Secure Coded Cooperative Computation at the Heterogeneous Edge against Byzantine Attacks

被引:4
|
作者
Keshtkarjahromi, Yasaman [1 ]
Bitar, Rawad [2 ]
Dasari, Venkat [3 ]
El Rouayheb, Salim [2 ]
Seferoglu, Hulya [4 ]
机构
[1] Seagate Technol, Storage Res Grp, Cupertino, CA 95014 USA
[2] Rutgers State Univ, New Brunswick, NJ USA
[3] US Army, Res Lab, Washington, DC 20310 USA
[4] Univ Illinois, Chicago, IL USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/globecom38437.2019.9013340
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing is emerging as a new paradigm to allow processing data at the edge of the network, where data is typically generated and collected by exploiting multiple devices at the edge collectively. However, offloading tasks to other devices leaves the edge computing applications at the complete mercy of an attacker. One of the attacks, which is the focus of this work, is Byzantine attacks, where one or more devices can corrupt the offloaded tasks. Furthermore, exploiting the potential of edge computing is challenging mainly due to the heterogeneous and time-varying nature of the devices at the edge. In this paper, we develop a secure coded cooperative computation mechanism () that provides both security and computation efficiency guarantees by gracefully combining homomorphic hash functions and coded cooperative computation. Homomorphic hash functions are used against Byzantine attacks and coded cooperative computation is used to improve computation efficiency when edge resources are heterogeneous and time-varying. Simulation results show that improves task completion delay significantly.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing
    Zhu, Luqi
    Wang, Jin
    Shi, Lianmin
    Zhou, Jingya
    Lu, Kejie
    Wang, Jianping
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 547 - 556
  • [2] Secure Network Coding against Wiretapping and Byzantine Attacks
    Qin Guo
    Mingxing Luo
    Lixiang Li
    Yixian Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2010
  • [3] Secure Network Coding against Wiretapping and Byzantine Attacks
    Guo, Qin
    Luo, Mingxing
    Li, Lixiang
    Yang, Yixian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [4] Dynamic Heterogeneity-Aware Coded Cooperative Computation at the Edge
    Keshtkarjahromi, Yasaman
    Xing, Yuxuan
    Seferoglu, Hulya
    [J]. 2018 IEEE 26TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2018, : 23 - 33
  • [5] Adaptive and Heterogeneity-Aware Coded Cooperative Computation at the Edge
    Keshtkarjahromi, Yasaman
    Xing, Yuxuan
    Seferoglu, Hulya
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (03) : 1301 - 1312
  • [6] PCHEC: A Private Coded Computation Scheme For Heterogeneous Edge Computing
    Chang, Jiqing
    Wang, Jin
    Gu, Fei
    Lu, Kejie
    Li, Lingzhi
    Wang, Jianping
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 339 - 346
  • [7] A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments
    Yu, Ming
    Zhou, Mengchu
    Su, Wei
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (01) : 449 - 460
  • [8] Incentivizing Secure Edge Caching for Scalable Coded Videos in Heterogeneous Networks
    Xu, Qichao
    Su, Zhou
    Ni, Jianbing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2480 - 2492
  • [9] Private Secure Coded Computation
    Kim, Minchul
    Lee, Jungwoo
    [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1097 - 1101
  • [10] Private Secure Coded Computation
    Kim, Minchul
    Lee, Jungwoo
    [J]. IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1918 - 1921