Skip to main content

2022 | OriginalPaper | Buchkapitel

Trustworthy Machine Learning for Cloud-Based Internet of Things (IoT)

verfasst von : Saumya Yadav, Rakesh Chandra Joshi, Divakar Yadav

Erschienen in: Transforming Management with AI, Big-Data, and IoT

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the rise of new technology, the Internet of Things (IoT) undertakes a dynamic and central role in healthcare, smart homes, retail analytics, agricultural machinery, etc. Cloud computing serves a platform which is used as a base technology for IoT by allowing data transfer, storage, and accessing applications through the Internet. Association of cloud computing with IoT can provide countless opportunities but there is also drawback of various security threats. IoT with cloud computing is a distribution system which is vulnerable to various malicious attacks. Machine learning is a powerful tool for analysing the data and predicting normal or abnormal behaviour of connected IoT devices. It is a subsidiary of artificial intelligence which focuses on creating applications that learn from big data and generate results without being explicitly programmed. It leads to the transformation in security of IoT systems from a manageable communication between the devices to secure IoT-based systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aitken, M., Toreini, E., Carmichael, P., Coopamootoo, K., Elliott, K., & van Moorsel, A. (2020). Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Big Data & Society, 7(1), 2053951720908892.CrossRef Aitken, M., Toreini, E., Carmichael, P., Coopamootoo, K., Elliott, K., & van Moorsel, A. (2020). Establishing a social licence for Financial Technology: Reflections on the role of the private sector in pursuing ethical data practices. Big Data & Society, 7(1), 2053951720908892.CrossRef
7.
Zurück zum Zitat Zhou, L., Wu, D., Zheng, B., & Guizani, M. (Mar. 2014). Joint physical-application layer security for wireless multimedia delivery. IEEE Communications Magazine, 52(3), 66–72.CrossRef Zhou, L., Wu, D., Zheng, B., & Guizani, M. (Mar. 2014). Joint physical-application layer security for wireless multimedia delivery. IEEE Communications Magazine, 52(3), 66–72.CrossRef
8.
Zurück zum Zitat Zhang, L., & Melodia, T. (2015, September). Hammer and anvil: The threat of a cross-layer jamming-aided data control attack in multihop wireless networks. In Proceedings of the IEEE conference on communications and network security (CNS), Florence, Italy (pp 361–369). Zhang, L., & Melodia, T. (2015, September). Hammer and anvil: The threat of a cross-layer jamming-aided data control attack in multihop wireless networks. In Proceedings of the IEEE conference on communications and network security (CNS), Florence, Italy (pp 361–369).
9.
Zurück zum Zitat Rathore, R., & Gau, C. (2014). Integrating biometric sensors into automotive Internet of Things. In Proceedings of the IEEE international conference on cloud computing and Internet of Things (CCIOT), Changchun, China (pp. 178–181). Rathore, R., & Gau, C. (2014). Integrating biometric sensors into automotive Internet of Things. In Proceedings of the IEEE international conference on cloud computing and Internet of Things (CCIOT), Changchun, China (pp. 178–181).
10.
Zurück zum Zitat Laplante, P. A., & Laplante, N. (2016). The Internet of Things in healthcare: Potential applications and challenges. IT Professional, 18(3), 2–4.CrossRef Laplante, P. A., & Laplante, N. (2016). The Internet of Things in healthcare: Potential applications and challenges. IT Professional, 18(3), 2–4.CrossRef
12.
Zurück zum Zitat Stephan, T., Al-Turjman, F., Joseph K, S., & Balusamy, B. (2020). Energy and spectrum aware unequal clustering with deep learning based primary user classification in cognitive radio sensor networks. International Journal of Machine Learning and Cybernetics. https://doi.org/10.1007/s13042-020-01154-y Stephan, T., Al-Turjman, F., Joseph K, S., & Balusamy, B. (2020). Energy and spectrum aware unequal clustering with deep learning based primary user classification in cognitive radio sensor networks. International Journal of Machine Learning and Cybernetics. https://​doi.​org/​10.​1007/​s13042-020-01154-y
13.
Zurück zum Zitat Restuccia, F., Das, S. K., & Payton, J. (2016). Incentive mechanisms for participatory sensing: Survey and research challenges. ACM Transaction on Sensor Networks, 12(2), 1–40.CrossRef Restuccia, F., Das, S. K., & Payton, J. (2016). Incentive mechanisms for participatory sensing: Survey and research challenges. ACM Transaction on Sensor Networks, 12(2), 1–40.CrossRef
16.
