A Trusted Inference Mechanism for Edge Computing Based on Post-Quantum Encryption

被引:0
|
作者
Huang, Yukang [1 ]
Mai, Junyi [1 ]
Jiang, Wanling [1 ]
Yao, Enyi [1 ]
机构
[1] South China Univ Technol, Sch Microelect, Guangzhou 511442, Peoples R China
关键词
Edge Computing; CRYSTALS-KYBER; NTT; CNN; Hardware; CNN ACCELERATOR;
D O I
10.1109/ISCAS58744.2024.10557963
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Edge computing is a computing framework that offers fewer computing resources compared to cloud computing but brings enterprise applications closer to data sources like Internet of Things (IoT) devices or local edge servers. This proximity to data sources brings significant business benefits such as faster insights, improved response time, and better bandwidth availability. Consequently, edge computing technologies have witnessed widespread adoption. Edge computing faces significant security challenges due to factors like limited cost, volume, and power consumption, as well as the potential risk of quantum computers breaking conventional cryptographic systems. Limitation of computing power in edge computing nodes further complicates the system architecture to achieve secure data transmission. To overcome these challenges, this paper proposes a lightweight trusted inference mechanism specifically designed for edge computing workloads. The primary objective of this mechanism is to establish a balance between security and bandwidth by incorporating a post-quantum encryption to the edge computing devices. This is achieved through sharing convolution and encryption hardware at the edge while encrypting and transmitting intermediate results of inference computations to the cloud, thereby minimizing resource usage and transmission bandwidth requirements. The FPGA platform is utilized to implement a template hardware design, which demonstrated comparable resource consumption to the state-of-art work. Simulation results indicate that our mechanism achieves a 45.3% reduction in LUTs and a 55.5% reduction in DFFs within the hardware, while introducing only a marginal software slowdown of 0.39%.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Post-Quantum Cryptography What Advancements in Quantum Computing Mean for IT Professionals
    Mailloux, Logan O.
    Lewis, Charlton D., II
    Riggs, Casey
    Grimaila, Michael R.
    IT PROFESSIONAL, 2016, 18 (05) : 42 - 47
  • [32] Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing
    Qiaohong Hu
    Hongju Cheng
    Xiaoqi Zhang
    Chengkuan Lin
    Peer-to-Peer Networking and Applications, 2022, 15 : 444 - 460
  • [33] Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing
    Hu, Qiaohong
    Cheng, Hongju
    Zhang, Xiaoqi
    Lin, Chengkuan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 444 - 460
  • [34] Post-quantum secure recipient revocable broadcast encryption supporting anonymity
    Amit Kumar Singh
    Kamalesh Acharya
    Sourav Mukhopadhyay
    Multimedia Tools and Applications, 2024, 83 : 4519 - 4531
  • [35] Post-quantum secure recipient revocable broadcast encryption supporting anonymity
    Singh, Amit Kumar
    Acharya, Kamalesh
    Mukhopadhyay, Sourav
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 4519 - 4531
  • [36] Post-Quantum Secure Public Key Broadcast Encryption with Keyword Search
    Yang, Yang
    Yang, Shu-Lve
    Wang, Feng-He
    Sun, Jin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (02) : 485 - 497
  • [37] Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey
    Jemihin, Zulianie Binti
    Tan, Soo Fun
    Chung, Gwo-Chin
    CRYPTOGRAPHY, 2022, 6 (03)
  • [38] Reliable data communication using post-quantum encryption in Internet of Everything
    Balaji, Ashwin
    Dhurandher, Sanjay Kumar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (13)
  • [39] Industry Trusted Network Communication Based on Quantum Encryption
    Wen Yang
    Yao Peisong
    Zhao Qianchuan
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 7016 - 7022
  • [40] Post-Quantum Hybrid Security Mechanism for MIMO Systems
    Qassim, Yousef
    Magana, Mario Edgardo
    Yavuz, Attila
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 684 - 689