In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dy...In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is proposed.In our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret sharing.This guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data lifetime.Besides confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent encryption.The analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost.展开更多
As an emerging discipline,machine learning has been widely used in artificial intelligence,education,meteorology and other fields.In the training of machine learning models,trainers need to use a large amount of pract...As an emerging discipline,machine learning has been widely used in artificial intelligence,education,meteorology and other fields.In the training of machine learning models,trainers need to use a large amount of practical data,which inevitably involves user privacy.Besides,by polluting the training data,a malicious adversary can poison the model,thus compromising model security.The data provider hopes that the model trainer can prove to them the confidentiality of the model.Trainer will be required to withdraw data when the trust collapses.In the meantime,trainers hope to forget the injected data to regain security when finding crafted poisoned data after the model training.Therefore,we focus on forgetting systems,the process of which we call machine unlearning,capable of forgetting specific data entirely and efficiently.In this paper,we present the first comprehensive survey of this realm.We summarize and categorize existing machine unlearning methods based on their characteristics and analyze the relation between machine unlearning and relevant fields(e.g.,inference attacks and data poisoning attacks).Finally,we briefly conclude the existing research directions.展开更多
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable privat...The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme.展开更多
As the top of the pile foundation in high-pile wharf is connected to the superstructure and most of the pile bodies are located below the water surface, traditional damage detection methods are greatly limited in thei...As the top of the pile foundation in high-pile wharf is connected to the superstructure and most of the pile bodies are located below the water surface, traditional damage detection methods are greatly limited in their application to pile foundation in service. In the present study, a new method for pile foundation damage detection is developed based on the curve shape of the curvature mode difference(CMD) before and after damage. In the method, the influence at each node on the overall CMD curve shape is analyzed through a data deletion model, statistical characteristic indexes are established to reflect the difference between damaged and undamaged units, and structural damage is accurately detected. The effectiveness and robustness of the method are verified by a finite element model(FEM) of high-pile wharf under different damage conditions and different intensities of Gaussian white noise. The applicability of the method is then experimentally validated by a physical model of high-pile wharf. Both the FEM and the experimental results show that the method is capable of detecting pile foundation damage in noisy curvature mode and has strong application potential.展开更多
This paper transforms fuzzy number into clear number using the centroid method, thus we can research the traditional linear regression model which is transformed from the fuzzy linear regression model. The model’s in...This paper transforms fuzzy number into clear number using the centroid method, thus we can research the traditional linear regression model which is transformed from the fuzzy linear regression model. The model’s input and output are fuzzy numbers, and the regression coefficients are clear numbers. This paper considers the parameter estimation and impact analysis based on data deletion. Through the study of example and comparison with other models, it can be concluded that the model in this paper is applied easily and better.展开更多
基金supported by the National Key Basic Research Program of China(973 program) under Grant No.2012CB315901
文摘In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dynamics and deduplication,is proposed.In our scheme,data blocks are encrypted by a two-level encryption approach,in which the control keys are generated from a key derivation tree,encrypted by an All-OrNothing algorithm and then distributed into DHT network after being partitioned by secret sharing.This guarantees that only authorized users can recover the control keys and then decrypt the outsourced data in an ownerspecified data lifetime.Besides confidentiality,data dynamics and deduplication are also achieved separately by adjustment of key derivation tree and convergent encryption.The analysis and experimental results show that our scheme can satisfy its security goal and perform the assured deletion with low cost.
基金supported by the National Key Research and Development Program of China(2020YFC2003404)the National Natura Science Foundation of China(No.62072465,62172155,62102425,62102429)+1 种基金the Science and Technology Innovation Program of Hunan Province(Nos.2022RC3061,2021RC2071)the Natural Science Foundation of Hunan Province(No.2022JJ40564).
文摘As an emerging discipline,machine learning has been widely used in artificial intelligence,education,meteorology and other fields.In the training of machine learning models,trainers need to use a large amount of practical data,which inevitably involves user privacy.Besides,by polluting the training data,a malicious adversary can poison the model,thus compromising model security.The data provider hopes that the model trainer can prove to them the confidentiality of the model.Trainer will be required to withdraw data when the trust collapses.In the meantime,trainers hope to forget the injected data to regain security when finding crafted poisoned data after the model training.Therefore,we focus on forgetting systems,the process of which we call machine unlearning,capable of forgetting specific data entirely and efficiently.In this paper,we present the first comprehensive survey of this realm.We summarize and categorize existing machine unlearning methods based on their characteristics and analyze the relation between machine unlearning and relevant fields(e.g.,inference attacks and data poisoning attacks).Finally,we briefly conclude the existing research directions.
基金supported by the National Natural Science Foundation of China under grant 61972207,U1836208,U1836110,61672290the Major Program of the National Social Science Fund of China under Grant No.17ZDA092+2 种基金by the National Key R&D Program of China under grant 2018YFB1003205by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fundby the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fund.
文摘The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data resources.Generally speaking,EHRs are widely used in blockchain-based medical data platforms.EHRs are valuable private assets of patients,and the ownership belongs to patients.While recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit doctors.In order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate Blockchain.This paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted EHRs.At the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical institutions.In addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical records.Under the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the process.System analysis and security analysis illustrate the completeness and feasibility of the scheme.
基金financially supported by the National Natural Science Foundation of China (Grant Nos. 51709093 and 51679081)Fujian Provincial Department of Transportation Science and Technology Development Project (Grant No. 201708)Hohai University Student Innovation and Entrepreneurship Training Project (Grant No. 201910294014Z)。
文摘As the top of the pile foundation in high-pile wharf is connected to the superstructure and most of the pile bodies are located below the water surface, traditional damage detection methods are greatly limited in their application to pile foundation in service. In the present study, a new method for pile foundation damage detection is developed based on the curve shape of the curvature mode difference(CMD) before and after damage. In the method, the influence at each node on the overall CMD curve shape is analyzed through a data deletion model, statistical characteristic indexes are established to reflect the difference between damaged and undamaged units, and structural damage is accurately detected. The effectiveness and robustness of the method are verified by a finite element model(FEM) of high-pile wharf under different damage conditions and different intensities of Gaussian white noise. The applicability of the method is then experimentally validated by a physical model of high-pile wharf. Both the FEM and the experimental results show that the method is capable of detecting pile foundation damage in noisy curvature mode and has strong application potential.
文摘This paper transforms fuzzy number into clear number using the centroid method, thus we can research the traditional linear regression model which is transformed from the fuzzy linear regression model. The model’s input and output are fuzzy numbers, and the regression coefficients are clear numbers. This paper considers the parameter estimation and impact analysis based on data deletion. Through the study of example and comparison with other models, it can be concluded that the model in this paper is applied easily and better.