Zurück zum Zitat Pudil, P., & Novovicová, J. (1998). Novel methods for feature subset selection with respect to problem knowledge. In Feature extraction, construction and selection (pp. 101–116). Springer.CrossRef Pudil, P., & Novovicová, J. (1998). Novel methods for feature subset selection with respect to problem knowledge. In Feature extraction, construction and selection (pp. 101–116). Springer.CrossRef
17.
Zurück zum Zitat Zhang, L., Restuccia, F., Melodia, T., & Pudlewski, S. M. (2017, October). Learning to detect and mitigate cross-layer attacks in wireless networks: Framework and applications. In Proceedings of the IEEE conference on communications and network security (CNS), Las Vegas, NV, USA (pp. 361–369). Zhang, L., Restuccia, F., Melodia, T., & Pudlewski, S. M. (2017, October). Learning to detect and mitigate cross-layer attacks in wireless networks: Framework and applications. In Proceedings of the IEEE conference on communications and network security (CNS), Las Vegas, NV, USA (pp. 361–369).
18.
Zurück zum Zitat Cañedo, J., & Skjellum, A. (2016, December). Using machine learning to secure IoT systems. In Proceedings of the 14th IEEE annual conference on privacy security trust (PST), Auckland, New Zealand (pp. 219–222). Cañedo, J., & Skjellum, A. (2016, December). Using machine learning to secure IoT systems. In Proceedings of the 14th IEEE annual conference on privacy security trust (PST), Auckland, New Zealand (pp. 219–222).
19.
Zurück zum Zitat Hofmeyr, S. A., & Forrest, S. (2000). Architecture for an artificial immune system. Evolutionary Computation, 8(4), 443–473.CrossRef Hofmeyr, S. A., & Forrest, S. (2000). Architecture for an artificial immune system. Evolutionary Computation, 8(4), 443–473.CrossRef
20.
Zurück zum Zitat Ning, H., & Liu, H. (2012). Cyber-physical-social based security architecture for future Internet of Things. Advances in Internet of Things, 2(1), 1–7.CrossRef Ning, H., & Liu, H. (2012). Cyber-physical-social based security architecture for future Internet of Things. Advances in Internet of Things, 2(1), 1–7.CrossRef
21.
Zurück zum Zitat Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the Internet of Things. Computer, 46(4), 46–53.CrossRef Ning, H., Liu, H., & Yang, L. T. (2013). Cyberentity security in the Internet of Things. Computer, 46(4), 46–53.CrossRef
22.
Zurück zum Zitat Miettinen, M., et al. (2017, June). IoT Sentinel: Automated device-type identification for security enforcement in IoT. In Proceedings of the IEEE 37th international conference on distributed computing systems (ICDCS), Atlanta, GA, USA (pp. 2177–2184). Miettinen, M., et al. (2017, June). IoT Sentinel: Automated device-type identification for security enforcement in IoT. In Proceedings of the IEEE 37th international conference on distributed computing systems (ICDCS), Atlanta, GA, USA (pp. 2177–2184).
25.
26.
Zurück zum Zitat Papernot, N., McDaniel, P., Sinha, A., & Wellman, M. P. (2018). Sok: Security and privacy in machine learning. In 2018 IEEE European symposium on security and privacy (EuroS&P) (pp. 399–414). IEEE. Papernot, N., McDaniel, P., Sinha, A., & Wellman, M. P. (2018). Sok: Security and privacy in machine learning. In 2018 IEEE European symposium on security and privacy (EuroS&P) (pp. 399–414). IEEE.
27.
Zurück zum Zitat Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T., & Song, D. (2018, June). Robust physical-world attacks on deep learning visual classification. In Conference on computer vision and pattern recognition. Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Prakash, A., Kohno, T., & Song, D. (2018, June). Robust physical-world attacks on deep learning visual classification. In Conference on computer vision and pattern recognition.
28.
Zurück zum Zitat Al-Rubaie, M., & Chang, J. M. (2019). Privacy-preserving machine learning: Threats and solutions. IEEE Security & Privacy, 17(2), 49–58.CrossRef Al-Rubaie, M., & Chang, J. M. (2019). Privacy-preserving machine learning: Threats and solutions. IEEE Security & Privacy, 17(2), 49–58.CrossRef
29.
Zurück zum Zitat O’Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown Publishing Group.MATH O’Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown Publishing Group.MATH
30.
