A smart surveillance system utilizing modified federated machine learning: Gossip-verifiable and quantum-safe approach

被引:1
作者
Dharani, Dharmaraj [1 ]
Anitha Kumari, Kumarasamy [1 ]
机构
[1] PSG Coll Technol, Dept IT, Coimbatore, India
关键词
code based cryptosystem; edge computing; federated machine learning; gossip data dissemination protocol; secret sharing; security and privacy; PRIVACY; SECURE;
D O I
10.1002/cpe.8238
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Edge computing has the capability to process data closer to its point of origin, leading to the development of critical autonomous infrastructures with frequently communicating peers. The proposed work aims to evaluate the effectiveness of security and privacy mechanisms tailored for distributed systems, particularly focusing on scenarios where the nodes are closed-circuit television (CCTV) systems. Ensuring public safety, object tracking in surveillance systems is a vital responsibility. The workflow has been specifically crafted and simulated for the purpose of weapon detection within public CCTV systems, utilizing sample edge devices. The system's primary objective is to detect any unauthorized use of weapons in public spaces while concurrently ensuring the integrity of video footage for use in criminal investigations. The outcomes of prior research on distributed machine learning (DML) techniques are compared with modified federated machine learning (FML) techniques, specifically designed for being Gossip verifiable and Quantum Safe. The conventional federated averaging algorithm is modified by incorporating the secret sharing principle, coupled with code-based McEliece cryptosystem. This adaptation is designed to fortify the system against quantum threats. The Gossip data dissemination protocol, executed via custom blockchain atop the distributed network, serves to authenticate and validate the learning model propagated among the peers in the network. It provides additional layer of integrity to the system. Potential threats to the proposed model are analyzed and the efficiency of the work is assessed using formal proofs. The outcomes of the proposed work demonstrate that the trustworthiness and consistency are meticulously preserved for both the model and data within the DML framework on the Edge computing platform.
引用
收藏
页数:20
相关论文
共 40 条
  • [31] A Review on Federated Learning and Machine Learning Approaches: Categorization, Application Areas, and Blockchain Technology
    Ogundokun, Roseline Oluwaseun
    Misra, Sanjay
    Maskeliunas, Rytis
    Damasevicius, Robertas
    [J]. INFORMATION, 2022, 13 (05)
  • [32] Asymptotically Good Quantum and Locally Testable Classical LDPC Codes
    Panteleev, Pavel
    Kalachev, Gleb
    [J]. PROCEEDINGS OF THE 54TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '22), 2022, : 375 - 388
  • [33] CCTV surveillance for crime prevention A 40-year systematic review with meta-analysis
    Piza, Eric L.
    Welsh, Brandon C.
    Farrington, David P.
    Thomas, Amanda L.
    [J]. CRIMINOLOGY & PUBLIC POLICY, 2019, 18 (01) : 135 - 159
  • [34] Prabhakar N., DECENTRALIZED FEDERA
  • [35] Privacy preserving transparent supply chain management through Hyperledger Fabric
    Ravi, Deebthik
    Ramachandran, Sashank
    Vignesh, Raahul
    Falmari, Vinod Ramesh
    Brindha, M.
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2022, 3 (02):
  • [36] The internationalisation of cctv surveillance: Effects on crime and implications for emerging technologies
    Thomas, Amanda L.
    Piza, Eric L.
    Welsh, Brandon C.
    Farrington, David P.
    [J]. INTERNATIONAL JOURNAL OF COMPARATIVE AND APPLIED CRIMINAL JUSTICE, 2022, 46 (01) : 81 - 102
  • [37] CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks
    Ullah, Waseem
    Ullah, Amin
    Ul Haq, Ijaz
    Muhammad, Khan
    Sajjad, Muhammad
    Baik, Sung Wook
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (11) : 16979 - 16995
  • [38] Wilhelmi F., 2022, BLOCKCHAINENABLED NE
  • [39] Comparison and Modelling of Country-level Microblog User and Activity in Cyber-physical-social Systems Using Weibo and Twitter Data
    Yang, Po
    Liu, Jing
    Qi, Jun
    Yang, Yun
    Wang, Xulong
    Lv, Zhihan
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2019, 10 (06)
  • [40] Secure Multi-Party Computation: Theory, practice and applications
    Zhao, Chuan
    Zhao, Shengnan
    Zhao, Minghao
    Chen, Zhenxiang
    Gao, Chong-Zhi
    Li, Hongwei
    Tan, Yu-an
    [J]. INFORMATION SCIENCES, 2019, 476 : 357 - 372