Professional Documents
Culture Documents
Abstract
The application of machine learning (ML) algorithms are massively scaling up due to rapid digitization and emergence of new tecnologies
like the Internet of Things (IoT). In today’s digital era, we can find ML algorithms being applied in the areas of healthcare, IoT, engineering,
finance, and more. However, all these algorithms need to be trained in order to predict/solve a particular problem. There is high possibil-
ity of tampering with the training datasets and producing biased results. Hence, in this article, we propose a blockchain-based solution to
secure the datasets generated from IoT devices for e-health applications. The proposed blockchain-based solution uses private cloud to tack-
le the aforementioned issue. For evaluation, we have developed a system that can be used by dataset owners to secure their data.
GADEKALLU_LAYOUT.indd 30
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on September 17,2022 at 17:30:20 UTC from IEEE Xplore. Restrictions apply. 9/14/21 4:19 PM
Ref. Methods used Evaluation metrics Research challenges
[2] Blockchain technology to secure e-commerce transactions MD5, smart contracts and digital signatures Scalability, computing resources
[5] Linear regression Mean squared error, execution time Delay/overhead in data processing
[10] Intrusion detection system on blockchain Data integrity, transparency Attacks prevention, scalability
[12] Binary neural networks Weight decay value, learning rate Multi-steps attacks still occur
[14] Blockchain system for dApps Smart contracts Transaction delay, lacks high throughput
Table 1. Summary of the challenges in existing literature.
GADEKALLU_LAYOUT.indd 31
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on September 17,2022 at 17:30:20 UTC from IEEE Xplore. Restrictions apply. 9/14/21 4:19 PM
on a single entity. Securing the dataset by decentralized storage
may be a stepping stone to the future of decentralization, a
peek into Web 3.0.
reFerences
[1] M. S. Mahdavinejad et al., “Machine Learning for Internet of Things Data
Analysis: A Survey,” Digital Commun. and Networks, vol. 4, no. 3, 2018, pp.
161–75.
[2] Y. Zhang et al., “A Blockchain Based Secure E-Commerce Transaction Sys-
tem,” Prof. Int’l. Conf. Web Info. Systems and Applications, 2019, pp. 560–66.
[3] H. Kwon et al., “Multi-targeted Adversarial Example in Evasion Attack on Deep
Neural Network,” IEEE Access, vol. 6, 2018, pp. 46,084–96.
[4] A. N. Bhagoji et al., “Enhancing Robustness of Machine Learning Systems Via
Data Transformations,” Proc. 52nd Annual Conf. Info. Sciences and Systems,
2018, pp. 1–5.
Figure 3. Log of the blocks created in blockchain. [5] M. Jagielski et al., “Manipulating Machine Learning: Poisoning Attacks and
Countermeasures for Regression Learning,” Proc. 2018 IEEE Symp. Security
and Privacy, 2018, pp. 19–35.
making it visible publicly, thereby maintaining integrity of the [6] O. Suciu et al., “When Does Machine Learning FAIL Generalized Transfer-
file. ability for Evasion and Poisoning Attacks,” Proc. 27th USENIX Security Symp.,
This form of integrity check with a blockchain brings a new 2018, pp. 1299–1316.
[7] N. Akhtar and A. Mian, “Threat of Adversarial Attacks on Deep Learning in
flavor to the existing forms of security and can act as a step- Computer Vision: A Survey,” IEEE Access, vol. 6, 2018, pp. 14,410–30.
ping stone for more futuristic ideas of automated security. The [8] I. Goodfellow, P. McDaniel, and N. Papernot, “Making Machine Learning
hybrid blockchain can act as a means of utilizing the features of Robust Against Adversarial Inputs,” Commun. ACM, vol. 61, no. 7, 2018.
both private and public blockchain to get a desired outcome. [9] B. D. Rouani et al., “Safe Machine Learning and Defeating Adversarial
Attacks,” IEEE Security & Privacy, vol. 17, no. 2, 2019, pp. 31–38.
Here, we bring in the concept of full authority to the owner of [10] W. Meng et al., “When Intrusion Detection Meets Blockchain Technology: A
the data while not restricting the view of the data to the public. Review,” IEEE Access, vol. 6, 2018, pp. 10,179–88.
