeling
Informatics
Industrial Internet of Things (IIoT)
linear regression (LR)
malicious adversaries
privacy-preserving
verifiable
Information Security
spellingShingle Industrial Internet of Things
Servers
Cloud computing
Cryptography
Training
Computational modeling
Informatics
Industrial Internet of Things (IIoT)
linear regression (LR)
malicious adversaries
privacy-preserving
verifiable
Information Security
MA, Zhuoran
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
CHOO, Kim-Kwang Raymond
GAO, Yu
DENG, Robert H.
Verifiable data mining against malicious adversaries in industrial internet of things
description With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely mining IIoT data, however, the openness of security-critical IIoT becomes challenging in terms of unbearable privacy issues. Most existing privacy-preserving data mining (PPDM) techniques are designed to resist honest-but-curious adversaries (i.e., cloud servers and data users). Due to the complexity and openness in IIoT, PPDM is significantly difficult with the presence of malicious adversaries in IIoT who may incur incorrect learned models and inference results. To solve the aforementioned issues, we propose a framework to extend existing PPDM to guard linear regression against malicious behaviors (hereafter referred to as GuardLR). To prevent dishonest computations of cloud servers and inconsistent inputs of data users, we first design a privacy-preserving verifiable learning scheme for linear regression, which guarantees the correctness of learning. In this article, to avoid malicious clouds from returning incorrect inference results, we design a privacy-preserving prediction scheme with lightweight verification. Our formal security analysis shows that GuardLR achieves privacy, completeness, and soundness. Empirical experiments using real-world datasets also demonstrate that GuardLR has high computational efficiency and accuracy.
format text
author MA, Zhuoran
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
CHOO, Kim-Kwang Raymond
GAO, Yu
DENG, Robert H.
author_facet MA, Zhuoran
MA, Jianfeng
MIAO, Yinbin
LIU, Ximeng
CHOO, Kim-Kwang Raymond
GAO, Yu
DENG, Robert H.
author_sort MA, Zhuoran
title Verifiable data mining against malicious adversaries in industrial internet of things
title_short Verifiable data mining against malicious adversaries in industrial internet of things
title_full Verifiable data mining against malicious adversaries in industrial internet of things
title_fullStr Verifiable data mining against malicious adversaries in industrial internet of things
title_full_unstemmed Verifiable data mining against malicious adversaries in industrial internet of things
title_sort verifiable data mining against malicious adversaries in industrial internet of things
publisher Institutional Knowledge at Singapore Management University
publishDate 2022
url https://ink.library.smu.edu.sg/sis_research/7243
_version_ 1770576289650966528