Verifiable data mining against malicious adversaries in industrial internet of things
With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7243 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8246 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-82462022-09-02T06:16:53Z Verifiable data mining against malicious adversaries in industrial internet of things MA, Zhuoran MA, Jianfeng MIAO, Yinbin LIU, Ximeng CHOO, Kim-Kwang Raymond GAO, Yu DENG, Robert H. With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely mining IIoT data, however, the openness of security-critical IIoT becomes challenging in terms of unbearable privacy issues. Most existing privacy-preserving data mining (PPDM) techniques are designed to resist honest-but-curious adversaries (i.e., cloud servers and data users). Due to the complexity and openness in IIoT, PPDM is significantly difficult with the presence of malicious adversaries in IIoT who may incur incorrect learned models and inference results. To solve the aforementioned issues, we propose a framework to extend existing PPDM to guard linear regression against malicious behaviors (hereafter referred to as GuardLR). To prevent dishonest computations of cloud servers and inconsistent inputs of data users, we first design a privacy-preserving verifiable learning scheme for linear regression, which guarantees the correctness of learning. In this article, to avoid malicious clouds from returning incorrect inference results, we design a privacy-preserving prediction scheme with lightweight verification. Our formal security analysis shows that GuardLR achieves privacy, completeness, and soundness. Empirical experiments using real-world datasets also demonstrate that GuardLR has high computational efficiency and accuracy. 2022-02-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/7243 info:doi/10.1109/TII.2021.3077005 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Industrial Internet of Things Servers Cloud computing Cryptography Training Computational modeling Informatics Industrial Internet of Things (IIoT) linear regression (LR) malicious adversaries privacy-preserving verifiable Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Industrial Internet of Things Servers Cloud computing Cryptography Training Computational modeling Informatics Industrial Internet of Things (IIoT) linear regression (LR) malicious adversaries privacy-preserving verifiable Information Security |
spellingShingle |
Industrial Internet of Things Servers Cloud computing Cryptography Training Computational modeling Informatics Industrial Internet of Things (IIoT) linear regression (LR) malicious adversaries privacy-preserving verifiable Information Security MA, Zhuoran MA, Jianfeng MIAO, Yinbin LIU, Ximeng CHOO, Kim-Kwang Raymond GAO, Yu DENG, Robert H. Verifiable data mining against malicious adversaries in industrial internet of things |
description |
With the large-scaled data generated from various interconnected machines and networks, Industrial Internet of Things (IIoT) provides unprecedented opportunities for facilitating data mining for industrial applications. The current IIoT architecture tends to adopt cloud computing for further timely mining IIoT data, however, the openness of security-critical IIoT becomes challenging in terms of unbearable privacy issues. Most existing privacy-preserving data mining (PPDM) techniques are designed to resist honest-but-curious adversaries (i.e., cloud servers and data users). Due to the complexity and openness in IIoT, PPDM is significantly difficult with the presence of malicious adversaries in IIoT who may incur incorrect learned models and inference results. To solve the aforementioned issues, we propose a framework to extend existing PPDM to guard linear regression against malicious behaviors (hereafter referred to as GuardLR). To prevent dishonest computations of cloud servers and inconsistent inputs of data users, we first design a privacy-preserving verifiable learning scheme for linear regression, which guarantees the correctness of learning. In this article, to avoid malicious clouds from returning incorrect inference results, we design a privacy-preserving prediction scheme with lightweight verification. Our formal security analysis shows that GuardLR achieves privacy, completeness, and soundness. Empirical experiments using real-world datasets also demonstrate that GuardLR has high computational efficiency and accuracy. |
format |
text |
author |
MA, Zhuoran MA, Jianfeng MIAO, Yinbin LIU, Ximeng CHOO, Kim-Kwang Raymond GAO, Yu DENG, Robert H. |
author_facet |
MA, Zhuoran MA, Jianfeng MIAO, Yinbin LIU, Ximeng CHOO, Kim-Kwang Raymond GAO, Yu DENG, Robert H. |
author_sort |
MA, Zhuoran |
title |
Verifiable data mining against malicious adversaries in industrial internet of things |
title_short |
Verifiable data mining against malicious adversaries in industrial internet of things |
title_full |
Verifiable data mining against malicious adversaries in industrial internet of things |
title_fullStr |
Verifiable data mining against malicious adversaries in industrial internet of things |
title_full_unstemmed |
Verifiable data mining against malicious adversaries in industrial internet of things |
title_sort |
verifiable data mining against malicious adversaries in industrial internet of things |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2022 |
url |
https://ink.library.smu.edu.sg/sis_research/7243 |
_version_ |
1770576289650966528 |