Open Access Open Access  Restricted Access Subscription Access

A PRIVACY PROTECTION FRAMEWORK FOR MACHINE LEARNING FOR IIOT

Anupama T A, Chaithra M J

Abstract


Energy, agriculture, mining, transportation, and healthcare are just a few of the top industries being transformed by the industrial internet of things (IIoT). Industry 4.0, which chiefly depends on AI (ML) to take utilization of the tremendous interconnectedness and huge volumes of IIoT information, is basically determined by IIoT.  To be fully utilised in Industry 4.0, ML models that are trained on sensitive data sometimes leak privacy to adversarial attacks. This paper presents PriMod Chain, a system that upholds security and dependability on IIoT information by consolidating differential protection, united ML, Ethereum block chain, and shrewd agreements.PriMod Chain is a privacy-preserving trustworthy machine learning model training and sharing framework based on blockchain. Reenactments made in Python using attachment programming on a broadly useful PC were utilized to evaluate the practicality of PriMod Chain regarding protection, security, steadfastness, wellbeing, and strength. For the neighborhood review, we utilized the Ganache v2.0.1 nearby test organization, and for the public blockchain testing, we utilized the Kovan test organization. Using the Scyther v1.1.3 protocol verifier, we examined the suggested security protocol.


Full Text:

PDF

References


Sonali Mishra , “SQL Injection Detection using Machine Learning ”, from https:

//scholarworks.sjsu.edu/cgi/viewcontent.cgi?arti c le = 1727context = etdprojects, on 23 May 2019 pp.10 - 29.

BojkenShehu and Aleksander Xhuvani ,”A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and their Prevention and Detection Techniques” from https

://pdfs.semanticscholar.org , Vol. 11, Issue 4, No 1,July 2014 pp 20 - 34.

Suhaimi Ibrahim , ” SQL Injection Detection and Prevention Techniques” from https

://pdfs.semanticscholar.org/ Volume 3, Number 7, August 2011 , pp 85 - 89.

G. Wassermann, Z. Su, “An analysis framework for security in web applications,” In: Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems, fromhttps://link.springer.com/chapter/1

1007/978 − 0 − 387 − 44599 − 15 SAVCBS, pp. 70–78, 2004.

Mei Junjin, “An Approach for SQL Injection Vulnerability Detection,” Proceedings. of the 6th Int. Conf. On Information Technology: New Generations, Las Vegas, Nevada, pp. 14-19, Apr. 2009.

G Buehrer, B.W. Weide, P.A.G Sivilotti, Using Parse Tree Validation to Prevent SQL Injection Attacks, in: 5th InternationalWorkshop on SoftWore Engineering and Middlere, Lisbon, Portugal, 2005, pp. 106-113.

Suhas G.K., Devananda S.N., Jagadeesh R., Pareek P.K., Dixit S. (2021) Recommendation-Based Interactivity Through Cross Platform Using Big Data. In: Tavares J.M.R.S., Chakrabarti S., Bhattacharya A., Ghatak S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_60

N R, Deepak and G K, Dr. Suhas and B, Bhagappa and Kumar Pareek, Piyush, A Framework for Food recognition and predicting its Nutritional value through Convolution neural network (February 22, 2022). Available at SSRN: https://ssrn.com/abstract=4040968 or http://dx.doi.org/10.2139/ssrn.4040968


Refbacks

  • There are currently no refbacks.