Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things

被引:0
|
作者
Cui, Pengyu [1 ]
Tao, Yunting [2 ]
Zhen, Bin [1 ]
Kong, Fanyu [1 ,3 ]
Ge, Chunpeng [1 ,4 ]
Ma, Chuan [5 ]
Yu, Jia [6 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] Binzhou Polytech, Coll Informat Engn, Binzhou 256603, Shandong, Peoples R China
[3] Shandong Sansec Informat Technol Co Ltd, Cryptog Algorithm Dept, Jinan 250101, Peoples R China
[4] Shandong Univ, Joint SDU NTU Ctr Artificial Intelligence Res, Jinan 250101, Shandong, Peoples R China
[5] Chongqing Univ, Sch Comp Sci, Chongqing 400044, Peoples R China
[6] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 16期
关键词
Internet of Things; Outsourcing; Servers; Matrix decomposition; Computational efficiency; Computational modeling; Privacy; Graph embedding; Internet of Things (IoT); secure outsourcing computation; security and privacy; singular value decomposition (SVD); LARGE MATRIX; SCHEME;
D O I
10.1109/JIOT.2024.3400287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of the Internet of Things (IoT), numerous machine learning applications on IoT are encountering performance bottlenecks. Graph embedding is an emerging type of machine learning that has achieved commendable results in areas, such as network anomaly detection, malware detection, IoT device management, and service recommendation within the IoT. However, for some resource-constrained IoT devices, computing graph embedding algorithms is highly complex and time consuming. In this article, we introduce an efficient and secure distributed outsourcing scheme, employing four noncolluding cloud servers to facilitate the computation of graph embedding for the IoT devices. Our scheme utilizes a novel blinding factor generated through the QR decomposition to blind matrices containing sensitive information. We partition the blinded matrix into several segments, distributing different small matrix blocks across four servers, each of which executes only a portion of the computational tasks. The proposed outsourcing solution ensures the privacy of input and output information is not compromised. In our scheme, we utilize an effective verification method that can detect the erroneous behaviors of cloud servers with a probability close to one. Theoretical analysis and experimental results indicate that our solution achieves a computational efficiency of $(35 m<^>{2}+2 m)/(3 m<^>{3})$ compared to the original algorithm.
引用
收藏
页码:27687 / 27699
页数:13
相关论文
共 50 条
  • [31] Design of secure authentication protocol for dynamic user addition in distributed Internet-of-Things
    Trivedi, Hiral S.
    Patel, Sankita J.
    COMPUTER NETWORKS, 2020, 178
  • [32] Research on Distributed Secure Storage Framework of Industrial Internet of Things Data Based on Blockchain
    Tian, Hongliang
    Huang, Guangtao
    ELECTRONICS, 2024, 13 (23):
  • [33] Secure Distributed Estimation Against Data Integrity Attacks in Internet-of-Things Systems
    Wu, Hao
    Zhou, Bo
    Zhang, Cong
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 19 (03) : 2552 - 2565
  • [34] A blockchain-based secure transaction model for distributed energy in Industrial Internet of Things
    Hu, Wei
    Li, Huanhao
    ALEXANDRIA ENGINEERING JOURNAL, 2021, 60 (01) : 491 - 500
  • [35] Secure Computation on 4G/5G Enabled Internet-of-Things
    Andersson, Karl
    You, Ilsun
    Rahmani, Rahim
    Sharma, Vishal
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [36] Blockchain-based Secure Outsourcing Data Integrity Auditing for Internet of Things in Cloud-edge Environment
    Lin, Yangfei
    Wu, Celimuge
    Ji, Yusheng
    Li, Jie
    Liu, Zhi
    2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN, 2022, : 355 - 362
  • [37] Secure Data Provenance in Internet of Things based Networks by Outsourcing Attribute based Signatures and using Bloom Filters
    Siddiqui, Muhammad Shoaib
    Rahman, Atiqur
    Nadeem, Adnan
    Alzahrani, Ali M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (05) : 221 - 226
  • [38] An Adaptive Computation Framework of Distributed Deep Learning Models for Internet-of-Things Applications
    Cheng, Mu-Hsuan
    Sun, QiHui
    Tu, Chia-Heng
    2018 IEEE 24TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA), 2018, : 85 - 91
  • [39] Graph Sparsification-Based Secure Federated Learning for Consumer-Driven Internet of Things
    Zhang, Jiao
    Li, Xiong
    Vijayakumar, Pandi
    Liang, Wei
    Chang, Victor
    Gupta, Brij B.
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 5188 - 5200
  • [40] Distributed Detection of Large-Scale Internet of Things Botnets Based on Graph Partitioning
    Qian, Kexiang
    Yang, Hongyu
    Li, Ruyu
    Chen, Weizhe
    Luo, Xi
    Yin, Lihua
    APPLIED SCIENCES-BASEL, 2024, 14 (04):