MACHINE LEARNING MECHANISMS IN SECURE IOT REQUISITIONS WITH IDENTITY-BASED ENCRYPTION

Published 31 July 2020 •  vol 13  •  no 7  • 


Authors:

 

Swetha Sindhe, Dept of CSE, Vasavi College of Engineering, Hyderabad, India
Sunil Chandolu, Dept of CSE, Vasavi College of Engineering, Hyderabad, India

Abstract:

 

Machine learning has been embraced generally to performance expectations and classification. Executing machine learning builds security dangers when the calculation procedure includes delicate information on preparing and testing calculations. We present a proposed framework to ensure Machine learning motors in IoT condition without altering inner Machine learning design. Our proposed framework is intended for secret wordless and disposed of the outsider in executing Machine learning exchanges. To assess our proposed framework, we direct exploratory with Machine learning exchanges on IoT load up and measure calculation time every exchange. The test results show that our proposed framework can address security issues on Machine learning calculation with low time utilization.

Keywords:

 

Machine Learning, CP-ABE, Pairing Encryption, Security System

References:

 

[1] Barreno, M, Nelson, M, Joseph A.D, "The security of AI," Machine Learning, vol. 81, no. 2, pp. 121–148, Nov 2010.
[2] Liao, X, Ding, L, and Wang, Y, "Secure AI, a short diagram," in 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement - Companion, Jun 2011, pp. 26–29.
[3] Kearns, M, "Learning within the sight of pernicious blunders," SIAM Journal on Computing, vol. 22, no. 4, pp. 807–837, 1993.
[4] Zhang, D, Chen, X, Wang, D, "An overview on community profound learning and protection saving," in 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), Jun 2018, pp. 652–658.
[5] Shamir, A, "Personality based cryptosystems and mark plans," in Advances in Cryptology, Blakley, G. R and Chaum, D, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985, pp. 47–53.
[6] Boneh, D and Franklin, M, "Character based encryption from the weil blending," in Advances in Cryptology — CRYPTO 2001, J. Kilian, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001, pp. 213–229.
[7] Shamir, A, "Character based cryptosystems and mark plans," in Advances in Cryptology, Blakley, G. R and Chaum, D, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985, pp. 47–53.
[8] Murphy, K. P, Machine Learning: A Probabilistic Perspective. The MIT Press, 2012.
[9] Bethencourt, J, Sahai, A, and Waters, B, "Ciphertext-strategy characteristic based encryption," in Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP '07. IEEE Computer Society, 2007, pp. 321–334.
[10] Balfanz, D, Durfee, G, Shankar, N, Smetters, D, Staddon, J, and Wong, H. C, "Mystery handshakes from matching based key understandings," in Security and Privacy, 2003.Symposium on, May 2003, pp. 180–196.
[11] Castelluccia. C, Jarecki. S, and Tsudik. G, "Brief declaration: Secret handshakes from ca-careless encryption," in Proceedings of the Twenty-third Annual ACM Symposium on Principles of Distributed Computing, ser. PODC '04. NY, USA: ACM, 2004, pp. 394–394.
[12] Waters. B, "Cipher text-arrangement property based encryption: An expressive, efficient, and provably secure acknowledgment," in Proceedings of the fourteenth International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography, ser. PKC'11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 53–70.
[13] LeCun. Y and Cortes. C, "MNIST written by hand digit database," 2010.
[14] Exhaust. P, Vanhoucke.V, Vasudevan.V, Vie'gas.F, and Zheng.X, "TensorFlow: Large-scale AI on heterogeneous frameworks," 2015, programming accessible from tensorflow.org. [Online]. Accessible: https://www.tensorflow.org/
[15] Oliphant. T, "NumPy: A manual for NumPy," USA: Trelgol Publishing, 2006.

Citations:

 

APA:
Sindhe, S., & Chandolu, S (2020). Machine Learning Mechanisms in Secure IoT Requisitions with Identity-Based Encryption. International Journal of Control and Automation (IJCA), ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, 13(7), 1-10. doi: 10.33832/ijca.2020.13.7.01.

MLA:
Sindhe, Swetha, et al. “Machine Learning Mechanisms in Secure IoT Requisitions with Identity-Based Encryption.” International Journal of Control and Automation, ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, vol. 13, no. 7, 2020, pp. 1-10. IJCA, http://article.nadiapub.com/IJCA/vol13_no7/1.html.

IEEE:
[1] S. Sindhe, and S. Chandolu, "Machine Learning Mechanisms in Secure IoT Requisitions with Identity-Based Encryption." International Journal of Control and Automation (IJCA), ISSN: 2005-4297 (Print); 2207-6387 (Online), NADIA, vol. 13, no. 7, pp. 1-10, July 2020.