基于同态加密的边缘智能隐私保护

Ronaldo Jerang, Sumitra Nayak, Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty
{"title":"基于同态加密的边缘智能隐私保护","authors":"Ronaldo Jerang, Sumitra Nayak, Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty","doi":"10.1109/CONIT59222.2023.10205745","DOIUrl":null,"url":null,"abstract":"Edge intelligence has paved the way for a stronger and more secure system by combining security and artificial intelligence. A lot of research have been undertaken, revealing remarkable development and a variety of viewpoints on this novel phenomenon. We suggested a way enabling edge intelligence to move via homomorphic encryption-enabled gadgets and automobiles. This encrypted data will be delivered to an edge node for the building of a machine learning model in order to gather any potential information hidden in the data as well as any potential obstacles that may need to be addressed before any event happens. Several machine learning models, such as KNN, K-means, SVM, and others, are used to gain the best possible data analysis. Once secure, decisions will be taken, and the outcome will be visible. All machine learning training will be done in encrypted data, which will be encrypted to ensure that no one’s privacy is abused. This may be set up for a variety of machine learning modules.","PeriodicalId":377623,"journal":{"name":"2023 3rd International Conference on Intelligent Technologies (CONIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Privacy-Preserving of Edge Intelligence using Homomorphic Encryption\",\"authors\":\"Ronaldo Jerang, Sumitra Nayak, Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty\",\"doi\":\"10.1109/CONIT59222.2023.10205745\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Edge intelligence has paved the way for a stronger and more secure system by combining security and artificial intelligence. A lot of research have been undertaken, revealing remarkable development and a variety of viewpoints on this novel phenomenon. We suggested a way enabling edge intelligence to move via homomorphic encryption-enabled gadgets and automobiles. This encrypted data will be delivered to an edge node for the building of a machine learning model in order to gather any potential information hidden in the data as well as any potential obstacles that may need to be addressed before any event happens. Several machine learning models, such as KNN, K-means, SVM, and others, are used to gain the best possible data analysis. Once secure, decisions will be taken, and the outcome will be visible. All machine learning training will be done in encrypted data, which will be encrypted to ensure that no one’s privacy is abused. This may be set up for a variety of machine learning modules.\",\"PeriodicalId\":377623,\"journal\":{\"name\":\"2023 3rd International Conference on Intelligent Technologies (CONIT)\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 3rd International Conference on Intelligent Technologies (CONIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONIT59222.2023.10205745\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 3rd International Conference on Intelligent Technologies (CONIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIT59222.2023.10205745","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

边缘智能通过将安全和人工智能相结合,为更强大、更安全的系统铺平了道路。对这一新现象进行了大量的研究,揭示了显著的发展和各种各样的观点。我们提出了一种通过同态加密设备和汽车实现边缘智能移动的方法。这些加密的数据将被传递到边缘节点,用于构建机器学习模型,以便收集隐藏在数据中的任何潜在信息,以及在任何事件发生之前可能需要解决的任何潜在障碍。一些机器学习模型,如KNN、K-means、SVM等,被用来获得最好的数据分析。一旦安全了,就会做出决定,结果也就一目了然了。所有的机器学习训练都将在加密的数据中进行,这些数据将被加密,以确保没有人的隐私被滥用。这可以设置为各种机器学习模块。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Privacy-Preserving of Edge Intelligence using Homomorphic Encryption
Edge intelligence has paved the way for a stronger and more secure system by combining security and artificial intelligence. A lot of research have been undertaken, revealing remarkable development and a variety of viewpoints on this novel phenomenon. We suggested a way enabling edge intelligence to move via homomorphic encryption-enabled gadgets and automobiles. This encrypted data will be delivered to an edge node for the building of a machine learning model in order to gather any potential information hidden in the data as well as any potential obstacles that may need to be addressed before any event happens. Several machine learning models, such as KNN, K-means, SVM, and others, are used to gain the best possible data analysis. Once secure, decisions will be taken, and the outcome will be visible. All machine learning training will be done in encrypted data, which will be encrypted to ensure that no one’s privacy is abused. This may be set up for a variety of machine learning modules.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信