41 research outputs found

    Privacy-preserving Security Inference Towards Cloud-Edge Collaborative Using Differential Privacy

    Full text link
    Cloud-edge collaborative inference approach splits deep neural networks (DNNs) into two parts that run collaboratively on resource-constrained edge devices and cloud servers, aiming at minimizing inference latency and protecting data privacy. However, even if the raw input data from edge devices is not directly exposed to the cloud, state-of-the-art attacks targeting collaborative inference are still able to reconstruct the raw private data from the intermediate outputs of the exposed local models, introducing serious privacy risks. In this paper, a secure privacy inference framework for cloud-edge collaboration is proposed, termed CIS, which supports adaptively partitioning the network according to the dynamically changing network bandwidth and fully releases the computational power of edge devices. To mitigate the influence introduced by private perturbation, CIS provides a way to achieve differential privacy protection by adding refined noise to the intermediate layer feature maps offloaded to the cloud. Meanwhile, with a given total privacy budget, the budget is reasonably allocated by the size of the feature graph rank generated by different convolution filters, which makes the inference in the cloud robust to the perturbed data, thus effectively trade-off the conflicting problem between privacy and availability. Finally, we construct a real cloud-edge collaborative inference computing scenario to verify the effectiveness of inference latency and model partitioning on resource-constrained edge devices. Furthermore, the state-of-the-art cloud-edge collaborative reconstruction attack is used to evaluate the practical availability of the end-to-end privacy protection mechanism provided by CIS

    Extension of Research on Security as a Service for VMs in IaaS Platform

    No full text
    To satisfy security concerns including infrastructure as a service (IaaS) security framework, security service access, network anomaly detection, and virtual machine (VM) monitoring, a layered security framework is built which composes of a physical layer, a virtualization layer, and a security management layer. Then, two security service access methods are realized for various security tools from the perspective of whether security tools generate communication traffic. One without generating traffic employs the VM traffic redirection technology and the other leveraged the mechanism of multitasking process access. Moreover, a stacked LSTM-based network anomaly detection agentless method is proposed, which has advantages of a higher ratio of precision and recall. Finally, a Hypervisor-based agentless monitoring method for VMs based on dynamic code injection is proposed, which has benefits of high security of the external monitoring method and good context analysis of the internal monitoring mechanism. The experimental results demonstrate the effectiveness of the proposed protection framework and the corresponding security mechanisms, respectively

    Impact of geographical environment differences on incidence of heat stroke in training troops in Chongqing

    No full text
    Objective To analyze the factors contributing to heat stroke in troops from different regions on the first day after arrival in Chongqing. Methods Using a self-designed questionnaire, we investigated the daily activities, training, and the occurrence of heat stroke in 2 troops from 2 different regions before and during the transportation and after their arrival at Chongqing. The individuals having heat stroke on the first day of arrival served as the heat stroke group, and those without heat stroke served as the control group for comparison of the data to identify the factors contributing to heat stroke in the 2 troops. Results Twelve (33.3%) individuals in troop A and 16 (48.6%) in troop B had heat stroke on the first day after arrival in Chongqing. In troop A, the volume of daily water intake, sleep time and sleep quality differed significantly between the individuals with heat stroke and those without during the transportation (P < 0.05); In troop B, the weekly training time and the volume of water intake on the first day of arrival differed significantly between the heat stroke and non-heat stroke groups (P < 0.05).Logistic multivariate regression showed that an increased mean daily water intake and improved daily sleep quality during transportation in troop A and a longer weekly training time in troop B were the protective factors against heat stroke. Conclusion The differences in the geographical environment in terms of climate and altitude between the 2 troops resulted in significant differences in the factors affecting the occurrence of heat stroke on the first day after their arrival, suggesting the importance of addressing the geographical differences between the stationing site and the mission site in designing measures for controlling environmentally sensitive diseases for the trans-regional mobile troops

    PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT

    No full text
    The extensive data collection performed by the Internet of Things (IoT) devices can put users at risk of data leakage. Consequently, IoT vendors are legally obliged to provide privacy policies to declare the scope and purpose of the data collection. However, complex and lengthy privacy policies are unfriendly to users, and the lack of a machine-readable format makes it difficult to check policy compliance automatically. To solve these problems, we first put forward a purpose-aware rule to formalize the purpose-driven data collection or use statement. Then, a novel approach to identify the rule from natural language privacy policies is proposed. To address the issue of diversity of purpose expression, we present the concepts of explicit and implicit purpose, which enable using the syntactic and semantic analyses to extract purposes in different sentences. Finally, the domain adaption method is applied to the semantic role labeling (SRL) model to improve the efficiency of purpose extraction. The experiments that are conducted on the manually annotated dataset demonstrate that this approach can extract purpose-aware rules from the privacy policies with a high recall rate of 91%. The implicit purpose extraction of the adapted model significantly improves the F1-score by 11%

    An Android Malware Detection Model Based on DT-SVM

    No full text
    In order to improve the accuracy and efficiency of Android malware detection, an Android malware detection model based on decision tree (DT) with support vector machine (SVM) algorithm (DT-SVM) is proposed. Firstly, the original opcode, Dalvik opcode, is extracted by reversing Android software, and the eigenvector of the sample is generated by using the n-gram model. Then, a decision tree is generated via training the sample and updating decision nodes as SVM nodes from the bottom up according to the evaluation result of the test set in the decision path. The model effectively combines DT with SVM. Under the premise of maintaining a high-accuracy decision path, SVM is used to effectively reduce the overfitting problem in DT and thus improve the generalization ability, and maintain the superiority of SVM for the small sample training set. Finally, to test our approach, several simulation experiments are carried out, and the results demonstrate that the improved algorithm has better accuracy and higher speed as compared with other malware detection approaches
    corecore