Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 11 de 11
Filtrar
1.
PLoS One ; 18(11): e0292841, 2023.
Artículo en Inglés | MEDLINE | ID: mdl-37939045

RESUMEN

Bitcoin is a decentralized digital cryptocurrency. Its network is a Peer-to-peer(P2P) network consisting of distributed nodes. Some of these nodes are always online and in this article are called Bitcoin backbone nodes. They have a significant impact on the stability and security of the Bitcoin network, so it is meaningful to analyze and discuss them. In this paper, we first continuously collect information about Bitcoin nodes from July 2021 through June 2022 (which is the longest duration of data collection to date). In total, we collect information on 127,613 Bitcoin nodes. At the same time, we conclude that the fluctuation of Bitcoin nodes is directly related to the fluctuation of onion network nodes. Further, we filtered 2694 Bitcoin backbone nodes based on our algorithm. By analyzing the backbone nodes' attributes such as geographic distribution, client version, operator, node function, and abnormal port number, it is demonstrated that these nodes are centralized and play an important role in the Bitcoin network. Based on this, three unsupervised machine learning algorithms are selected to cluster multiple attributes of backbone nodes in a more scientific way. In this paper, the whole process from data collection to cluster analysis is completed and the best results are obtained by comparison. The experiments proved the existence of centralization of Bitcoin backbone nodes and obtained the number of nodes within each cluster. Finally, cluster nodes are de-anonymized based on the optimal results. Through our experiments, we obtain organizational information about the deployers of 103 nodes, linking the Bitcoin backbone nodes to the real world, thus accurately demonstrating the existence of Bitcoin centrality.


Asunto(s)
Algoritmos , Humanos , Análisis por Conglomerados , Recolección de Datos
2.
Sensors (Basel) ; 23(16)2023 Aug 11.
Artículo en Inglés | MEDLINE | ID: mdl-37631642

RESUMEN

Currently, decentralized redactable blockchains have been widely applied in IoT systems for secure and controllable data management. Unfortunately, existing works ignore policy privacy (i.e., the content of users' redaction policies), causing severe privacy leakage threats to users since users' policies usually contain large amounts of private information (e.g., health conditions and geographical locations) and limiting the applications in IoT systems. To bridge this research gap, we propose PFRB, a policy-hidden fine-grained redactable blockchain in decentralized blockchain-based IoT systems. PFRB follows the decentralized settings and fine-grained chameleon hash-based redaction in existing redactable blockchains. In addition, PFRB hides users' policies during policy matching such that apart from successful policy matching, users' policy contents cannot be inferred and valid redactions cannot be executed. Some main technical challenges include determining how to hide policy contents and support policy matching. Inspired by Newton's interpolation formula-based secret sharing, PFRB converts policy contents into polynomial parameters and utilizes multi-authority attribute-based encryption to further hide these parameters. Theoretical analysis proves the correctness and security against the chosen-plaintext attack. Extensive experiments on the FISCO blockchain platform and IoT devices show that PFRB achieves competitive efficiency over current redactable blockchains.

3.
Artículo en Inglés | MEDLINE | ID: mdl-37402196

RESUMEN

In this article, we propose the concept of random polynomial neural networks (RPNNs) realized based on the architecture of polynomial neural networks (PNNs) with random polynomial neurons (RPNs). RPNs exhibit generalized polynomial neurons (PNs) based on random forest (RF) architecture. In the design of RPNs, the target variables are no longer directly used in conventional decision trees, and the polynomial of these target variables is exploited here to determine the average prediction. Unlike the conventional performance index used in the selection of PNs, the correlation coefficient is adopted here to select the RPNs of each layer. When compared with the conventional PNs used in PNNs, the proposed RPNs exhibit the following advantages: first, RPNs are insensitive to outliers; second, RPNs can obtain the importance of each input variable after training; third, RPNs can alleviate the overfitting problem with the use of an RF structure. The overall nonlinearity of a complex system is captured by means of PNNs. Moreover, particle swarm optimization (PSO) is exploited to optimize the parameters when constructing RPNNs. The RPNNs take advantage of both RF and PNNs: it exhibits high accuracy based on ensemble learning used in the RF and is beneficial to describe high-order nonlinear relations between input and output variables stemming from PNNs. Experimental results based on a series of well-known modeling benchmarks illustrate that the proposed RPNNs outperform other state-of-the-art models reported in the literature.

