Examining Privacy and Trust Issues at the Edge of Isomorphic IoT Architectures : Case Liquid AI
Agbese, M., Mäkitalo, N., Waseem, M., Mohanani, R., Abrahamsson, P., & Mikkonen, T. (2023). Examining Privacy and Trust Issues at the Edge of Isomorphic IoT Architectures : Case Liquid AI. In N. Kawaguchi, K. Yasumoto, T. Riedel, & A. Ding (Eds.), IoT '23 : Proceedings of the 13th International Conference on the Internet of Things (pp. 245-252). ACM. https://doi.org/10.1145/3627050.3631574
Tekijät
Päivämäärä
2023Tekijänoikeudet
© 2023 the Authors
The growing domain of liquidity in computing extends its boundaries to include advancements like liquid artificial intelligence (AI). Liquid AI leverages liquid software using isomorphic Internet of Things (IoT) architecture to enhance computation at the edge. This innovation unveils vast opportunities yet also introduces significant challenges, particularly around privacy and trust. We explore the vulnerabilities that might hinder the progression of this technological fusion toward achieving trustworthy AI. Through an intensive examination of the literature, this research highlights the heightened threats to data integrity and stakeholder trust in these evolving ecosystems. Four main challenges: Data collection, Data storage and Access, Data utilization and sharing, and Surveillance and profiling were identified and examined under privacy, and two, Algorithms and decision-making and Security of IoT infrastructure under trust. The concerns are further categorized to highlight their impact on the development of trustworthy AI. The study acknowledges the early state of the field. Consequently, this research navigates through the limited available literature, initiating a pioneering discourse emphasizing fostering a foundation for developing secure and trustworthy Liquid AI environments.
...
Julkaisija
ACMEmojulkaisun ISBN
979-8-4007-0854-1Konferenssi
International Conference on the Internet of ThingsKuuluu julkaisuun
IoT '23 : Proceedings of the 13th International Conference on the Internet of ThingsAsiasanat
Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/207801930
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
LiquidAI : Towards an Isomorphic AI/ML System Architecture for the Cloud-Edge Continuum
Systä, Kari; Pautasso, Cesare; Taivalsaari, Antero; Mikkonen, Tommi (Springer Nature Switzerland, 2023)A typical Internet of Things (IoT) system consists of a large number of different subsystems and devices, including sensors and actuators, gateways that connect them to the Internet, cloud services, end-user applications ... -
Towards Seamless IoT Device-Edge-Cloud Continuum : Software Architecture Options of IoT Devices Revisited
Taivalsaari, Antero; Mikkonen, Tommi; Pautasso, Cesare (Springer, 2022)In this paper we revisit a taxonomy of client-side IoT software architectures that we presented a few years ago. We note that the emergence of inexpensive AI/ML hardware and new communication technologies are broadening ... -
Towards Liquid AI in IoT with WebAssembly : A Prototype Implementation
Kotilainen, Pyry; Heikkilä, Ville; Systä, Kari; Mikkonen, Tommi (Springer, 2023)An Internet of Things (IoT) system typically comprises numerous subsystems and devices, such as sensors, actuators, gateways for internet connectivity, cloud services, end-user applications, and analytics. Currently, these ... -
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ... -
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.