Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
5 results
Search Results
Item Comparative evaluation of algorithms for effective data leakage detection(2013) Kumar, A.; Goyal, A.; Kumar, A.; Chaudhary, N.K.; Kamath S․, S.S.Researchers have proposed several mechanisms to secure data from unauthorized use but there is very less work in the field of detecting and managing an authorized or trustworthy agent that has caused a data leak to some third party advertently or unknowingly. In this paper, we implement methods aimed at improving the odds of detecting such leakages when a distributer's sensitive data has been leaked by trustworthy agents and also to possibly identify the agent(s) that leaked the data. We also implement some data allocation strategies that can improve the probability of identifying leakages and can also be used to assess the likelihood of a leak at a particular agent assuming the fact that the data was not simply guessed by the third party where the leaked data set has been found. We also propose new allocation strategies that work on the basis of No-Wait model, i.e. agent does not need to wait for other agents' allocation and it is different from already proposed model that makes an agent wait for others. These methods do not rely on the alterations of the distributed data, but rather focus on minimizing the overlapping of the allocated data items to various agents, thus facilitating an exact determination of the guilty agent in a particular data leakage scenario. © 2013 IEEE.Item Efficient privacy preserving ranked search over encrypted data(Institute of Electrical and Electronics Engineers Inc., 2016) Praseed, A.; Sudheesh, R.K.; Chandrasekaran, K.Cloud computing and its ever so increasing prominence has rendered it as an unavoidable component for data storage and other data services. The security challenges of storing sensitive data on the cloud is reduced to an extent by the Encryption of data, though in the process of encrypted data search, efficiency is compromised. The encrypted data on the cloud can be retrieved using Searchable Symmetric Encryption (SSE). The current work uses multi-keyword searchable encryption scheme with top-k retrieval to avoid compromises on data privacy occurred by using Order Preserving Encryption schemes. The encryption scheme uses homomorphic encryption and vector space model. The vector space model provides the required search accuracy. The homomorphic encryption allows majority of the computation to be done at the server side while concealing the sensitive data. The user alone can identify the final result of the relevance calculation and request for the actual file. In this paper, phrase searching is included to improve the search results on the encrypted data. To accomplish this we maintain a list of the keyword locations in the encrypted file index. The cloud server, which we assume to be honest-but-curious, operates on these encrypted values and identifies if the words occur in close proximity without knowing the actual locations of these words and the words itself. © 2015 IEEE.Item Evaluation of Machine Learning approaches for resource constrained IIoT devices(Institute of Electrical and Electronics Engineers Inc., 2021) Akubathini, P.; Chouksey, S.; Satheesh, H.S.Resource-constrained devices such as sensors, industrial controllers, analyzers etc., mostly contain limited computational capacity and memory. They are largely deployed in all industries and have been generating a huge amount of data. This data is sent to the cloud servers where various Machine Learning (ML) algorithms are applied to perform the analysis or prediction as per the application. In this process, communication requires bandwidth and time. Since the data is sent into the network, the privacy of the data is not guaranteed. Cloud servers consume a huge amount of power. To reduce these cost factors, the machine learning models are compressed and optimized such that they can fit and run in small footprint devices. The Federated Learning (FL) approach at the edge device level promises to address the data privacy and bandwidth related issues. Since it is a decentralized learning method across a set of devices, the performance of the model also improves. This paper describes and evaluates the machine learning algorithms with various compression methods suitable for resource-constrained IIoT devices and federated learning approach, particularly for time series data applications. Simulation results show that FastGRNN algorithm gives the least model size compared to the traditional RNN algorithms for time series. © 2021 IEEE.Item Abdominal Multi-Organ Segmentation Using Federated Learning(Institute of Electrical and Electronics Engineers Inc., 2024) Yadav, G.; Annappa, B.; Sachin, D.N.Multi-organ segmentation refers to precisely de-lineating and identifying multiple organs or structures within medical images, such as Computed Tomography (CT) scans or Magnetic Resonance Imaging (MRI), to outline boundaries and regions for each organ accurately. Medical imaging is crucial to comprehending and diagnosing a wide range of illnesses for which accurate multi-organ image segmentation is often required for successful analysis. Due to the delicate nature of medical data, traditional methods for multi-organ segmentation include centralizing data, which presents serious privacy problems. This centralized training strategy impedes innovation and collaborative efforts in healthcare by raising worries about patient confidentiality, data security, and reg-ulatory compliance. The development of deep learning-based image segmentation algorithms has been hindered by the lack of fully annotated datasets, and this issue is exacerbated in multi-organ segmentation. Federated Learning (FL) addresses privacy concerns in multi-organ segmentation by enabling model training across decentralized institutions without sharing raw data. Our proposed FL-based model for CT scans ensures data privacy while achieving accurate multi-organ segmentation. By leveraging FL techniques, this paper collaboratively trains segmentation models on local datasets held by distinct medical institutions. The expected outcomes encompass achieving high Dice Similarity Coefficient (DSC) metrics and validating the efficacy of the proposed FL approach in attaining precise and accurate segmentation across diverse medical imaging datasets. © 2024 IEEE.Item Enhancing Healthcare AI with Cross-Silo Personalized Federated Learning on Naturally Split Heterogeneous Data(Institute of Electrical and Electronics Engineers Inc., 2024) Mukeshbhai, A.N.; Annappa, B.; Sachin, D.N.The potential of Artificial Intelligence (AI) in health-care is unavoidable. However, its success depends on the availabil-ity of large, high-quality datasets. Because of data heterogeneity across institutions and privacy concerns, traditional centralized Machine Learning (ML) approaches often face difficulties in this field. Federated Learning (FL) allows collaborative model training without requiring the transfer of sensitive patient data from the original institution. Recent research in FL within the healthcare domain has predominantly relied on centralized datasets, which do not represent real-time data heterogeneity and made assumptions by random data splitting to different medical client institutions. Additionally, it may be challenging for a single global model to encompass the diverse characteristics of various healthcare settings accurately. This paper examines the application of Personalized Federated Learning (PFL) in realistic cross-silo healthcare scenarios with federated natural split datasets in different medical client institutions. This paper discusses the experiments conducted on brain segmentation, survival prediction, melanoma classification, and heart disease di-agnosis. Our experiments show that the proposed PFL techniques consistently improve local model performance over standard FL strategies by up to 10% in different medical use cases. © 2024 IEEE.
