{"title":"安全声誉和基于态态的卸载方案:工业物联网中多方计算的真正工具","authors":"O. Olakanmi, K. Odeyemi","doi":"10.1002/cpe.7116","DOIUrl":null,"url":null,"abstract":"Computations offload for multi‐party computation (MPC) in the Industrial Internet of Things (IIoT) involves the transfer of resource‐intensive industrial computations of resource‐constraint industrial nodes (sourcers) to idle and powerful nodes (workers) such as hardware accelerator grids, IIoT gateways, and cloud servers. However, verifying the results of the offloaded computations and solving the ensuing security and privacy problems have been the drawbacks of MPC in IIoT. Although the morphism approach is currently being used for ensuring the correctness of the results of the outsource computations, it has been proved that its overhead increases as the number of the computations increases. In this article, we formulate a secure offloading scheme capable of achieving perfect verification of the results using reputation and morphism and providing security requirements for effective MPC. Performance and security analyses show that the scheme is not only secure, but also ensures privacy preservation, fairness, and perfect verification of the result at a low cost.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"7 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secure reputation and morphism‐based offloading scheme: A veritable tool for multi‐party computation in Industrial Internet of Things\",\"authors\":\"O. Olakanmi, K. Odeyemi\",\"doi\":\"10.1002/cpe.7116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computations offload for multi‐party computation (MPC) in the Industrial Internet of Things (IIoT) involves the transfer of resource‐intensive industrial computations of resource‐constraint industrial nodes (sourcers) to idle and powerful nodes (workers) such as hardware accelerator grids, IIoT gateways, and cloud servers. However, verifying the results of the offloaded computations and solving the ensuing security and privacy problems have been the drawbacks of MPC in IIoT. Although the morphism approach is currently being used for ensuring the correctness of the results of the outsource computations, it has been proved that its overhead increases as the number of the computations increases. In this article, we formulate a secure offloading scheme capable of achieving perfect verification of the results using reputation and morphism and providing security requirements for effective MPC. Performance and security analyses show that the scheme is not only secure, but also ensures privacy preservation, fairness, and perfect verification of the result at a low cost.\",\"PeriodicalId\":10584,\"journal\":{\"name\":\"Concurrency and Computation: Practice and Experience\",\"volume\":\"7 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation: Practice and Experience\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/cpe.7116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation: Practice and Experience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/cpe.7116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure reputation and morphism‐based offloading scheme: A veritable tool for multi‐party computation in Industrial Internet of Things
Computations offload for multi‐party computation (MPC) in the Industrial Internet of Things (IIoT) involves the transfer of resource‐intensive industrial computations of resource‐constraint industrial nodes (sourcers) to idle and powerful nodes (workers) such as hardware accelerator grids, IIoT gateways, and cloud servers. However, verifying the results of the offloaded computations and solving the ensuing security and privacy problems have been the drawbacks of MPC in IIoT. Although the morphism approach is currently being used for ensuring the correctness of the results of the outsource computations, it has been proved that its overhead increases as the number of the computations increases. In this article, we formulate a secure offloading scheme capable of achieving perfect verification of the results using reputation and morphism and providing security requirements for effective MPC. Performance and security analyses show that the scheme is not only secure, but also ensures privacy preservation, fairness, and perfect verification of the result at a low cost.