Cloning your mind: Security challenges in cognitive system designs and their solutions

Beiye Liu, Chunpeng Wu, Hai Li, Yiran Chen, Qing Wu, Mark Barnell, Qinru Qiu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

With the booming of big-data applications, cognitive information processing systems that leverage advanced data processing technologies, e.g., machine learning and data mining, are widely used in many industry fields. Although these technologies demonstrate great processing capability and accuracy in the relevant applications, several security and safety challenges are also emerging against these learning based technologies. In this paper, we will first introduce several security concerns in cognitive system designs. Some real examples are then used to demonstrate how the attackers can potentially access the confidential user data, replicate a sensitive data processing model without being granted the access to the details of the model, and obtain some key features of the training data by using the services publically accessible to a normal user. Based on the analysis of these security challenges, we also discuss several possible solutions that can protect the information privacy and security of cognitive systems during different stages of the usage.

Original languageEnglish (US)
Title of host publicationProceedings - Design Automation Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
Volume2015-July
ISBN (Print)9781450335201
DOIs
StatePublished - Jul 24 2015
Event52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015 - San Francisco, United States
Duration: Jun 8 2015Jun 12 2015

Other

Other52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015
CountryUnited States
CitySan Francisco
Period6/8/156/12/15

Fingerprint

Cognitive systems
Cognitive Systems
Cloning
System Design
Systems analysis
Data mining
Learning systems
Information Processing
Leverage
Demonstrate
Privacy
Data Mining
Machine Learning
Safety
Industry
Processing
Model

Keywords

  • Cognitive Systems
  • Machine Learning
  • Security

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modeling and Simulation

Cite this

Liu, B., Wu, C., Li, H., Chen, Y., Wu, Q., Barnell, M., & Qiu, Q. (2015). Cloning your mind: Security challenges in cognitive system designs and their solutions. In Proceedings - Design Automation Conference (Vol. 2015-July). [7167279] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1145/2744769.2747915

Cloning your mind : Security challenges in cognitive system designs and their solutions. / Liu, Beiye; Wu, Chunpeng; Li, Hai; Chen, Yiran; Wu, Qing; Barnell, Mark; Qiu, Qinru.

Proceedings - Design Automation Conference. Vol. 2015-July Institute of Electrical and Electronics Engineers Inc., 2015. 7167279.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Liu, B, Wu, C, Li, H, Chen, Y, Wu, Q, Barnell, M & Qiu, Q 2015, Cloning your mind: Security challenges in cognitive system designs and their solutions. in Proceedings - Design Automation Conference. vol. 2015-July, 7167279, Institute of Electrical and Electronics Engineers Inc., 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015, San Francisco, United States, 6/8/15. https://doi.org/10.1145/2744769.2747915
Liu B, Wu C, Li H, Chen Y, Wu Q, Barnell M et al. Cloning your mind: Security challenges in cognitive system designs and their solutions. In Proceedings - Design Automation Conference. Vol. 2015-July. Institute of Electrical and Electronics Engineers Inc. 2015. 7167279 https://doi.org/10.1145/2744769.2747915
Liu, Beiye ; Wu, Chunpeng ; Li, Hai ; Chen, Yiran ; Wu, Qing ; Barnell, Mark ; Qiu, Qinru. / Cloning your mind : Security challenges in cognitive system designs and their solutions. Proceedings - Design Automation Conference. Vol. 2015-July Institute of Electrical and Electronics Engineers Inc., 2015.
@inproceedings{1b6e084460cc4c3d96da4c8d6616f71a,
title = "Cloning your mind: Security challenges in cognitive system designs and their solutions",
abstract = "With the booming of big-data applications, cognitive information processing systems that leverage advanced data processing technologies, e.g., machine learning and data mining, are widely used in many industry fields. Although these technologies demonstrate great processing capability and accuracy in the relevant applications, several security and safety challenges are also emerging against these learning based technologies. In this paper, we will first introduce several security concerns in cognitive system designs. Some real examples are then used to demonstrate how the attackers can potentially access the confidential user data, replicate a sensitive data processing model without being granted the access to the details of the model, and obtain some key features of the training data by using the services publically accessible to a normal user. Based on the analysis of these security challenges, we also discuss several possible solutions that can protect the information privacy and security of cognitive systems during different stages of the usage.",
keywords = "Cognitive Systems, Machine Learning, Security",
author = "Beiye Liu and Chunpeng Wu and Hai Li and Yiran Chen and Qing Wu and Mark Barnell and Qinru Qiu",
year = "2015",
month = "7",
day = "24",
doi = "10.1145/2744769.2747915",
language = "English (US)",
isbn = "9781450335201",
volume = "2015-July",
booktitle = "Proceedings - Design Automation Conference",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Cloning your mind

T2 - Security challenges in cognitive system designs and their solutions

AU - Liu, Beiye

AU - Wu, Chunpeng

AU - Li, Hai

AU - Chen, Yiran

AU - Wu, Qing

AU - Barnell, Mark

AU - Qiu, Qinru

PY - 2015/7/24

Y1 - 2015/7/24

N2 - With the booming of big-data applications, cognitive information processing systems that leverage advanced data processing technologies, e.g., machine learning and data mining, are widely used in many industry fields. Although these technologies demonstrate great processing capability and accuracy in the relevant applications, several security and safety challenges are also emerging against these learning based technologies. In this paper, we will first introduce several security concerns in cognitive system designs. Some real examples are then used to demonstrate how the attackers can potentially access the confidential user data, replicate a sensitive data processing model without being granted the access to the details of the model, and obtain some key features of the training data by using the services publically accessible to a normal user. Based on the analysis of these security challenges, we also discuss several possible solutions that can protect the information privacy and security of cognitive systems during different stages of the usage.

AB - With the booming of big-data applications, cognitive information processing systems that leverage advanced data processing technologies, e.g., machine learning and data mining, are widely used in many industry fields. Although these technologies demonstrate great processing capability and accuracy in the relevant applications, several security and safety challenges are also emerging against these learning based technologies. In this paper, we will first introduce several security concerns in cognitive system designs. Some real examples are then used to demonstrate how the attackers can potentially access the confidential user data, replicate a sensitive data processing model without being granted the access to the details of the model, and obtain some key features of the training data by using the services publically accessible to a normal user. Based on the analysis of these security challenges, we also discuss several possible solutions that can protect the information privacy and security of cognitive systems during different stages of the usage.

KW - Cognitive Systems

KW - Machine Learning

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=84944080722&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84944080722&partnerID=8YFLogxK

U2 - 10.1145/2744769.2747915

DO - 10.1145/2744769.2747915

M3 - Conference contribution

AN - SCOPUS:84944080722

SN - 9781450335201

VL - 2015-July

BT - Proceedings - Design Automation Conference

PB - Institute of Electrical and Electronics Engineers Inc.

ER -