安全声誉和基于态态的卸载方案:工业物联网中多方计算的真正工具

O. Olakanmi, K. Odeyemi
{"title":"安全声誉和基于态态的卸载方案:工业物联网中多方计算的真正工具","authors":"O. Olakanmi, K. Odeyemi","doi":"10.1002/cpe.7116","DOIUrl":null,"url":null,"abstract":"Computations offload for multi‐party computation (MPC) in the Industrial Internet of Things (IIoT) involves the transfer of resource‐intensive industrial computations of resource‐constraint industrial nodes (sourcers) to idle and powerful nodes (workers) such as hardware accelerator grids, IIoT gateways, and cloud servers. However, verifying the results of the offloaded computations and solving the ensuing security and privacy problems have been the drawbacks of MPC in IIoT. Although the morphism approach is currently being used for ensuring the correctness of the results of the outsource computations, it has been proved that its overhead increases as the number of the computations increases. In this article, we formulate a secure offloading scheme capable of achieving perfect verification of the results using reputation and morphism and providing security requirements for effective MPC. Performance and security analyses show that the scheme is not only secure, but also ensures privacy preservation, fairness, and perfect verification of the result at a low cost.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"7 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Secure reputation and morphism‐based offloading scheme: A veritable tool for multi‐party computation in Industrial Internet of Things\",\"authors\":\"O. Olakanmi, K. Odeyemi\",\"doi\":\"10.1002/cpe.7116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computations offload for multi‐party computation (MPC) in the Industrial Internet of Things (IIoT) involves the transfer of resource‐intensive industrial computations of resource‐constraint industrial nodes (sourcers) to idle and powerful nodes (workers) such as hardware accelerator grids, IIoT gateways, and cloud servers. However, verifying the results of the offloaded computations and solving the ensuing security and privacy problems have been the drawbacks of MPC in IIoT. Although the morphism approach is currently being used for ensuring the correctness of the results of the outsource computations, it has been proved that its overhead increases as the number of the computations increases. In this article, we formulate a secure offloading scheme capable of achieving perfect verification of the results using reputation and morphism and providing security requirements for effective MPC. Performance and security analyses show that the scheme is not only secure, but also ensures privacy preservation, fairness, and perfect verification of the result at a low cost.\",\"PeriodicalId\":10584,\"journal\":{\"name\":\"Concurrency and Computation: Practice and Experience\",\"volume\":\"7 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrency and Computation: Practice and Experience\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/cpe.7116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation: Practice and Experience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/cpe.7116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

工业物联网(IIoT)中多方计算(MPC)的计算卸载涉及将资源约束工业节点(源)的资源密集型工业计算转移到空闲且功能强大的节点(工人),如硬件加速器网格、工业物联网网关和云服务器。然而,验证卸载计算的结果并解决随之而来的安全和隐私问题一直是MPC在IIoT中的缺点。尽管目前正使用态射方法来确保外包计算结果的正确性,但事实证明,它的开销随着计算数量的增加而增加。在本文中,我们制定了一个安全的卸载方案,能够使用声誉和态射实现对结果的完美验证,并为有效的MPC提供安全需求。性能和安全性分析表明,该方案不仅安全,而且以较低的成本保证了隐私保护、公平性和结果的完善验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure reputation and morphism‐based offloading scheme: A veritable tool for multi‐party computation in Industrial Internet of Things
Computations offload for multi‐party computation (MPC) in the Industrial Internet of Things (IIoT) involves the transfer of resource‐intensive industrial computations of resource‐constraint industrial nodes (sourcers) to idle and powerful nodes (workers) such as hardware accelerator grids, IIoT gateways, and cloud servers. However, verifying the results of the offloaded computations and solving the ensuing security and privacy problems have been the drawbacks of MPC in IIoT. Although the morphism approach is currently being used for ensuring the correctness of the results of the outsource computations, it has been proved that its overhead increases as the number of the computations increases. In this article, we formulate a secure offloading scheme capable of achieving perfect verification of the results using reputation and morphism and providing security requirements for effective MPC. Performance and security analyses show that the scheme is not only secure, but also ensures privacy preservation, fairness, and perfect verification of the result at a low cost.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信