2020
DOI: 10.1109/access.2020.2971519
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Machine Learning Oriented Data Integrity Verification Scheme in Cloud Computing Environment

Abstract: Distributed Machine Learning (DML) is one of the core technologies for Artificial Intelligence (AI). However, in the existing distributed machine learning framework, the data integrity is not taken into account. If network attackers forge the data, modify the data, or destroy the data, the training model in the distributed machine learning system will be greatly affected, and the training results are led to be wrong. Therefore, it is crucial to guarantee the data integrity in the DML. In this paper, we propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(45 citation statements)
references
References 25 publications
(72 reference statements)
0
45
0
Order By: Relevance
“…Unfortunately, this scheme did not support batch and distributed verification by multi-verifiers. The authors of [ 23 ] proposed a distributed machine learning-oriented data integrity verification scheme in a cloud computing environment. They adopted PDP as a sampling auditing algorithm in their scheme and generated a random number called a blinding factor and applied a discrete logarithm problem (DLP) to construct a proof and ensure privacy protection in the TPA verification process.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Unfortunately, this scheme did not support batch and distributed verification by multi-verifiers. The authors of [ 23 ] proposed a distributed machine learning-oriented data integrity verification scheme in a cloud computing environment. They adopted PDP as a sampling auditing algorithm in their scheme and generated a random number called a blinding factor and applied a discrete logarithm problem (DLP) to construct a proof and ensure privacy protection in the TPA verification process.…”
Section: Related Workmentioning
confidence: 99%
“…It removes the intermediary and enables peer-to-peer interactions between nodes, therefore enhancing trust. The other four works [ 17 , 20 , 21 , 23 ] did not provide these two points because they rely on the credibility of the third-party auditor (TPA), which is not ideal in real case circumstances. Distributed verification.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…A comparison of three aspects of the suggested method with earlier research [4,7,11,12,[21][22][23] was later briefly described, as well as evidence of the suggested work's effectiveness. Figure 5 displays the computational cost of signature generation time with various data blocks 100,150,200,250,300,350,400 for the proposed scheme and the research papers [4,7,11,22,23].…”
Section: Computational Overheadmentioning
confidence: 99%
“…Nowadays, a concept of distributed and decentralized artificial intelligence has been widely reported, which shows upcoming era in machine learning integrated fields of research such as artificial intelligence in distributed ledger technology [13], artificial intelligence as IoT [14,15], distributed security solution [16,17], etc. Surprisingly, these integrations are all based on a distributed and decentralized concept.…”
Section: Multi-agent and Decentralized Systemmentioning
confidence: 99%