A smart surveillance system utilizing modified federated machine learning: Gossip-verifiable and quantum-safe approach

被引:1
作者
Dharani, Dharmaraj [1 ]
Anitha Kumari, Kumarasamy [1 ]
机构
[1] PSG Coll Technol, Dept IT, Coimbatore, India
关键词
code based cryptosystem; edge computing; federated machine learning; gossip data dissemination protocol; secret sharing; security and privacy; PRIVACY; SECURE;
D O I
10.1002/cpe.8238
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Edge computing has the capability to process data closer to its point of origin, leading to the development of critical autonomous infrastructures with frequently communicating peers. The proposed work aims to evaluate the effectiveness of security and privacy mechanisms tailored for distributed systems, particularly focusing on scenarios where the nodes are closed-circuit television (CCTV) systems. Ensuring public safety, object tracking in surveillance systems is a vital responsibility. The workflow has been specifically crafted and simulated for the purpose of weapon detection within public CCTV systems, utilizing sample edge devices. The system's primary objective is to detect any unauthorized use of weapons in public spaces while concurrently ensuring the integrity of video footage for use in criminal investigations. The outcomes of prior research on distributed machine learning (DML) techniques are compared with modified federated machine learning (FML) techniques, specifically designed for being Gossip verifiable and Quantum Safe. The conventional federated averaging algorithm is modified by incorporating the secret sharing principle, coupled with code-based McEliece cryptosystem. This adaptation is designed to fortify the system against quantum threats. The Gossip data dissemination protocol, executed via custom blockchain atop the distributed network, serves to authenticate and validate the learning model propagated among the peers in the network. It provides additional layer of integrity to the system. Potential threats to the proposed model are analyzed and the efficiency of the work is assessed using formal proofs. The outcomes of the proposed work demonstrate that the trustworthiness and consistency are meticulously preserved for both the model and data within the DML framework on the Edge computing platform.
引用
收藏
页数:20
相关论文
共 40 条
  • [1] Hyperledger
    Aggarwal, Shubhani
    Kumar, Neeraj
    [J]. BLOCKCHAIN TECHNOLOGY FOR SECURE AND SMART APPLICATIONS ACROSS INDUSTRY VERTICALS, 2021, 121 : 323 - 343
  • [2] An overview of security and privacy in smart cities' IoT communications
    Al-Turjman, Fadi
    Zahmatkesh, Hadi
    Shahroze, Ramiz
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (03)
  • [3] Albawi S, 2017, I C ENG TECHNOL
  • [4] An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation
    Anh-Tu Tran
    The-Dung Luong
    Karnjana, Jessada
    Van-Nam Huynh
    [J]. NEUROCOMPUTING, 2021, 422 : 245 - 262
  • [5] Educational Blockchain: A Secure Degree Attestation and Verification Traceability Architecture for Higher Education Commission
    Ayub Khan, Abdullah
    Laghari, Asif Ali
    Shaikh, Aftab Ahmed
    Bourouis, Sami
    Mamlouk, Amir Madany
    Alshazly, Hammam
    [J]. APPLIED SCIENCES-BASEL, 2021, 11 (22):
  • [6] Baldi M., 2014, QCLDPC CODEBASED CRY
  • [7] A Survey on Perfectly Secure Verifiable Secret-sharing
    Chandramouli, Anirudh
    Choudhury, Ashish
    Patra, Arpita
    [J]. ACM COMPUTING SURVEYS, 2022, 54 (11S)
  • [8] Chattopadhyay A., 2022, Neurosci. Inf, V2, DOI DOI 10.1016/J.NEURI.2022.100060
  • [9] Dharani D., 2022, Disruptive Technologies for Big Data and Cloud Applications: Proceedings of ICBDCC 2021. Lecture Notes in Electrical Engineering (905), P107, DOI 10.1007/978-981-19-2177-3_11
  • [10] Dharani D., 2021, EFFECTIVENESS PRIVAT