Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT

被引:3
|
作者
Gao, Wenjing [1 ]
Yu, Jia [1 ,2 ]
Yang, Ming [3 ]
Wang, Huaqun [4 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[3] Qilu Univ Technol, Shandong Comp Sci Ctr, Shandong Prov Key Lab Comp Networks, Shandong Acad Sci, Jinan 250014, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
Outsourcing; Servers; Task analysis; Internet of Things; Microwave integrated circuits; Computational modeling; Privacy; Data privacy; edge computing; Internet of Things (IoT); parallel outsourcing; IMAGE ENCRYPTION; SECURE; COMPUTATION;
D O I
10.1109/JIOT.2022.3150956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of Internet of Things (IoT), edge computing has been widely applied as a novel computing paradigm. Securely outsourcing intensive tasks to edge servers is becoming increasingly pervasive. It is a nice approach for resource-limited IoT devices to accomplish heavy computing tasks. Matrix inversion is a basic but time-consuming operation, which has a wide range of applications in IoT. The current privacy-preserving outsourcing schemes for matrix inversion cannot support parallel computing based on multiple edge servers. As a result, they cannot well satisfy the requirement of fast response for computation in IoT. In order to deal with this problem, we propose two privacy-preserving parallel outsourcing schemes for matrix inversion in IoT. In the first scheme, we design a novel method to generate a random matrix, which is used to blind the inputted original matrix. In this scheme, two edge servers compute the inversion of the encrypted matrix in parallel to improve the computational efficiency. To further improve the efficiency, we design a novel subtasks partitioning and assignment strategy and propose the second scheme by balancing the computing load of edge servers. We analyze the correctness, security, and verifiability of the proposed schemes. And we provide theoretical analysis and experimental results to demonstrate the performance advantages of the proposed schemes.
引用
收藏
页码:15915 / 15927
页数:13
相关论文
共 50 条
  • [1] Privacy-preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction
    Shan, Zihao
    Ren, Kui
    Qin, Zhan
    [J]. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 204 - 205
  • [2] Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT
    Li, Hongjun
    Kong, Fanyu
    Yu, Jia
    Zhang, Hanlin
    Diao, Luhong
    Tao, Yunting
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 556 - 564
  • [3] Enabling Comparable Search Over Encrypted Data for IoT with Privacy-Preserving
    Xu, Lei
    Xu, Chungen
    Liu, Zhongyi
    Wang, Yunling
    Wang, Jianfeng
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (02): : 675 - 690
  • [4] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588
  • [5] Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization
    Fu, Anmin
    Chen, Zhenzhu
    Mu, Yi
    Susilo, Willy
    Sun, Yinxia
    Wu, Jie
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 266 - 278
  • [6] Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing
    Gao, Wenjing
    Yu, Jia
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3578 - 3589
  • [7] Outsourcing Privacy-Preserving Social Networks to a Cloud
    Wang, Guojun
    Liu, Qin
    Li, Feng
    Yang, Shuhui
    Wu, Jie
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2886 - 2894
  • [8] Fast privacy-preserving network function outsourcing
    Asghar, Hassan Jameel
    De Cristofaro, Emiliano
    Jourjon, Guillaume
    Kaafar, Mohammed Ali
    Mathy, Laurent
    Melis, Luca
    Russell, Craig
    Yu, Mang
    [J]. COMPUTER NETWORKS, 2019, 163
  • [9] Privacy-Preserving Social Media Data Outsourcing
    Zhang, Jinxue
    Sun, Jingchao
    Zhang, Rui
    Zhang, Yanchao
    Hu, Xia
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1106 - 1114
  • [10] Differentially Privacy-preserving Social IoT
    Zhang, Linjie
    Zhu, Xiaoyan
    Han, Xuexue
    Ma, Jianfeng
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,