Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things

被引:0
|
作者
Cui, Pengyu [1 ]
Tao, Yunting [2 ]
Zhen, Bin [1 ]
Kong, Fanyu [1 ,3 ]
Ge, Chunpeng [1 ,4 ]
Ma, Chuan [5 ]
Yu, Jia [6 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] Binzhou Polytech, Coll Informat Engn, Binzhou 256603, Shandong, Peoples R China
[3] Shandong Sansec Informat Technol Co Ltd, Cryptog Algorithm Dept, Jinan 250101, Peoples R China
[4] Shandong Univ, Joint SDU NTU Ctr Artificial Intelligence Res, Jinan 250101, Shandong, Peoples R China
[5] Chongqing Univ, Sch Comp Sci, Chongqing 400044, Peoples R China
[6] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 16期
关键词
Internet of Things; Outsourcing; Servers; Matrix decomposition; Computational efficiency; Computational modeling; Privacy; Graph embedding; Internet of Things (IoT); secure outsourcing computation; security and privacy; singular value decomposition (SVD); LARGE MATRIX; SCHEME;
D O I
10.1109/JIOT.2024.3400287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of the Internet of Things (IoT), numerous machine learning applications on IoT are encountering performance bottlenecks. Graph embedding is an emerging type of machine learning that has achieved commendable results in areas, such as network anomaly detection, malware detection, IoT device management, and service recommendation within the IoT. However, for some resource-constrained IoT devices, computing graph embedding algorithms is highly complex and time consuming. In this article, we introduce an efficient and secure distributed outsourcing scheme, employing four noncolluding cloud servers to facilitate the computation of graph embedding for the IoT devices. Our scheme utilizes a novel blinding factor generated through the QR decomposition to blind matrices containing sensitive information. We partition the blinded matrix into several segments, distributing different small matrix blocks across four servers, each of which executes only a portion of the computational tasks. The proposed outsourcing solution ensures the privacy of input and output information is not compromised. In our scheme, we utilize an effective verification method that can detect the erroneous behaviors of cloud servers with a probability close to one. Theoretical analysis and experimental results indicate that our solution achieves a computational efficiency of $(35 m<^>{2}+2 m)/(3 m<^>{3})$ compared to the original algorithm.
引用
收藏
页码:27687 / 27699
页数:13
相关论文
共 50 条
  • [1] Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things
    Li, Hongjun
    Kong, Fanyu
    Yu, Jia
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12711 - 12722
  • [2] Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things
    Huang, Qinlong
    Yang, Yixian
    Wang, Licheng
    IEEE ACCESS, 2017, 5 : 12941 - 12950
  • [3] Secure Lightweight Stream Data Outsourcing for Internet of Things
    Peng, Su
    Zhao, Liang
    Al-Dubai, Ahmed Y.
    Zomaya, Albert Y.
    Hu, Jia
    Min, Geyong
    Wang, Qiang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10815 - 10829
  • [4] The Internet of Things Secure distributed inference
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (05) : 64 - 75
  • [5] Leveraging Secure Multiparty Computation in the Internet of Things
    von Maltitz, Marcel
    Carle, Georg
    MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 508 - 510
  • [6] Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things"
    Tan, Syh-Yuan
    IEEE ACCESS, 2018, 6 : 22464 - 22465
  • [7] A Secure Key Management Technique Through Distributed Middleware for the Internet of Things
    Tabassum, Tamanna
    Hossain, S. K. Alamgir
    Rahman, Anisur
    INTELLIGENT COMPUTING, VOL 1, 2019, 858 : 1128 - 1139
  • [8] Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things
    Zhang, Hanlin
    Yu, Jia
    Tian, Chengliang
    Tong, Le
    Lin, Jie
    Ge, Linqiang
    Wang, Huaqun
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 6868 - 6881
  • [9] Comment on "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things"
    Vergnaud, Damien
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11) : 11327 - 11329
  • [10] Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things
    Zhang, Hanlin
    Yu, Jia
    Tian, Chengliang
    Xu, Guobin
    Gao, Peng
    Lin, Jie
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 2968 - 2981