Now showing 1 - 2 of 2
  • Publication
    Privacy-Aware Blockchain Innovation for 6G: Challenges and Opportunities
    6G wireless networks improve on 5G by further increasing reliability, speeding up the networks and increasing the available bandwidth. These evolutionary enhancements, together with a number of evolutionary improvements such as high precision 3D localization, ultra-high reliability and extreme mobility, introduce a new generation of 6G-native applications. Such application can be based on, for example, distributed, ubiquitous Artificial Intelligence (AI) and ultra-reliable, low-latency Internet of Things (IoT). Along with the enhanced connectivity and novel applications, privacy and security of the networks and the applications must be ensured. Distributed ledger technologies such as blockchain provide one solution for application security and privacy, but introduce their own set of security and privacy risks. In this work, we discuss the opportunities and challenges related to blockchain usage in 6G, and map out possible directions for overtaking the challenges.
      1113Scopus© Citations 82
  • Publication
    Lightweight Privacy-Preserving Data Classification
    Internal attacks are of a huge concern, because they are usually delicately masqueraded under harmless-looking activities, which are very difficult to detect. Machine learning techniques have been successfully applied to identify insider threats. However, they may violate user privacy since they can legally access user’s sensitive information. To preserve user privacy, encryption algorithms have been lately exploited as a powerful tool, to hide private data in a multiple-party collaboration. A combination of encryption and data mining techniques raises high computational complexity. Hence, in order to improve the system’s performance while securing both user’s private data and the classifier, we propose a new secure data analysis protocol, namely SmartClass, by adopting the garbled circuit technique to speed-up the system performance. We developed an efficient encryption step that exploits the additive homomorphism and best properties of the binary Elliptic Curve Cryptography (ECC) algorithm, while keeping the protocol highly secure. We implemented the proposed system and study its effectiveness. Experimental results show the proposed approach is very promising.
      39Scopus© Citations 9