Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things

被引:0
|
作者
Cui, Pengyu [1 ]
Tao, Yunting [2 ]
Zhen, Bin [1 ]
Kong, Fanyu [1 ,3 ]
Ge, Chunpeng [1 ,4 ]
Ma, Chuan [5 ]
Yu, Jia [6 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] Binzhou Polytech, Coll Informat Engn, Binzhou 256603, Shandong, Peoples R China
[3] Shandong Sansec Informat Technol Co Ltd, Cryptog Algorithm Dept, Jinan 250101, Peoples R China
[4] Shandong Univ, Joint SDU NTU Ctr Artificial Intelligence Res, Jinan 250101, Shandong, Peoples R China
[5] Chongqing Univ, Sch Comp Sci, Chongqing 400044, Peoples R China
[6] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 16期
关键词
Internet of Things; Outsourcing; Servers; Matrix decomposition; Computational efficiency; Computational modeling; Privacy; Graph embedding; Internet of Things (IoT); secure outsourcing computation; security and privacy; singular value decomposition (SVD); LARGE MATRIX; SCHEME;
D O I
10.1109/JIOT.2024.3400287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of the Internet of Things (IoT), numerous machine learning applications on IoT are encountering performance bottlenecks. Graph embedding is an emerging type of machine learning that has achieved commendable results in areas, such as network anomaly detection, malware detection, IoT device management, and service recommendation within the IoT. However, for some resource-constrained IoT devices, computing graph embedding algorithms is highly complex and time consuming. In this article, we introduce an efficient and secure distributed outsourcing scheme, employing four noncolluding cloud servers to facilitate the computation of graph embedding for the IoT devices. Our scheme utilizes a novel blinding factor generated through the QR decomposition to blind matrices containing sensitive information. We partition the blinded matrix into several segments, distributing different small matrix blocks across four servers, each of which executes only a portion of the computational tasks. The proposed outsourcing solution ensures the privacy of input and output information is not compromised. In our scheme, we utilize an effective verification method that can detect the erroneous behaviors of cloud servers with a probability close to one. Theoretical analysis and experimental results indicate that our solution achieves a computational efficiency of $(35 m<^>{2}+2 m)/(3 m<^>{3})$ compared to the original algorithm.
引用
收藏
页码:27687 / 27699
页数:13
相关论文
共 50 条
  • [41] Internet of Things Aware Secure Dew Computing Architecture for Distributed Hotspot Network: A Conceptual Study
    Ray, Partha Pratim
    Skala, Karolj
    APPLIED SCIENCES-BASEL, 2022, 12 (18):
  • [42] Effective Consensus-Based Distributed Auction Scheme for Secure Data Sharing in Internet of Things
    Jia, Xuedan
    Song, Xiangmei
    Sohail, Muhammad
    SYMMETRY-BASEL, 2022, 14 (08):
  • [43] An Integrated Collaborative Filtering Framework With Location-Aware Graph Embedding in Intelligent Internet of Things Systems
    Sun, Yong
    Tan, Wenan
    Huang, Li
    Xie, Na
    Ruan, Ling
    Da Xu, Li
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2022, 58 (06) : 5089 - 5104
  • [44] On designing the adaptive computation framework of distributed deep learning models for Internet-of-Things applications
    Chia-Heng Tu
    QiHui Sun
    Mu-Hsuan Cheng
    The Journal of Supercomputing, 2021, 77 : 13191 - 13223
  • [45] Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
    Al-Otaibi, Yasser D.
    SOFT COMPUTING, 2021, 25 (18) : 12131 - 12144
  • [46] On designing the adaptive computation framework of distributed deep learning models for Internet-of-Things applications
    Tu, Chia-Heng
    Sun, QiHui
    Cheng, Mu-Hsuan
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (11): : 13191 - 13223
  • [47] Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
    Yasser D. Al-Otaibi
    Soft Computing, 2021, 25 : 12131 - 12144
  • [48] Mathematical model on distributed denial of service attack through Internet of things in a network
    Mishra, Bimal Kumar
    Keshri, Ajit Kumar
    Mallick, Dheeresh Kumar
    Mishra, Binay Kumar
    NONLINEAR ENGINEERING - MODELING AND APPLICATION, 2019, 8 (01): : 486 - 495
  • [49] Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays
    Kong, Zhengmin
    Wang, Die
    Li, Yunjuan
    Wang, Chao
    SENSORS, 2018, 18 (11)
  • [50] A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things
    Zhang, Zhishuo
    Zhou, Shijie
    COMPUTER NETWORKS, 2021, 201