M. Fu, Jin Wang, Jianping Wang, K. Lu, A. Jukan, Fei Gu
{"title":"Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing","authors":"M. Fu, Jin Wang, Jianping Wang, K. Lu, A. Jukan, Fei Gu","doi":"10.1109/IWQoS49365.2020.9212828","DOIUrl":null,"url":null,"abstract":"Edge computing is a promising technology that can fulfill the requirements of latency-critical and computation-intensive applications. To further enhance the performance, coded edge computing has emerged because it can optimally utilize edge devices to speed up the computation. In this paper, we tackle a major security issue in coded edge computing: how to verify the correctness of results and identify attackers. Specifically, we propose an efficient verification scheme, namely Decode-and-Compare (DC), by leveraging both the coding redundancy of edge devices and the properties of linear coding itself. To design the DC scheme, we conduct a solid theoretical analysis to show the required coding redundancy, the expected number of decoding operations, and the tradeoff between them. To evaluate the performance of DC, we conduct extensive simulation experiments and the results confirm that the DC scheme can outperform existing solutions, such as homomorphic encryption and computing locally at the user device.","PeriodicalId":177899,"journal":{"name":"2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWQoS49365.2020.9212828","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Edge computing is a promising technology that can fulfill the requirements of latency-critical and computation-intensive applications. To further enhance the performance, coded edge computing has emerged because it can optimally utilize edge devices to speed up the computation. In this paper, we tackle a major security issue in coded edge computing: how to verify the correctness of results and identify attackers. Specifically, we propose an efficient verification scheme, namely Decode-and-Compare (DC), by leveraging both the coding redundancy of edge devices and the properties of linear coding itself. To design the DC scheme, we conduct a solid theoretical analysis to show the required coding redundancy, the expected number of decoding operations, and the tradeoff between them. To evaluate the performance of DC, we conduct extensive simulation experiments and the results confirm that the DC scheme can outperform existing solutions, such as homomorphic encryption and computing locally at the user device.