[11] M. Andoni et al., “Blockchain Technology in the Energy Sector: A Systematic
eXPerIMents And resuLts Review of Challenges and Opportunities,” Renewable and Sustainable Energy
Reviews, vol. 100, 2019, pp. 143–74.
To simulate the experimentation, the following software is used [12] P. Panda, I. Chakraborty, and K. Roy, “Discretization Based Solutions for
in this work. For fragmentation we have used 7Zip, an open Secure Machine Learning Against Adversarial Attacks”, IEEE Access, 2019.
source file archiver software. The private cloud is hosted in [13] N. Deepa et al., “A Survey on Blockchain for Big Data: Approaches, Oppor-
Google Cloud Platform. Blockchain is simulated with the help tunities, and Future Directions,” 2020, arXiv preprint arXiv:2009.00858.
[14] W. Cai et al., “Decentralized Applications: The Blockchain-Empowered Soft-
of Remix IDE (Ethereum) through smart contract developed ware System,” IEEE Access, vol. 6, 2018, pp. 53,019–33.
using Solidity. To conduct this experimentation, Medical Cost [15] G. R. Bojja and J. Liu, “Impact of IT Investment on Hospital Performance: A
Dataset from Kaggle is used. This dataset has 1338 rows of data Longitudinal Data Analysis,” Proc. 53rd Hawaii Int’l. Conf. System Sciences,
with 7 attributes. Before storing the dataset in a private cloud, it Jan. 2020.
has been divided into several fragments using 7zip open source
file archiever software. These fragments are then encrypted
bIoGrAPHIes
tHiPPa reDDy GaDekaLLU is currently working as an associate professor in the
using AES encryption with 256-bit key size and uploaded to School of Information Technology and Engineering, Vellore Institute of Technolo-
the virtual private cloud (VPC) in Google Cloud. The admin gy, Tamil Nadu, India. He obtained his Bachelor of Technology degree in comput-
can then compute hash of the datasets and ML algorithm, and er science and engineering from Nagarjuna University, Andhra Pradesh, India, his
Master of Engineeting in computer science and engineering from Anna University,
store the same in a blockchain. The linear regression algorithm Chennai, Tamil Nadu, India, and his Ph.D. from Vellore Institute of Technology.
is used for experimentation purposes in the present study. The He has 14 years of experience in teaching. He has coauthored more than 80
sample logs created in the blockchain are depicted in Fig. 3. A international publications. Currently, his research interests include machine learn-
simulation of the deployed contracts is performed to manage ing, deep learning, computer vision, big data analytics, and blockchain.
the blocks in the blockchain. MaNOJ Mk (mkmanoj1997@gmail.com) is currently working at Oracle India Pvt.
If a user wants to test the accuracy of ML algorithm on Ltd., India. He completed his Master of Technology in software engineering at
the dataset, he/she can request access from the admin for Vellore Institute of Technology. He has done various projects on blockchain,
the same. When the user provides a private key, the dataset cloud security, machine learning, AI, and IoT. He has been awarded the Fast
Track Research Initiative G D Naidu Young Scientist Award from VIT. He has
will be defragmented, and the user can download the dataset published a chapter for a book on blockchain. His interest lies deeply on futuristic
and ML algorithm. The user may compute the hash of the file technologies.
downloaded and compare the hash with the public blockchain
access, following which the experimentation of ML algorithms SiVa raMa kriSHNaN S is currently working as an assistant professor at Vellore
Institute of Technology. He was a research member at the Centre for Ambient
on the dataset can be performed by the user. After experimen- Intelligence and Advanced Networking Research. He has working experience
tation, any third party may verify the originality of the results in the Centre for Development and Advanced Computing (C-DAC) (Ministry
obtained by comparing the generated hash with the public of Science and Technology, Government of India) as a research intern in data
blockchain hash. If the hashes match, it means that the dataset center technologies. He is also certified by EMC Corp. as a proven professional
in information storage and management. Currently, his is a member of the EMC
and ML algorithm is not compromised. academic alliance faculty and played a key role in establishing an MoU between
concLusIon And Future scoPe VIT University and EMC. He proposed and developed an intelligent network
design framework for building small and large-scale networkw. He also developed
In this work, we successfully implemented a blockchain-based an efficient and secure framework for an IP storage network for C-DAC. His cur-
rent interests include e-waste management in India, wireless networks, and cloud
solution to identify attacks on ML algorithms and medical data- computing.
