{"title":"d-EMR: Secure and distributed Electronic Medical Record management","authors":"Ehab Zaghloul, Tongtong Li, Jian Ren","doi":"10.1016/j.hcc.2022.100101","DOIUrl":"https://doi.org/10.1016/j.hcc.2022.100101","url":null,"abstract":"<div><p>As more and more data is produced, finding a secure and efficient data access structure has become a major research issue. The centralized systems used by medical institutions for the management and transfer of Electronic Medical Records (EMRs) can be vulnerable to security and privacy threats, often lack interoperability, and give patients limited or no access to their own EMRs. In this paper, we first propose a privilege-based data access structure and incorporates it into an attribute-based encryption mechanism to handle the management and sharing of big data sets. Our proposed privilege-based data access structure makes managing healthcare records using mobile healthcare devices efficient and feasible for large numbers of users. We then propose a novel distributed multilevel EMR (<span><math><mi>d</mi></math></span>-EMR) management scheme, which uses blockchain to address security concerns and enables selective sharing of medical records among staff members that belong to different levels of a hierarchical institution. We deploy smart contracts on Ethereum blockchain and utilize a distributed storage system to alleviate the dependence on the record-generating institutions to manage and share patient records. To preserve privacy of patient records, our smart contract is designed to allow patients to verify attributes prior to granting access rights. We provide extensive security, privacy, and evaluation analyses to show that our proposed scheme is both efficient and practical.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 1","pages":"Article 100101"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An access control scheme for distributed Internet of Things based on adaptive trust evaluation and blockchain","authors":"Wenxian Jiang , Zerui Lin , Jun Tao","doi":"10.1016/j.hcc.2023.100104","DOIUrl":"https://doi.org/10.1016/j.hcc.2023.100104","url":null,"abstract":"<div><p>The Internet of Things (IoT) has the characteristics of limited resources and wide range of points. Aiming at the problems of policy centralization and single point of failure in traditional access control schemes, a distributed access control method based on adaptive trust evaluation and smart contract is proposed to provide fine-grained, flexible and scalable authorization for IoT devices with limited resources. Firstly, a modular access control architecture with integrated blockchain is proposed to achieve hierarchical management of IoT devices. Secondly, an IoT trust evaluation model called AITTE based on adaptive fusion weights is designed to effectively improve the identification of illegal access requests from malicious nodes. Finally, an attribute-based access control model using smart contract called AACSC which is built, which consists of attribute set contract (ASC), registration contract (RC), state judgment contract (SJC), authority permission management contract (AMC), and access control contract (ACC). As experimental results show, the scheme can effectively solve the problem of access security in resource-constrained IoT environments. Moreover, it also ensures the reliability and efficiency of the access control implementation process.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 1","pages":"Article 100104"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A trustless architecture of blockchain-enabled metaverse","authors":"Minghui Xu , Yihao Guo , Qin Hu , Zehui Xiong , Dongxiao Yu , Xiuzhen Cheng","doi":"10.1016/j.hcc.2022.100088","DOIUrl":"https://doi.org/10.1016/j.hcc.2022.100088","url":null,"abstract":"<div><p>Metaverse has rekindled human beings’ desire to further break space-time barriers by fusing the virtual and real worlds. However, security and privacy threats hinder us from building a utopia. A metaverse embraces various techniques, while at the same time inheriting their pitfalls and thus exposing large attack surfaces. Blockchain, proposed in 2008, was regarded as a key building block of metaverses. it enables transparent and trusted computing environments using tamper-resistant decentralized ledgers. Currently, blockchain supports Decentralized Finance (DeFi) and Non-fungible Tokens (NFT) for metaverses. However, the power of a blockchain has not been sufficiently exploited. In this article, we propose a novel trustless architecture of blockchain-enabled metaverse, aiming to provide efficient resource integration and allocation by consolidating hardware and software components. To realize our design objectives, we provide an On-Demand Trusted Computing Environment (OTCE) technique based on local trust evaluation. Specifically, the architecture adopts a hypergraph to represent a metaverse, in which each hyperedge links a group of users with certain relationship. Then the trust level of each user group can be evaluated based on graph analytics techniques. Based on the trust value, each group can determine its security plan on demand, free from interference by irrelevant nodes. Besides, OTCEs enable large-scale and flexible application environments (sandboxes) while preserving a strong security guarantee.