A Trusted Inference Mechanism for Edge Computing Based on Post-Quantum Encryption

被引:0
|
作者
Huang, Yukang [1 ]
Mai, Junyi [1 ]
Jiang, Wanling [1 ]
Yao, Enyi [1 ]
机构
[1] South China Univ Technol, Sch Microelect, Guangzhou 511442, Peoples R China
关键词
Edge Computing; CRYSTALS-KYBER; NTT; CNN; Hardware; CNN ACCELERATOR;
D O I
10.1109/ISCAS58744.2024.10557963
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Edge computing is a computing framework that offers fewer computing resources compared to cloud computing but brings enterprise applications closer to data sources like Internet of Things (IoT) devices or local edge servers. This proximity to data sources brings significant business benefits such as faster insights, improved response time, and better bandwidth availability. Consequently, edge computing technologies have witnessed widespread adoption. Edge computing faces significant security challenges due to factors like limited cost, volume, and power consumption, as well as the potential risk of quantum computers breaking conventional cryptographic systems. Limitation of computing power in edge computing nodes further complicates the system architecture to achieve secure data transmission. To overcome these challenges, this paper proposes a lightweight trusted inference mechanism specifically designed for edge computing workloads. The primary objective of this mechanism is to establish a balance between security and bandwidth by incorporating a post-quantum encryption to the edge computing devices. This is achieved through sharing convolution and encryption hardware at the edge while encrypting and transmitting intermediate results of inference computations to the cloud, thereby minimizing resource usage and transmission bandwidth requirements. The FPGA platform is utilized to implement a template hardware design, which demonstrated comparable resource consumption to the state-of-art work. Simulation results indicate that our mechanism achieves a 45.3% reduction in LUTs and a 55.5% reduction in DFFs within the hardware, while introducing only a marginal software slowdown of 0.39%.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] MEPs call for 'urgent action' on post-quantum encryption
    Boerkamp, Martijn
    PHYSICS WORLD, 2024, 37 (05)
  • [22] Revisiting Anonymity in Post-quantum Public Key Encryption
    Cheng, Yao
    Lu, Xianhui
    Li, Ziyi
    Li, Bao
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2024, PT II, 2024, 14772 : 336 - 370
  • [23] Post-Quantum Security of IGE Mode Encryption in Telegram
    Lee, Jeeun
    Kim, Sungsook
    Lee, Seunghyun
    Kim, Kwangjo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (01): : 148 - 151
  • [24] Anonymous, Robust Post-quantum Public Key Encryption
    Grubbs, Paul
    Maram, Varun
    Paterson, Kenneth G.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 402 - 432
  • [25] Post-Quantum, Order-Preserving Encryption for the Confidential Inference in Decision Trees: FPGA Design and Implementation
    Karn, Rupesh Raj
    Nawaz, Kashif
    Elfadel, Ibrahim M.
    2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC, 2023, : 118 - 123
  • [26] Compact Post-quantum Bounded-Collusion Identity-Based Encryption
    Sato, Shingo
    Shikata, Junji
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2024, PT I, 2025, 14905 : 101 - 122
  • [27] Post-Quantum Multi-Recipient Public Key Encryption
    Alwen, Joel
    Hartmann, Dominik
    Kiltz, Eike
    Mularczyk, Marta
    Schwabe, Peter
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1108 - 1122
  • [28] Poster: Post-Quantum Identity-Based Matching Encryption with Revocable Decryption Key
    Huang, Jheng-Jia
    Chen, Guan-Yu
    Lo, Nai-Wei
    PROCEEDINGS OF THE 2024 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2024, 2024, : 5006 - 5008
  • [29] Attribute-based encryption supporting data filtration over post-quantum assumptions
    Jiao, Chunhong
    Xiang, Xinyin
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (04) : 323 - 337
  • [30] Billiard Quantum Chaos: A Pioneering Image Encryption Scheme in the Post-Quantum Era
    Hwang, Seong Oun
    Waseem, Hafiz Muhammad
    Munir, Noor
    IEEE ACCESS, 2024, 12 : 85150 - 85164