sets. The use of the same concept to power the need for secur-
ing datasets of an organization would mean that the private N eeraJ k UMar [SM] received his Ph.D. in CSE from Shri Mata Vaishno Devi
blockchain requires authentication from a wide range of higher University, Katra (Jammu and Kashmir), India, in 2009, and was a postdoctoral
research fellow at Coventry University, United Kingdom. He is a professor in
officials awaiting a consensus. A feasibility check on the differ- the Department of Computer Science and Engineering, Thapar Institute of Engi-
ent consensus for such a large scenario while taking into con- neering and Technology, Patiala, India. He is also with the School of Computer
sideration the processing power, time, and resources for data Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand.
block creation and mining could be a much needed analysis. He has published more than 500 technical research papers in top-cited journals
such as IEEE Network, IEEE Communications Magazine, Computer Networks,
A complete decentralized solution of this could be the use of Information Sciences, and many others. He has guided many research scholars
decentralized storage such as Inter Planetary File System or leading to Ph.D. and M.E./M.Tech degrees. His research is supported by funding
SWARM so that the dataset may be kept more secure and not from UGC, DST, CSIR, and TCS. He is an Associate Technical Editor of IEEE Com-
GADEKALLU_LAYOUT.indd 32
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on September 17,2022 at 17:30:20 UTC from IEEE Xplore. Restrictions apply. 9/14/21 4:19 PM
munications Magazine. He is an Associate Editor of IJCS, Wiley, JNCA, Elsevier, He received his Bachelor’s degree in computer science engineering from the
Elsevier Computer Communications, and Security and Communication, Wiley. He University of Kashmir, India, in 2010 and his Master’s degree in computer and
has been a Guest Editor of various international publications of repute such as information engineering from IIUM, Malaysia. His research areas include informa-
IEEE Access, IEEE Communications Magazine, IEEE Network, Computer Networks, tion security, natural language processing, cyber security, artificial intelligence, and
Elsevier, Future Generation Computer Systems, Elsevier, the Journal of Medical Sys- wireless networks.
tems, Springer, Computer and Electrical Engineering, Elsevier, Mobile Information
Systems, the International Journal of Ad Hoc and Ubiquitous Computing, Tele- S weta B hattacharya (sweta.b@vit.ac.in) is currently associated with Vellore
communication Systems, Springer, and the Journal of Supercomputing, Springer. Institute of Technology as an assistant professor in the School of Information
He has been a Workshop Chair at IEEE GLOBECOM 2018 and IEEE ICC 2019, Technology & Engineering. She received her Ph.D. degree from Vellore Institute
and TPC Chair and member for various international conferences. He has more of Technology and her Master’s degree in industrial and systems engineering from
than 20,000 citations to his credit with current h-index of 77. He has won best the State University of New York, Binghamton. She has guided various UG and
paper awards from the IEEE Systems Journal and ICC 2018, Kansas City, Missouri, PG projects, and published peer- reviewed research articles. She is also a member
in 2018. He is visiting research fellow at Coventry University and Newcastle Uni- of the Computer Society of India and the Indian Science Congress. Her research
versity. experience includes working on pill dispensing robotic projects as a fully funded
Watson Research Scholar at Innovation Associates at SUNY Binghamton. She has
Saqib Hakak is currently working as an assistant professor at the Canadian Insti- completed six sigma green belt certification from Dartmouth College, Hanover.
tute for Cybersecurity, Faculty of Computer Science, University of New Bruns- Her research interests include applications of machine learning algorithms, data
wick, Fredericton, Canada. He received his Ph.D. from the University of Malaya, mining, simulation and modeling, applied statistics, quality assurance, and project
Malaysia, under the Faculty of Computer Science and Information Technology. management.
GADEKALLU_LAYOUT.indd 33
Authorized licensed use limited to: Universidad de Antioquia. Downloaded on September 17,2022 at 17:30:20 UTC from IEEE Xplore. Restrictions apply. 9/14/21 4:19 PM