Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things

被引:0
|
作者
Cui, Pengyu [1 ]
Tao, Yunting [2 ]
Zhen, Bin [1 ]
Kong, Fanyu [1 ,3 ]
Ge, Chunpeng [1 ,4 ]
Ma, Chuan [5 ]
Yu, Jia [6 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] Binzhou Polytech, Coll Informat Engn, Binzhou 256603, Shandong, Peoples R China
[3] Shandong Sansec Informat Technol Co Ltd, Cryptog Algorithm Dept, Jinan 250101, Peoples R China
[4] Shandong Univ, Joint SDU NTU Ctr Artificial Intelligence Res, Jinan 250101, Shandong, Peoples R China
[5] Chongqing Univ, Sch Comp Sci, Chongqing 400044, Peoples R China
[6] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 16期
关键词
Internet of Things; Outsourcing; Servers; Matrix decomposition; Computational efficiency; Computational modeling; Privacy; Graph embedding; Internet of Things (IoT); secure outsourcing computation; security and privacy; singular value decomposition (SVD); LARGE MATRIX; SCHEME;
D O I
10.1109/JIOT.2024.3400287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of the Internet of Things (IoT), numerous machine learning applications on IoT are encountering performance bottlenecks. Graph embedding is an emerging type of machine learning that has achieved commendable results in areas, such as network anomaly detection, malware detection, IoT device management, and service recommendation within the IoT. However, for some resource-constrained IoT devices, computing graph embedding algorithms is highly complex and time consuming. In this article, we introduce an efficient and secure distributed outsourcing scheme, employing four noncolluding cloud servers to facilitate the computation of graph embedding for the IoT devices. Our scheme utilizes a novel blinding factor generated through the QR decomposition to blind matrices containing sensitive information. We partition the blinded matrix into several segments, distributing different small matrix blocks across four servers, each of which executes only a portion of the computational tasks. The proposed outsourcing solution ensures the privacy of input and output information is not compromised. In our scheme, we utilize an effective verification method that can detect the erroneous behaviors of cloud servers with a probability close to one. Theoretical analysis and experimental results indicate that our solution achieves a computational efficiency of $(35 m<^>{2}+2 m)/(3 m<^>{3})$ compared to the original algorithm.
引用
收藏
页码:27687 / 27699
页数:13
相关论文
共 50 条
  • [21] Privacy-Preserving Distributed Attribute Computation for Usage Control in the Internet of Things
    Costantino, Gianpiero
    La Marra, Antonio
    Martinelli, Fabio
    Mori, Paolo
    Saracino, Andrea
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1844 - 1851
  • [22] Accelerating Health Data Sharing: A Solution Based on the Internet of Things and Distributed Ledger Technologies
    Zheng, Xiaochen
    Sun, Shengjing
    Mukkamala, Raghava Rao
    Vatrapu, Ravi
    Ordieres-Mere, Joaquin
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2019, 21 (06)
  • [23] Cooperative and Distributed Computation Offloading for Blockchain-Empowered Industrial Internet of Things
    Chen, Wuhui
    Zhang, Zhen
    Hong, Zicong
    Chen, Chuan
    Wu, Jiajing
    Maharjan, Sabita
    Zheng, Zibin
    Zhang, Yan
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8433 - 8446
  • [24] A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things
    Xia, Zhihua
    Jiang, Leqi
    Ma, Xiaohe
    Yang, Wenyuan
    Ji, Puzhao
    Xiong, Neal Naixue
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (01) : 629 - 638
  • [25] Distributed-Reasoning for Task Scheduling through Distributed Internet of Things Controller
    Firouzi, Ramin
    Rahmani, Rahim
    Kanter, Theo
    12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 24 - 32
  • [26] SIoT: Securing the Internet of Things through Distributed System Analysis
    Teixeira, Fernando A.
    Machado, Gustavo V.
    Pereira, Fernando M. Q.
    Wong, Hao Chi
    Nogueira, Jose M. S.
    Oliveira, Leonardo B.
    IPSN'15: PROCEEDINGS OF THE 14TH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2015, : 310 - 321
  • [27] SIoT: Securing Internet of Things through distributed systems analysis
    Teixeira, Fernando A.
    Pereira, Fernando M. Q.
    Wong, Hao-Chi
    Nogueira, Jose M. S.
    Oliveira, Leonardo B.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 1172 - 1186
  • [28] A steganographic method based on optimized audio embedding technique for secure data communication in the internet of things
    Anguraj, S.
    Shantharajah, S. P.
    Emilyn, Jeba J.
    COMPUTATIONAL INTELLIGENCE, 2020, 36 (02) : 557 - 573
  • [29] Graph laplacian regularization with sparse coding in secure image restoration and representation for Internet of Things
    Yogananda, G. S.
    Babu, J. Ananda
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2024, 15 (02)
  • [30] Graph Convolutional Network-based Scheduler for Distributing Computation in the Internet of Robotic Things
    Coleman, Jared
    Mehrdad, Kiamari Y.
    Lillian, Clark Y.
    D'Souza, Daniel
    Krishnamachari, Bhaskar
    2022 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2022,