2022
DOI: 10.1007/s11042-022-13163-w
|View full text |Cite
|
Sign up to set email alerts
|

ISC-MTI: An IPFS and smart contract-based framework for machine learning model training and invocation

Abstract: Due to centralized storage, centralization problems are common in machine learning model training and invocation, which makes train data and trained models extremely vulnerable to tampering and stealing. A safe framework for training and invoking models called ISC-MTI (IPFS (InterPlanetary File System) and Smart Contract-Based Method for Storage and Invocation of Machine Learning Mobel) is proposed in this paper. The framework uses IPFS as the storage solution, EOS (Enterprise Operation System) blockchain as t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 31 publications
(9 reference statements)
0
0
0
Order By: Relevance
“…Additionally, for the authentication of communicating nodes, he adopted a digital signature algorithm that integrates both ECC and DSA, termed ECDSA. Lin et al [28] presented a composite cryptographic approach that leverages AES and RSA. In this method, RSA encrypts the AES key, while AES encrypts the data stored within the blockchain.…”
Section: Hybrid Cipher Algorithm Based On Aes and Eccmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, for the authentication of communicating nodes, he adopted a digital signature algorithm that integrates both ECC and DSA, termed ECDSA. Lin et al [28] presented a composite cryptographic approach that leverages AES and RSA. In this method, RSA encrypts the AES key, while AES encrypts the data stored within the blockchain.…”
Section: Hybrid Cipher Algorithm Based On Aes and Eccmentioning
confidence: 99%
“…Given the limitations of algorithms such as AES, DES, and RSA, including challenges in key management and lower security strength, this paper selects ECC, the AES+RSA hybrid cryptographic algorithm [28], and the AES+ECC hybrid cryptographic algorithm HAE proposed herein for comparative analysis, as depicted in Figure 9. Given the limitations of algorithms such as AES, DES, and RSA, including challenges in key management and lower security strength, this paper selects ECC, the AES+RSA hybrid cryptographic algorithm [28], and the AES+ECC hybrid cryptographic algorithm HAE proposed herein for comparative analysis, as depicted in Figure 9. For the same data size, the time required for encryption and decryption by the two hybrid cryptographic algorithms is significantly less than that of the ECC algorithm.…”
Section: Security Analysismentioning
confidence: 99%