Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








152 Hits in 6.7 sec

Blockchain-Enabled Federated Learning for UAV Edge Computing Network: Issues and Solutions

Chaoyang Zhu, Xiao Zhu, Junyu Ren, Tuanfa Qin
2022 IEEE Access  
Compared to traditional machine learning, federated learning requires a decentralized distribution system to enhance trust for UAVs.  ...  However, this technique raises privacy concerns about patients' health data. More recently, the concept of federal learning (FL) has been set up to protect mobile user data privacy.  ...  ACKNOWLEDGMENT This work was supported by the National Natural Science Foundation of China (No. 61761007) and the Scientific Research Project of Guangxi University Xingjian College of Science and Liberal  ... 
doi:10.1109/access.2022.3174865 fatcat:gkleclw5b5fwneylx2mhxerjnm

Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities

Showkat Ahmad Bhat, Ishfaq Bashir Sofi, Chong-Yung Chi
2020 IEEE Access  
PRIVACY AND SECURITY Whenever a customer makes a transaction the blockchain will provide privacy and secrecy to the personal data of the user.  ...  Security and privacy of fog-based scenarios. Controlled data sharing in multi-providers scenarios. Integrity for multi-provider multi-source computations. Data confidentiality and virtualization.  ... 
doi:10.1109/access.2020.3037108 fatcat:iksoyfx7nbhfrefnzgf6uxuw4q

Regulating a Revolution: From Regulatory Sandboxes to Smart Regulation

Dirk A. Zetzsche, Ross P. Buckley, Douglas W. Arner, Janos Nathan Barberis
2017 Social Science Research Network  
FinTech firms and data-driven financial service providers profoundly challenge the current regulatory paradigm.  ...  FinTech firms and data-driven financial service providers profoundly challenge the current regulatory paradigm.  ...  those on data privacy, and other potential barriers to innovation.  ... 
doi:10.2139/ssrn.3018534 fatcat:3ubzrww2vzfxdc667oxhfqmsxa

From the Oceans to the Cloud: Opportunities and Challenges for Data, Models, Computation and Workflows

Tiffany C. Vance, Micah Wengren, Eugene Burger, Debra Hernandez, Timothy Kearns, Encarni Medina-Lopez, Nazila Merati, Kevin O'Brien, Jon O'Neil, James T. Potemra, Richard P. Signell, Kyle Wilcox
2019 Frontiers in Marine Science  
Future uses of the cloud via computational sandboxes and the practicalities and considerations of using the cloud to archive data are explored.  ...  In conclusion, visions of a future where cloud computing is ubiquitous are discussed.  ...  ACKNOWLEDGMENTS The authors wish to thank both of our reviewers and Alison Appling and Ellyn Montgomery for thorough reviews and helpful suggestions which strongly benefited the manuscript.  ... 
doi:10.3389/fmars.2019.00211 fatcat:t2xhvx4cfbeyvlcb6paq7ecbtq

Fusing Blockchain and AI with Metaverse: A Survey

Qinglin Yang, Yetong Zhao, Huawei Huang, Zehui Xiong, Jiawen Kang, Zibin Zheng
2022 IEEE Open Journal of the Computer Society  
Thus, it is promising to build an exciting digital world and to transform a better physical world through the exploration of the metaverse.  ...  digital currencies, AI applications in the virtual world, and blockchain-empowered technologies.  ...  paradigm with federated learning.  ... 
doi:10.1109/ojcs.2022.3188249 fatcat:53lmfbcetzemhnsuiao7qzgnia

Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective [article]

Kha Dinh Duy, Taehyun Noh, Siwon Huh, Hojoon Lee
2021 arXiv   pre-print
As machine learning (ML) technologies and applications are rapidly changing many domains of computing, security issues associated with ML are also emerging.  ...  This paper conducts a systematic and comprehensive survey by classifying attack vectors and mitigation in TEE-protected confidential ML computation in the untrusted environment, analyzes the multi-party  ...  Compared to on-device ML deployment, the necessity of a trusted gradient aggregator emerges in federated learning.  ... 
arXiv:2111.03308v2 fatcat:kmklsqvzureilldvr4ui4azrwi

KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System [chapter]

Mariacarla Staffa, Luigi Coppolino, Luigi Sgaglione, Erol Gelenbe, Ioannis Komnios, Evangelos Grivas, Oana Stan, Luigi Castaldo
2018 Communications in Computer and Information Science  
and that is interconnected with other SIEMs to exchange security metrics via a publish-subscribe communication channel (Figure 3 ).  ...  The second one is needed to allow the data processing of sensitive data (respecting the privacy requirement) in terms of data threshold comparison, structure coherence and so on without access to the relative  ...  -Secure and Trusted Paradigm for Interoperable eHealth Services, Acronym: KONFIDO).  ... 
doi:10.1007/978-3-319-95189-8_2 fatcat:mjaljcmeszc6xdsh5hsnllhyvu

A Survey on Metaverse: Fundamentals, Security, and Privacy [article]