4.
Entropy (Basel) ; 25(7)2023 Jul 13.
Artículo en Inglés | MEDLINE | ID: mdl-37510005

RESUMEN

Machine learning has become increasingly popular in academic and industrial communities and has been widely implemented in various online applications due to its powerful ability to analyze and use data. Among all the machine learning models, decision tree models stand out due to their great interpretability and simplicity, and have been implemented in cloud computing services for various purposes. Despite its great success, the integrity issue of online decision tree prediction is a growing concern. The correctness and consistency of decision tree predictions in cloud computing systems need more security guarantees since verifying the correctness of the model prediction remains challenging. Meanwhile, blockchain has a promising prospect in two-party machine learning services as the immutable and traceable characteristics satisfy the verifiable settings in machine learning services. In this paper, we initiate the study of decision tree prediction services on blockchain systems and propose VDT, a Verifiable Decision Tree prediction scheme for decision tree prediction. Specifically, by leveraging the Merkle tree and hash function, the scheme allows the service provider to generate a verification proof to convince the client that the output of the decision tree prediction is correctly computed on a particular data sample. It is further extended to an update method for a verifiable decision tree to modify the decision tree model efficiently. We prove the security of the proposed VDT schemes and evaluate their performance using real datasets. Experimental evaluations show that our scheme requires less than one second to produce verifiable proof.

5.
Neural Netw ; 153: 450-460, 2022 Sep.
Artículo en Inglés | MEDLINE | ID: mdl-35816858

RESUMEN

In this paper, we introduce a stochastic fuzzy time-varying minimum regret path problem (SFTMRP), which combines the characteristics of the min-max regret path and maximum probability path as a variant of the stochastic fuzzy time-varying shortest path problem, and its purpose is to find a path with the minimum regret degree in a given stochastic fuzzy time-varying network. To address this problem, we propose a random fuzzy delay neural network (RFDNN) based on novel random fuzzy delay neurons and without any training requirements. The random fuzzy delay neuron consists of six layers: an input layer, receiving layer, status layer, generation layer, sending layer, and output layer. Among them, the input and output layers are the ports of communication between neurons, and the receiving layer, status layer, generate layer, and sending layer are the information processing units of neurons. The information exchange between neurons is characterized by two kinds of signals: the shortest path signal and the maximum probability solution signal. The theoretical analysis of the proposed algorithm is carried out with respect to time-complexity and correctness. The numerical example and experimental results on 25 randomly generated stochastic fuzzy time-varying road networks with different numbers of 1000-5000 nodes show that the performance of the proposed algorithm is significantly better than that of existing algorithms.


Asunto(s)
Lógica Difusa , Redes Neurales de la Computación , Algoritmos , Emociones , Neuronas
6.
Artículo en Inglés | MEDLINE | ID: mdl-37015551

RESUMEN

Fuzzy min-max neural network (FMNN) is one kind of three-layer models based on hyperboxes that are constructed in a sequential way. Such a sequential mechanism inevitably leads to the input order and overlap region problem. In this study, we propose a deep FMNN (DFMNN) based on initialization and optimization operation to overcome these limitations. Initialization operation that can solve the input order problem is to design hyperboxes in a simultaneous way, and side parameters have been proposed to control the size of hyperboxes. Optimization operation that can eliminate overlap region problem is realized by means of deep layers, where the number of layers is immediately determined when the overlap among hyperboxes is eliminated. In the optimization process, each layer consists of three sections, namely, the partition section, combination section, and union section. The partition section aims to divide the hyperboxes into a nonoverlapping hyperbox set and an overlapping hyperbox set. The combination section eliminates the overlap problem of overlapping hyperbox set. The union section obtains the optimized hyperbox set in the current layer. DFMNN is evaluated based on a series of benchmark datasets. A comparative analysis illustrates that the proposed DFMNN model outperforms several models previously reported in the literature.

