Aspects of Security for Accelerating Artificial Intelligence inside Internet of Things Centric Distributed Storage Network

Fawad Mustafa, Murtaza Hussain Shaikh
{"title":"Aspects of Security for Accelerating Artificial Intelligence inside Internet of Things Centric Distributed Storage Network","authors":"Fawad Mustafa, Murtaza Hussain Shaikh","doi":"10.1109/IMTIC53841.2021.9719866","DOIUrl":null,"url":null,"abstract":"The centricity of in-network storage is a methodology that allows the generated sensor data readings to be stored in slices, known as data fragments. Within the sensor network, fragments are stored at various storage nodes. As a result, the data is more secure. The IoT network shows failures and unauthorized admittance to the users. The role played, herein, by the storage nodes make them prone to various security attacks. In this research work, the preliminary investigation and the methods to employ to provide the solution for security and privacy problems in distributed sensor network storage. Deep learning technologies that are already in use in ioT contexts cannot assign compute tasks reasonably which leads to resources wasting. Artificial intelligence is made up of capabilities that assist gadgets in learning and processing information in the same way that people do. A quantifiable blend of artificial intelligence with the internet of things, popularly known as AAIoT, is something that is holding a promise of a more connected future. This article proposes an AAIoT based method for allocating each network layer's inference computation in a multi-layer internet of things system to each device This is, to the best of my knowledge, the first attempt to track down this criminal. When considering the cost of computing and communication, the design of this study effort is a programming algorithm to lower the response time. The simulation findings demonstrate that a method could improve the system's response time significantly.","PeriodicalId":172583,"journal":{"name":"2021 6th International Multi-Topic ICT Conference (IMTIC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Multi-Topic ICT Conference (IMTIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMTIC53841.2021.9719866","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The centricity of in-network storage is a methodology that allows the generated sensor data readings to be stored in slices, known as data fragments. Within the sensor network, fragments are stored at various storage nodes. As a result, the data is more secure. The IoT network shows failures and unauthorized admittance to the users. The role played, herein, by the storage nodes make them prone to various security attacks. In this research work, the preliminary investigation and the methods to employ to provide the solution for security and privacy problems in distributed sensor network storage. Deep learning technologies that are already in use in ioT contexts cannot assign compute tasks reasonably which leads to resources wasting. Artificial intelligence is made up of capabilities that assist gadgets in learning and processing information in the same way that people do. A quantifiable blend of artificial intelligence with the internet of things, popularly known as AAIoT, is something that is holding a promise of a more connected future. This article proposes an AAIoT based method for allocating each network layer's inference computation in a multi-layer internet of things system to each device This is, to the best of my knowledge, the first attempt to track down this criminal. When considering the cost of computing and communication, the design of this study effort is a programming algorithm to lower the response time. The simulation findings demonstrate that a method could improve the system's response time significantly.
加速以物联网为中心的分布式存储网络内人工智能的安全问题
网络内存储的中心性是一种方法,它允许生成的传感器数据读数存储在切片中,称为数据片段。在传感器网络中,片段存储在不同的存储节点上。因此,数据更加安全。物联网网络向用户显示故障和未经授权的准入。存储节点在其中所扮演的角色使其容易受到各种安全攻击。在本研究工作中,对分布式传感器网络存储中存在的安全和隐私问题进行了初步的研究,并提出了解决方案。已经在物联网环境中使用的深度学习技术不能合理地分配计算任务,从而导致资源浪费。人工智能是由帮助小工具学习和处理信息的能力组成的,就像人一样。人工智能与物联网(通常被称为AAIoT)的可量化融合,有望带来一个更加互联的未来。本文提出了一种基于AAIoT的方法,将多层物联网系统中每个网络层的推理计算分配给每个设备。据我所知,这是第一次尝试追踪这种罪犯。考虑到计算和通信成本,本研究的设计是一种编程算法,以降低响应时间。仿真结果表明,该方法能显著提高系统的响应时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信