Yuntao Wang, Zhou Su, Ning Zhang, Rui Xing, Dongxiao Liu, Tom H. Luan, Xuemin Shen
2022 arXiv   pre-print
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize  ...  In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse.  ...  U20A20175, U1808207), and the Fundamental Research Funds for the Central Universities.  ... 
arXiv:2203.02662v3 fatcat:iudwizbvp5cv3fga6lpvydlrna

Blockchain Technology and Artificial Intelligence Together: A Critical Review on Applications

Hamed Taherdoost
2022 Applied Sciences  
Using a decentralized, secure, and trustworthy system, blockchain technology can automate bitcoin payments and provide users access to a shared ledger of records, transactions, and data.  ...  It is undeniable that the adoption of blockchain- and artificial intelligence (AI)-based paradigms is proceeding at lightning speed.  ...  Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app122412948 fatcat:ppfbpsd53ngjnn6mzgo7hus2ji

Reliability Inversion: A Cautionary Tale

Behrooz Parhami
2020 Computer  
COMPUTER: Are there any promising new security or privacy paradigms for addressing cybersecurity threats?  ...  His research interests include the Internet of Things, pervasive computing, the blockchain, crowdsourcing, data analytics, and privacy and security.  ...  Neural networks are now a common subject in computer science, and they have been taught to two or three generations of undergraduates.  ... 
doi:10.1109/mc.2019.2958907 fatcat:xcaxq7gocbfy5iyv2ne7d6nwlu

D3.1: Strategy analysis report and Cloud Computing

Dietrich Mark, Federico Facca
2021 Zenodo  
To tackle Europe digitalisation priority, the European Commission defined "A European strategy for data" and "A new Industrial Strategy for Europe", including a strong focus on data spaces and federated  ...  to the adoption and provision of cloud computing with a specific focus on federated cloud, edge computing, and green computing.  ...  data transfer to safe results. • Federated [machine] learning is a good example. • Applications need to be ported to the edge (as well as to the cloud) to enable sharing of data between edge and cloud  ... 
doi:10.5281/zenodo.5530740 fatcat:j56fkvlparegliqexa5p27ckge

A Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations

Farhat Anwar, Burhan Ul Islam Khan, Laiha Binti Mat Kiah, Nor Aniza Abdullah, Khang Wen Goh
2022 International Journal of Advanced Computer Science and Applications  
Blockchain technology is based on the idea of a distributed, consensus ledger, which it employs to create a secure, immutable data storage and management system.  ...  It is a publicly accessible and collectively managed ledger enabling unprecedented levels of trust and transparency between business and individual collaborations.  ...  Bisma Rasool Pampori and Ms. Gousia Nissar in proofreading, editing, and formatting the paper.  ... 
doi:10.14569/ijacsa.2022.01311101 fatcat:nzap2pb5dvclzgdxshrpzgc3yq

Mapping the Global Legal Landscape of Blockchain Technologies

Julie A. Maupin
2017 Social Science Research Network  
This requires the development of clear policies on crossborder data collection, analysis and sharing that are robust enough to create and sustain public trust.  ...  from anywhere and everywhere with global reach.Finally, the learning curve with blockchain is steep.  ...  By working across disciplines and in partnership with the best peers and experts, we are the benchmark for influential research and trusted analysis.  ... 
doi:10.2139/ssrn.2930077 fatcat:4cykn7zhujgubmzv2r3fj5mgva

Blockchain for the Metaverse: A Review [article]

Thippa Reddy Gadekallu, Thien Huynh-The, Weizheng Wang, Gokul Yenduri, Pasika Ranaweera, Quoc-Viet Pham, Daniel Benevides da Costa, Madhusanka Liyanage
2022 arXiv   pre-print
Next, we extensively discuss blockchain-based methods for the metaverse from technical perspectives, such as data acquisition, data storage, data sharing, data interoperability, and data privacy preservation  ...  Despite great attention and benefits, a natural question in the metaverse is how to secure its users' digital content and data.  ...  The combination of blockchain, XAI, and federated learning approaches will improve the quality of digital twins in the metaverse [9] . C.  ... 
arXiv:2203.09738v2 fatcat:emhvqsghgffa5eqtnkrsgzkqsa

A Full Dive into Realizing the Edge-enabled Metaverse: Visions, Enabling Technologies,and Challenges [article]

Minrui Xu, Wei Chong Ng, Wei Yang Bryan Lim, Jiawen Kang, Zehui Xiong, Dusit Niyato, Qiang Yang, Xuemin Sherman Shen, Chunyan Miao
2022 arXiv   pre-print
Moreover, given the high computation costs required, e.g., to render 3D virtual worlds and run data-hungry artificial intelligence-driven avatars, we discuss the computation challenges and cloud-edge-end  ...  to manage physical edge resources in a decentralized, transparent, and immutable manner.  ...  Nevertheless, blockchain-based data sharing becomes less efficient and risky as the volume of user data increases and privacy becomes more important.  ... 
arXiv:2203.05471v2 fatcat:jhl66faxw5clnopsb5rbsopzoq
« Previous Showing results 1 — 15 out of 152 results