Shufen Niu , Weiying Kong , Lihua Chen , Xusheng Zhou , Ning Wang
{"title":"云边缘AIoT中基于同态mac的可验证安全聚合","authors":"Shufen Niu , Weiying Kong , Lihua Chen , Xusheng Zhou , Ning Wang","doi":"10.1016/j.comcom.2025.108271","DOIUrl":null,"url":null,"abstract":"<div><div>The cloud–edge collaborative Artificial Intelligence of Things (AIoT) architecture addresses challenges in managing vast data storage, intelligent information processing, device interconnectivity within the Internet of Things. For its security risks and data privacy, federated learning emerges as a promising solution for ensuring data privacy in AIoT. However, susceptibility to malicious attacks during data transmission poses a significant challenge and a semi-trusted server may deviate from the specified protocol leading to inaccurate aggregation parameters returned to clients. Our proposed solution introduces a federated learning integrity verification scheme based on homomorphic Message Authentication Code (MAC) within a cloud–edge collaborative AIoT architecture. Homomorphic MAC ensures secure aggregation and integrity verification, even when distinct clients possess different keys, emphasizing integrity verification by edge node, contributes to reduced client computing costs. Further verifying of the aggregated parameters by users prevents untrusted transmission from edge node. Leveraging data integrity verification proves effective in mitigating challenges associated with parameter security, especially in scenarios involving inaccurate aggregation of local model parameters within federated learning. Our solution is free bilinear pairing, resulting in a significant reduction in computational overhead. We evaluate accuracy on the MNIST dataset through comparison with the FedAVG plaintext scheme, showing that our approach ensures parameter integrity while maintaining model performance, numerical simulations also confirm its efficiency.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"242 ","pages":"Article 108271"},"PeriodicalIF":4.3000,"publicationDate":"2025-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Homomorphic MAC-based verifiable secure aggregation for federated learning in cloud–edge AIoT\",\"authors\":\"Shufen Niu , Weiying Kong , Lihua Chen , Xusheng Zhou , Ning Wang\",\"doi\":\"10.1016/j.comcom.2025.108271\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The cloud–edge collaborative Artificial Intelligence of Things (AIoT) architecture addresses challenges in managing vast data storage, intelligent information processing, device interconnectivity within the Internet of Things. For its security risks and data privacy, federated learning emerges as a promising solution for ensuring data privacy in AIoT. However, susceptibility to malicious attacks during data transmission poses a significant challenge and a semi-trusted server may deviate from the specified protocol leading to inaccurate aggregation parameters returned to clients. Our proposed solution introduces a federated learning integrity verification scheme based on homomorphic Message Authentication Code (MAC) within a cloud–edge collaborative AIoT architecture. Homomorphic MAC ensures secure aggregation and integrity verification, even when distinct clients possess different keys, emphasizing integrity verification by edge node, contributes to reduced client computing costs. Further verifying of the aggregated parameters by users prevents untrusted transmission from edge node. Leveraging data integrity verification proves effective in mitigating challenges associated with parameter security, especially in scenarios involving inaccurate aggregation of local model parameters within federated learning. Our solution is free bilinear pairing, resulting in a significant reduction in computational overhead. We evaluate accuracy on the MNIST dataset through comparison with the FedAVG plaintext scheme, showing that our approach ensures parameter integrity while maintaining model performance, numerical simulations also confirm its efficiency.</div></div>\",\"PeriodicalId\":55224,\"journal\":{\"name\":\"Computer Communications\",\"volume\":\"242 \",\"pages\":\"Article 108271\"},\"PeriodicalIF\":4.3000,\"publicationDate\":\"2025-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0140366425002282\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0140366425002282","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A Homomorphic MAC-based verifiable secure aggregation for federated learning in cloud–edge AIoT
The cloud–edge collaborative Artificial Intelligence of Things (AIoT) architecture addresses challenges in managing vast data storage, intelligent information processing, device interconnectivity within the Internet of Things. For its security risks and data privacy, federated learning emerges as a promising solution for ensuring data privacy in AIoT. However, susceptibility to malicious attacks during data transmission poses a significant challenge and a semi-trusted server may deviate from the specified protocol leading to inaccurate aggregation parameters returned to clients. Our proposed solution introduces a federated learning integrity verification scheme based on homomorphic Message Authentication Code (MAC) within a cloud–edge collaborative AIoT architecture. Homomorphic MAC ensures secure aggregation and integrity verification, even when distinct clients possess different keys, emphasizing integrity verification by edge node, contributes to reduced client computing costs. Further verifying of the aggregated parameters by users prevents untrusted transmission from edge node. Leveraging data integrity verification proves effective in mitigating challenges associated with parameter security, especially in scenarios involving inaccurate aggregation of local model parameters within federated learning. Our solution is free bilinear pairing, resulting in a significant reduction in computational overhead. We evaluate accuracy on the MNIST dataset through comparison with the FedAVG plaintext scheme, showing that our approach ensures parameter integrity while maintaining model performance, numerical simulations also confirm its efficiency.
期刊介绍:
Computer and Communications networks are key infrastructures of the information society with high socio-economic value as they contribute to the correct operations of many critical services (from healthcare to finance and transportation). Internet is the core of today''s computer-communication infrastructures. This has transformed the Internet, from a robust network for data transfer between computers, to a global, content-rich, communication and information system where contents are increasingly generated by the users, and distributed according to human social relations. Next-generation network technologies, architectures and protocols are therefore required to overcome the limitations of the legacy Internet and add new capabilities and services. The future Internet should be ubiquitous, secure, resilient, and closer to human communication paradigms.
Computer Communications is a peer-reviewed international journal that publishes high-quality scientific articles (both theory and practice) and survey papers covering all aspects of future computer communication networks (on all layers, except the physical layer), with a special attention to the evolution of the Internet architecture, protocols, services, and applications.