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 1","pages":"Article 100088"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study of heuristic methods for cardinality constrained portfolio optimization","authors":"Lei Fu , Jun Li , Shanwen Pu","doi":"10.1016/j.hcc.2022.100097","DOIUrl":"https://doi.org/10.1016/j.hcc.2022.100097","url":null,"abstract":"<div><p>The cardinality constrained mean–variance (CCMV) portfolio selection model aims to identify a subset of the candidate assets such that the constructed portfolio has a guaranteed expected return and minimum variance. By formulating this model as the mixed-integer quadratic program (MIQP), the exact solution can be solved by a branch-and-bound algorithm. However, computational efficiency is the central issue in the time-sensitive portfolio investment due to its NP-hardness properties. To accelerate the solution speeds to CCMV portfolio optimization problems, we develop various heuristic methods based on techniques such as continuous relaxation, <span><math><msub><mrow><mi>l</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>-norm approximation, integer optimization, and relaxation of semi-definite programming (SDP). We evaluate our heuristic methods by applying them to the US equity market dataset. The experimental results show that our SDP-based method is effective in terms of the computation time and the approximation ratio. Our SDP-based method performs even better than a commercial MIQP solver when the computational time is limited. In addition, several investment companies in China have adopted our methods, gaining good returns. This paper sheds light on the computation optimization for financial investments.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"3 1","pages":"Article 100097"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50178425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-preserving federated learning for transportation mode prediction based on personal mobility data","authors":"Fuxun Yu , Zirui Xu , Zhuwei Qin , Xiang Chen","doi":"10.1016/j.hcc.2022.100082","DOIUrl":"10.1016/j.hcc.2022.100082","url":null,"abstract":"<div><p>Personal daily mobility trajectories/traces like Google Location Service integrates many valuable information from individuals and could benefit a lot of application scenarios, such as pandemic control and precaution, product recommendation, customized user profile analysis, traffic management in smart cities, etc. However, utilizing such personal mobility data faces many challenges since users’ private information, such as home/work addresses, can be unintentionally leaked. In this work, we build an FL system for transportation mode prediction based on personal mobility data. Utilizing FL-based training scheme, all user’s data are kept in local without uploading to central nodes, providing high privacy preserving capability. At the same time, we could train accurate DNN models that is close to the centralized training performance. The resulted transportation mode prediction system serves as a prototype on user’s traffic mode classification, which could potentially benefit the transportation data analysis and help make wise decisions to manage public transportation resources.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"2 4","pages":"Article 100082"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295222000344/pdfft?md5=c5296ec7810c9a5037403c7fbf7c9186&pid=1-s2.0-S2667295222000344-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86199956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep transfer network of heterogeneous domain feature in machine translation","authors":"Yupeng Liu , Yanan Zhang , Xiaochen Zhang","doi":"10.1016/j.hcc.2022.100083","DOIUrl":"10.1016/j.hcc.2022.100083","url":null,"abstract":"<div><p>In order to address the shortcoming of feature representation limitation in machine translation(MT) system, this paper presents a feature transfer method in MT. Meta feature transfer of the decoding process considered not only their own translation system, but also transferred knowledge of another translation system. The domain meta feature and the objective function of domain adaptation are used to better model the domain transfer task. In this paper, extensive experiments and comparisons are made. The experiment results show that the proposed model has a significant improvement in domain transfer task. The first model has better performance than baseline system, which improves 3.06 BLEU score on the news test set, improves 3.27 BLEU score on the education test set, and improves 3.93 BLEU score on the law test set; The second model improves 3.16 BLEU score on the news test set, improves 3.54 BLEU score on the education test set, and improves 4.2 BLEU score on the law test set.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"2 4","pages":"Article 100083"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295222000356/pdfft?md5=bb8cf63a8a390ce49f5584782c466ba4&pid=1-s2.0-S2667295222000356-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89916343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SubStop: An analysis on subscription email bombing attack and machine learning based mitigation","authors":"Aurobinda Laha , Md Tahmid Yasar , Yu Cheng","doi":"10.1016/j.hcc.2022.100086","DOIUrl":"10.1016/j.hcc.2022.100086","url":null,"abstract":"<div><p>Email Bombing, a kind of denial-of-service (DoS) attack is crippling internet users and is on the rise recently. A particularly notorious type is the Subscription Bombing attack, where a victim user’s inbox is bombarded with a stream of subscription emails at a particular period. This kind of attack helps the perpetrator to hide their real motive in lieu of a barrage of legitimate-looking emails. The main challenge for detecting subscription bombing attacks is that most of the attacking email appears to be legitimate and benign and thus can bypass existing anti-spam filters. In order to shed some light on the direction of detecting the bombing attacks, in this paper we first conduct some reverse engineering study on the Gmail anti-spam mechanism (as the information is not publicly available) and in-depth feature analysis of real-life bombing attack emails. Leveraging the insights from our reverse engineering study and data