Zurück zum Zitat Noble, S. U. (2018). Algorithms of oppression: How search engines reinforce racism. New York University Press.CrossRef Noble, S. U. (2018). Algorithms of oppression: How search engines reinforce racism. New York University Press.CrossRef
31.
Zurück zum Zitat Kearns, M. J., Neel, S., Roth, A., & Wu, Z. S. (2018). Preventing fairness gerrymandering: Auditing and learning for subgroup fairness. In Proceedings of the 35th international conference on machine learning, ICML 2018 (pp. 2569–2577). Kearns, M. J., Neel, S., Roth, A., & Wu, Z. S. (2018). Preventing fairness gerrymandering: Auditing and learning for subgroup fairness. In Proceedings of the 35th international conference on machine learning, ICML 2018 (pp. 2569–2577).
32.
Zurück zum Zitat Liu, L., Dean, S., Rolf, E., Simchowitz, M., & Hardt, M. (2018). Delayed impact of fair machine learning. In Proceedings international conference on machine learning (Proceedings of machine learning research (PMLR)) (Vol. 80, pp. 3156–3164). Liu, L., Dean, S., Rolf, E., Simchowitz, M., & Hardt, M. (2018). Delayed impact of fair machine learning. In Proceedings international conference on machine learning (Proceedings of machine learning research (PMLR)) (Vol. 80, pp. 3156–3164).
33.
Zurück zum Zitat Bellamy, R. K. E., Dey, K., Hind, M., Hoffman, S. C., Houde, S., Kannan, K., Lohia, P., Martino, J., Mehta, S., Mojsilovic, A., Nagar, S., Ramamurthy, K. N., Richards, J. T., Saha, D., Sattigeri, P., Singh, M., Varshney, K. R., & Zhang, Y. (2018). AI fairness 360: An extensible toolkit for detecting, understanding, and mitigating unwanted algorithmic bias. CoRR, abs/1810.01943. Bellamy, R. K. E., Dey, K., Hind, M., Hoffman, S. C., Houde, S., Kannan, K., Lohia, P., Martino, J., Mehta, S., Mojsilovic, A., Nagar, S., Ramamurthy, K. N., Richards, J. T., Saha, D., Sattigeri, P., Singh, M., Varshney, K. R., & Zhang, Y. (2018). AI fairness 360: An extensible toolkit for detecting, understanding, and mitigating unwanted algorithmic bias. CoRR, abs/1810.01943.
34.
Zurück zum Zitat Doshi-Velez, F., Kortz, M., Budish, R., Bavitz, C., Gershman, S. J., O’Brien, D., Shieber, S., Waldo, J., Weinberger, D., & Wood, A. (2017). Accountability of AI under the law: The role of explanation. Berkman Center, Technical Report 18-07. Doshi-Velez, F., Kortz, M., Budish, R., Bavitz, C., Gershman, S. J., O’Brien, D., Shieber, S., Waldo, J., Weinberger, D., & Wood, A. (2017). Accountability of AI under the law: The role of explanation. Berkman Center, Technical Report 18-07.
35.
Zurück zum Zitat Koene, A., Clifton, C., Hatada, Y., Webb, H., & Richardson, R. (2019, April). A governance framework for algorithmic accountability and transparency. European Parliamentary Research Service, Technical Report PE 624.262. Koene, A., Clifton, C., Hatada, Y., Webb, H., & Richardson, R. (2019, April). A governance framework for algorithmic accountability and transparency. European Parliamentary Research Service, Technical Report PE 624.262.
36.
Zurück zum Zitat Goodman, B., & Flaxman, S. R. (2017). European Union regulations on algorithmic decision-making and a “right to explanation”. AI Magazine, 38(3), 50–57.CrossRef Goodman, B., & Flaxman, S. R. (2017). European Union regulations on algorithmic decision-making and a “right to explanation”. AI Magazine, 38(3), 50–57.CrossRef
37.
Zurück zum Zitat Wachter, S., Mittelstad, B., & Floridi, L. (Jun. 2017). Why a right to explanation of automated decision-making does not exist in the general data protection regulation. International Data Privacy Law, 7(2), 76–99.CrossRef Wachter, S., Mittelstad, B., & Floridi, L. (Jun. 2017). Why a right to explanation of automated decision-making does not exist in the general data protection regulation. International Data Privacy Law, 7(2), 76–99.CrossRef
38.
