Keynote: |
Title: Privacy and Transparency with Blockchain in the Era of Big Data, Machine Learning, IoT, and 5G Speaker: Elisa Bertino
Purdue University, USA |
About the Speaker |
|
Abstract |
Technological advances, such as IoT devices, cyber-physical systems, smart mobile devices, cloud systems, data analytics, social networks and increased communication capabilities, are making possible to capture, and to quickly process and analyze huge amounts of data from which to extract information critical for many critical tasks, such as healthcare security and cyber security. In the area of cyber security, such tasks include user authentication, access control, anomaly detection, user monitoring, and protection from insider threat. By collecting and mining data concerning user travels, contacts and disease outbreaks one can predict disease spreading across geographical areas. And those are just a few examples. The use of data for those tasks raises however major privacy concerns. Collected data, even if anonymized by removing identifiers such as names or social security numbers, when linked with other data may lead to re-identify the individuals to which specific data items are related to. Also, as organizations, such as governmental agencies, often need to collaborate on security tasks, data sets are exchanged across different organizations, resulting in these data sets being available to many different parties. Privacy breaches may occur at many different layers and components in our interconnected systems. In this talk, I first present an interesting privacy attack that exploits paging occasion in 5G cellular networks. Such attack shows that achieving privacy is challenging and there is no unique technique that one can use; rather one must combine different techniques depending also on the intended use of data. Examples of these techniques and their applications are presented. Then, I discuss the notion of data transparency – critical for fair and correct data use, and how blockchain technologies can support data transparency. |
Title: Achieving Cloud Data Security and Privacy in Zero Trust Environments Speaker:Robert H. Deng
Singapore Management University, Singapore |
About the Speaker |
|
Abstract |
This talk will provide an overview on the design and implementation of a system for secure access, search, and computation of encrypted data in the cloud for enterprise users. The system is designed following the “zero trust” paradigm to protect data security and privacy even if cloud storage servers or user accounts are compromised. This is achieved using end-to-end (E2E) encryption in which encryption and decryption operations only take place at client devices. However, encryption must not hinder access, search and even computation of data by authorized users. There are numerous academic publications in this area and the choice of which cryptographic techniques to use could have significant impact on the system’s scalability and usability. We will share our experience in the design of the system architecture and selection of cryptographic techniques with a consideration to balance security, performance, and usability. |
Title: Neurosymbolic Autonomy and the Quest for Smart(er) Decision-Making Speaker:Alvaro Velasquez
Information Directorate of the Air Force Research Laboratory ,USA |
About the Speaker |
|
Abstract |
Neurosymbolic Artificial Intelligence has experienced a renaissance and gained much traction in recent years as a potential “third wave” of AI to follow the tremendously successful second wave underpinned by statistical deep learning. This seeks the integration of neural learning systems and formal symbolic reasoning for more efficient, robust, and explainable AI. Such an integration holds much promise in areas like reinforcement learning and planning, where tremendous progress has been made in recent years, including great feats like the defeat of the world Go champion and powerful agents for real-time strategy games. However, the tremendous success of autonomous decision-making has highlighted its own shortcomings when it comes to data limitations, robustness, and trust, among other things. This talk presents some of these challenges and opportunities facing the development of neurosymbolic autonomy, how this differs from conventional neurosymbolic AI problems like classification and natural language processing, and potential implications to facilitating the broader adoption of autonomous solutions. |
Title: Redactable Blockchain: Technologies, Applications and Future Directions Speaker:Chonggang Wang
InterDigital, Inc., USA |
About the Speaker |
|
Abstract |
Blockchain and distributed ledger technology started as a decentralized infrastructure to enable and manage digital currency like Bitcoin without relying on a central authority. One of the attractive features provided by blockchain technology is its append-only “immutability” feature, which means the stored data cannot be modified or manipulated by any means once it is validated in the blockchain ledger. Such immutability helps traceability, auditing, and non-repudiation, which builds decentralized trust among untrusted parties. Despite that, immutability if misused could lead to the permanent existence of sensitive information and misinformation in the blockchain. Incidents like broadcasting illegal content have already taken their place in blockchain systems. Such incidents call for prompt solutions for mitigation. One emerging research theme, “redactable blockchain” provides approaches for modifying ledgers with certain controllability. This keynote will discuss the current research landscape about redactable blockchain. It will first describe the motivations behind redactable blockchain. Then, technologies for supporting redactable blockchain, including new blockchain structure will be explained. New applications that can be enabled by redactable blockchain and future research directions will be shared as well. |
Title: Cyber-Physical Engineering of Industrial Automation Systems Speaker:Valeriy Vyatkin
Aalto University, Finland & Luleå University of Technology, Sweden |
About the Speaker |
|
Abstract |
Flexibility and reconfigurability of factories are the key enablers of their market adaptability. As the production facilities are getting more and more IT- and software-intensive, the speed and quality of reconfiguration largely depends on the efficiency of changing the underlying software and ability of factory equipment to inter-operate, exchange software components between each other and interchangeably use hardware platforms of different vendors. They often talk about Industry 4.0, 5.0, etc., developments, which include the use of wireless communication (5G, 6G, …), autonomous guided vehicles and collaborative robotics, embedded microcontrollers, empowered with artificial intelligence, distributed computing, and decentralized decision-making architectures. According to many sources the software development effort contributes to around 2/3 of the costs in modern automated production plants which makes the engineering of future factory systems the major technical and organisational challenge. This talk discusses the concept of cyber-physical engineering (CPE) as an attempt to address the impending challenges in the design of automation systems having strong interdependencies between the physical and computational processes that do not allow to effectively model systems within classic paradigms of control engineering or computer science. One of the sources of such mutual influences is the increasing use of wireless communications for the interaction of components of industrial and other technical systems. Embedding miniature computing devices literally into processes also exposes them to various physical influences, e.g., temperature, vibration, radiation, battery charge, etc., due to which the results of calculations can vary. CPE assumes the use of languages and means of interdisciplinary modelling at all stages of design, analysis and operation of systems. The CPE will be illustrated with some solutions and experiences achieved at the Aalto Factory of the Future and LTU AIC-cube labs in the context of recent European projects aligned with the Industry X.0 effort. |
Organizations:
Contact: ieee-blockchain2022@googlegroups.com
Copyright Blockchain-2022. Created and Maintained by Blockchain-2022 Web Team.