analysis, we propose a novel layered detection architecture, termed as SubStop, to detect and mitigate subscription bombs. SubStop exploits the statistics of incoming volume, source domain distribution, the correlation among different features, and implements machine learning to achieve effective detection. In specific, we utilize the weighted support vector machine (WSVM) and properly tune the class weights to achieve high accuracy in detecting bombing attacks. Despite the scarcity of public email data sets, we conduct extensive experiments on a real-life subscription bomb attack and real-time attacks using our bombing simulation script (which is facilitated by our reverse engineering findings), on test email accounts. Detailed experimental results show that our proposed architecture is very robust and highly accurate in detecting and mitigating a subscription bombing attack.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"2 4","pages":"Article 100086"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295222000381/pdfft?md5=4ca251eb346b7cfcf32d162755dca9ea&pid=1-s2.0-S2667295222000381-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89529889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
De Zhao , Zhenzhen Li , Haiyang Ding , Zhenzhen Zhang , Zichen Li
{"title":"Research and design of CRT-based homomorphic ciphertext database system","authors":"De Zhao , Zhenzhen Li , Haiyang Ding , Zhenzhen Zhang , Zichen Li","doi":"10.1016/j.hcc.2022.100074","DOIUrl":"10.1016/j.hcc.2022.100074","url":null,"abstract":"<div><p>The cloud’s storage and query of private information have the cryptographic scholar due to the proliferation of cloud computing. In the traditional query mode, the private information stored in the cloud is at risk of being leaked. In order to solve this problem, a cloud ciphertext database system based on homomorphic encryption is a valid workaround. This paper presents a new cloud ciphertext database system model, which is based on the existing ciphertext database mode research and homomorphic properties. This paper also implements a ciphertext database system based on a CRT-based additive homomorphic scheme according to the model. Through theoretical analysis, the model is CPA-level safe and correct. The experimental results show that users can correctly query and download the data in the ciphertext database on the untrusted cloud server through the model, and it has efficiency advantages.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"2 4","pages":"Article 100074"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295222000265/pdfft?md5=6e1d455f9722d36401b73787fe63c7d6&pid=1-s2.0-S2667295222000265-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86615641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memristor based object detection using neural network","authors":"Ravikumar KI , Sukumar R","doi":"10.1016/j.hcc.2022.100085","DOIUrl":"10.1016/j.hcc.2022.100085","url":null,"abstract":"<div><p>With the increasing growth of AI, big data analytics, cloud computing, and Internet of Things applications, developing memristor devices and related hardware systems to compute the deep learning application needs extensive data calculations with low power consumption and lesser chip area. Deep learning model is one of the AI methods which is gaining importance in object detection, natural language processing, and pattern recognition. A large amount of data handling is essential for driving the deep learning model with less power consumption. To address these issues, the paper proposed the Memristor-based object detection on the CIFAR-10 dataset and achieved an accuracy of 85 percent. The memtorch package in python is employed to predict the objects for implementation.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"2 4","pages":"Article 100085"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266729522200037X/pdfft?md5=4f237eb3a43f11d8635378359665b321&pid=1-s2.0-S266729522200037X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74571782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain-based multi-hop permission delegation scheme with controllable delegation depth for electronic health record sharing","authors":"Ya Gao , Aiqing Zhang , Shu Wu , Jindou Chen","doi":"10.1016/j.hcc.2022.100084","DOIUrl":"10.1016/j.hcc.2022.100084","url":null,"abstract":"<div><p>Permission delegation has become a new way for data sharing by delegating the authorized permission to other users. A flexible authorization model with strict access control policies is promising for electronic health record (EHR) sharing with security. In this paper, a blockchain-based multi-hop permission delegation scheme with controllable delegation depth for EHR sharing has been presented. We use the interplanetary file system (IPFS) for storing the original EHRs. Smart contracts and proxy re-encryption technology are implemented for permission delegation. In order to ensure data security, we use attribute-based encryption to provide fine-grained access control. Additionally, blockchain is used to achieve traceability and immutability. We deploy smart contracts so that the delegation depth can be set by delegators. Security analysis of the proposed protocol shows that our solution meets the designed goals. Finally, we evaluate the proposed algorithm and implement the scheme on the Ethereum test chain. Our scheme outperforms the competition in terms of performance, according to the results of our experiments.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"2 4","pages":"Article 100084"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295222000368/pdfft?md5=018f41b0f7e2653ec2f5e8d73b677732&pid=1-s2.0-S2667295222000368-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81475464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}