Zurück zum Zitat Miller, T. (2019). Explanation in artificial intelligence: Insights from the social sciences. Artificial Intelligence, 267, 1–38.MathSciNetCrossRef Miller, T. (2019). Explanation in artificial intelligence: Insights from the social sciences. Artificial Intelligence, 267, 1–38.MathSciNetCrossRef
39.
Zurück zum Zitat Lipton, Z. C. (2018). The mythos of model interpretability. Queue, 16(3), 30:31–30:57. Lipton, Z. C. (2018). The mythos of model interpretability. Queue, 16(3), 30:31–30:57.
40.
Zurück zum Zitat Huysmans, J., Dejaeger, K., Mues, C., Vanthienen, J., & Baesens, B. (2011). An empirical evaluation of the comprehensibility of decision table, tree and rule based predictive models. Decision Support Systems, 51(1), 141–154.CrossRef Huysmans, J., Dejaeger, K., Mues, C., Vanthienen, J., & Baesens, B. (2011). An empirical evaluation of the comprehensibility of decision table, tree and rule based predictive models. Decision Support Systems, 51(1), 141–154.CrossRef
41.
Zurück zum Zitat Doshi-Velez, F. & Kim, B. (2017, February). Towards a rigorous science of interpretable machine learning. ArXiv e-prints. Doshi-Velez, F. & Kim, B. (2017, February). Towards a rigorous science of interpretable machine learning. ArXiv e-prints.
42.
Zurück zum Zitat Freedman, R., Schaich Borg, J., Sinnott-Armstrong, W., Dickerson, J. P., & Conitzer, V., (2018). Adapting a kidney exchange algorithm to align with human values. In Proceedings of the 2018 AAAI/ACM conference on AI, ethics, and society, AIES ’18 (pp. 115–115). Freedman, R., Schaich Borg, J., Sinnott-Armstrong, W., Dickerson, J. P., & Conitzer, V., (2018). Adapting a kidney exchange algorithm to align with human values. In Proceedings of the 2018 AAAI/ACM conference on AI, ethics, and society, AIES ’18 (pp. 115–115).
43.
Zurück zum Zitat Graham, J., Meindl, P., Beall, E., Johnson, K. M., & Zhang, L. (2016). Cultural differences in moral judgment and behavior, across and within societies. Current Opinion in Psychology, 8, 125–130.CrossRef Graham, J., Meindl, P., Beall, E., Johnson, K. M., & Zhang, L. (2016). Cultural differences in moral judgment and behavior, across and within societies. Current Opinion in Psychology, 8, 125–130.CrossRef
44.
Zurück zum Zitat Awad, E., Dsouza, S., Kim, R., Schulz, J., Henrich, J., Shariff, A., Bonnefon, J.-F., & Rahwan, I. (2018). The moral machine experiment. Nature, 563(7729), 59.CrossRef Awad, E., Dsouza, S., Kim, R., Schulz, J., Henrich, J., Shariff, A., Bonnefon, J.-F., & Rahwan, I. (2018). The moral machine experiment. Nature, 563(7729), 59.CrossRef
45.
Zurück zum Zitat Perreault, L. (2015). Big data and privacy: Control and awareness aspects. In CONF-IRM, 15. Perreault, L. (2015). Big data and privacy: Control and awareness aspects. In CONF-IRM, 15.
46.
Zurück zum Zitat Goodman, B., & Flaxman, S. (2016, June). European Union regulations on algorithmic decision-making and a “right to explanation”. In Proceedings of the 2016 ICML workshop on human interpretability in machine learning (WHI 2016). arXiv:1606.08813. http://arxiv.org/abs/1606.08813 Goodman, B., & Flaxman, S. (2016, June). European Union regulations on algorithmic decision-making and a “right to explanation”. In Proceedings of the 2016 ICML workshop on human interpretability in machine learning (WHI 2016). arXiv:1606.08813. http://​arxiv.​org/​abs/​1606.​08813
48.
Zurück zum Zitat Burman, A. (2019). Will a GDPR-style data protection law work for India?. Burman, A. (2019). Will a GDPR-style data protection law work for India?.
49.
Zurück zum Zitat Sacks, S. (2018, January 29). New China data privacy standard looks more far-reaching than GDPR. Center for Strategic and International Studies. Sacks, S. (2018, January 29). New China data privacy standard looks more far-reaching than GDPR. Center for Strategic and International Studies.
Metadaten
Titel
Trustworthy Machine Learning for Cloud-Based Internet of Things (IoT)
verfasst von
Saumya Yadav
Rakesh Chandra Joshi
Divakar Yadav
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-86749-2_9

Premium Partner