{"title":"OrderlessFL","authors":"Pezhman Nasirifard, Rubén Mayer, Hans A. Jacobsen","doi":"10.1145/3565386.3565487","DOIUrl":"https://doi.org/10.1145/3565386.3565487","url":null,"abstract":"Industries produce a large amount of data that can improve Machine Learning models. However, due to privacy issues, the data cannot be shared. Several Federated Learning (FL) systems have been introduced as private alternatives without considering Byzantine actors. Also, these systems are affected by the gradient staleness problem. Several blockchain-based FL systems are introduced to address Byzantine actors, which rely on Proof-of-Work-based (PoW) protocols and suffer from their limitations. We introduce OrderlessFL, a safe permissioned blockchain-based FL system using flCRDT, a CRDT for concurrent ML training and mitigating gradient staleness.","PeriodicalId":159238,"journal":{"name":"Proceedings of the 23rd International Middleware Conference: Demos and Posters","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Jha, Graham Lenton, James Asker, D. Blundell, D. Wallom
{"title":"TrustedCloud","authors":"D. Jha, Graham Lenton, James Asker, D. Blundell, D. Wallom","doi":"10.1145/3565386.3565492","DOIUrl":"https://doi.org/10.1145/3565386.3565492","url":null,"abstract":"Applications executing in the cloud are prone to numerous attacks including network, malware and data manipulation which are not immediately apparent. The Dwell Time for an attack to be noticed is currently 211 days where human error is reported to be a factor of 95% of data breaches [1]. In this abstract, we present TrustedCloud, a novel framework for run-time trust state analysis of a virtual machine (VM). TrustedCloud has four components, a) Trust Agent, b) Kernel Module and c) Trusted Platform Module (TPM) executing in all the VMs while d) Verification Cluster, a centralised entity verifying the VM's state. We will show the functioning of the TrustedCloud from the stage of VM creation to the detection of unauthorised service execution.","PeriodicalId":159238,"journal":{"name":"Proceedings of the 23rd International Middleware Conference: Demos and Posters","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128903630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}