7.
Comput Stand Interfaces ; 77: 103520, 2021 Aug.
Artículo en Inglés | MEDLINE | ID: mdl-33584007

RESUMEN

The current pandemic situation due to COVID-19 is seriously affecting our daily work and life. To block the propagation of infectious diseases, an effective contact tracing mechanism needs to be implemented. Unfortunately, existing schemes have severe privacy issues that jeopardize the identity-privacy and location-privacy for both users and patients. Although some privacy-preserving systems have been proposed, there remain several issues caused by centralization. To mitigate this issues, we propose a Privacy-preserving contact Tracing scheme in 5G-integrated and Blockchain-based Medical applications, named PTBM. In PTBM, the 5G-integrated network is leveraged as the underlying infrastructure where everyone can perform location checking with his mobile phones or even wearable devices connected to 5G network to find whether they have been in possible contact with a diagnosed patient without violating their privacy. A trusted medical center can effectively trace the patients and their corresponding close contacts. Thorough security and performance analysis show that the proposed PTBM scheme achieves privacy protection, traceability, reliability, and authentication, with high computation & communication efficiency and low latency.

8.
Sensors (Basel) ; 19(6)2019 Mar 13.
Artículo en Inglés | MEDLINE | ID: mdl-30871229

RESUMEN

The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles' speed information is an effective way to monitor the traffic conditions and avoid vehicles' congestion, however it may threaten vehicles' location and trajectory privacy. Motivated by the fact that traffic monitoring does not need to know each individual vehicle's speed and the average speed would be sufficient, we propose a privacy-preserving traffic monitoring (PPTM) scheme to aggregate vehicles' speeds at different locations. In PPTM, the roadside unit (RSU) collects vehicles' speed information at multiple road segments, and further cooperates with a service provider to calculate the average speed information for every road segment. To preserve vehicles' privacy, both homomorphic Paillier cryptosystem and super-increasing sequence are adopted. A comprehensive security analysis indicates that the proposed PPTM can preserve vehicles' identities, speeds, locations, and trajectories privacy from being disclosed. In addition, extensive simulations are conducted to validate the effectiveness and efficiency of the proposed PPTM scheme.

9.
J Med Syst ; 42(8): 141, 2018 Jun 28.
Artículo en Inglés | MEDLINE | ID: mdl-29956058

RESUMEN

Medical care has become an indispensable part of people's lives, with a dramatic increase in the volume of medical data (e.g., diagnosis certificates and medical records). Medical data, however, is easily stolen, tampered with, or even completely deleted. If the above occurs, medical data cannot be recorded or retrieved in a reliable manner, resulting in delay treatment progress, even endanger the patient's life. In this paper, we propose a novel blockchain-based data preservation system (DPS) for medical data. To provide a reliable storage solution to ensure the primitiveness and verifiability of stored data while preserving privacy for users, we leverage the blockchain framework. With the proposed DPS, users can preserve important data in perpetuity, and the originality of the data can be verified if tampering is suspected. In addition, we use prudent data storage strategies and a variety of cryptographic algorithms to guarantee user privacy; e.g., an adversary is unable to read the plain text even if the data are stolen. We implement a prototype of the DPS based on the real world blockchain-based platform Ethereum. Performance evaluation results demonstrate the effectiveness and efficiency of the proposed system.


Asunto(s)
Algoritmos , Seguridad Computacional , Registros Electrónicos de Salud , Humanos , Privacidad
10.
Sensors (Basel) ; 18(5)2018 May 22.
Artículo en Inglés | MEDLINE | ID: mdl-29789475

RESUMEN

With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.

11.
Sensors (Basel) ; 17(3)2017 Mar 03.
Artículo en Inglés | MEDLINE | ID: mdl-28273795

RESUMEN

Air pollution has become one of the most pressing environmental issues in recent years. According to a World Health Organization (WHO) report, air pollution has led to the deaths of millions of people worldwide. Accordingly, expensive and complex air-monitoring instruments have been exploited to measure air pollution. Comparatively, a vehicle sensing system (VSS), as it can be effectively used for many purposes and can bring huge financial benefits in reducing high maintenance and repair costs, has received considerable attention. However, the privacy issues of VSS including vehicles' location privacy have not been well addressed. Therefore, in this paper, we propose a new privacy-preserving data aggregation scheme, called PAVS, for VSS. Specifically, PAVS combines privacy-preserving classification and privacy-preserving statistics on both the mean E(·) and variance Var(·), which makes VSS more promising, as, with minimal privacy leakage, more vehicles are willing to participate in sensing. Detailed analysis shows that the proposed PAVS can achieve the properties of privacy preservation, data accuracy and scalability. In addition, the performance evaluations via extensive simulations also demonstrate its efficiency.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA