Privacy-Preserving Edge-Aided Eigenvalue Decomposition in Internet of Things

被引:0
作者
Zhao, Xiaotong [1 ]
Zhang, Hanlin [1 ]
Lin, Jie [2 ]
Liang, Fan [3 ]
Kong, Fanyu [4 ]
Xu, Hansong [5 ]
Hua, Kun [6 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[3] Sam Houston State Univ, Dept Comp Sci, Huntsville, TX 77340 USA
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Shanghai Jiao Tong Univ, Sch Cyber Sci & Engn, Shanghai 200240, Peoples R China
[6] Calif Polytech State Univ San Luis Obispo, Dept Elect Engn, San Luis Obispo, CA 93407 USA
基金
中国国家自然科学基金;
关键词
Servers; Matrix decomposition; Eigenvalues and eigenfunctions; Internet of Things; Protocols; Outsourcing; Edge computing; Computational efficiency; Vectors; Electronic mail; eigenvalue decomposition (EVD); parallel computing; privacy-preserving; SINGULAR-VALUE DECOMPOSITION; LARGE MATRIX; EFFICIENT; COMPUTATION; CLOUD;
D O I
10.1109/jiot.2025.3544245; 10.1109/JIOT.2025.3544245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Eigenvalue decomposition (EVD) is a fundamental yet time-consuming operation with extensive applications in Internet of Things (IoT). When the matrix dimension reaches millions, resource-limited IoT devices struggle to perform such computationally expensive operations. Edge computing, with its plentiful computing resources, offers an effective solution to this problem. However, privacy concerns arise because outsourced tasks may contain sensitive user data. In this article, we propose the first privacy-preserving, edge-assisted EVD outsourcing scheme that securely enables users to outsource EVD tasks to edge servers. We design a privacy-preserving matrix transformation method to encode the original data, ensuring that edge servers cannot access users' private information. Additionally, we design a verification scheme that enables the user to verify the correctness of the results returned by the edge servers. Our protocol supports parallel computation by multiple edge servers, thus enhancing the efficiency of EVD. The feasibility of our proposed scheme is demonstrated through both theoretical and experimental perspectives.
引用
收藏
页码:19901 / 19914
页数:14
相关论文
共 47 条
[1]   An Overview on Edge Computing Research [J].
Cao, Keyan ;
Liu, Yefan ;
Meng, Gongjie ;
Sun, Qimeng .
IEEE ACCESS, 2020, 8 :85714-85728
[2]  
Chen G., 2004, Parallel Algorithm Practice
[3]  
Duan J., 2016, Proc. 4th ACM Workshop on Inf. Hiding and Multimedia Security, P63
[4]  
Feng D., 2023, P IEEE SMART WORLD C, P1
[5]   Secure Distributed Outsourcing of Large-scale Linear Systems [J].
Feng, Da ;
Zhou, Fucai ;
He, Debiao ;
Guo, Mengna ;
Wu, Qiyu .
2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, :1110-1121
[6]   Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization [J].
Fu, Anmin ;
Chen, Zhenzhu ;
Mu, Yi ;
Susilo, Willy ;
Sun, Yinxia ;
Wu, Jie .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) :266-278
[7]   Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing [J].
Gao, Wenjing ;
Yu, Jia .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) :3578-3589
[8]   Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems [J].
Gao, Wenjing ;
Yu, Jia ;
Hao, Rong ;
Kong, Fanyu ;
Liu, Xiaodong .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) :10948-10958
[9]   Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT [J].
Gao, Wenjing ;
Yu, Jia ;
Yang, Ming ;
Wang, Huaqun .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17) :15915-15927
[10]   COMPUTATION OF PLANE UNITARY ROTATIONS TRANSFORMING A GENERAL MATRIX TO TRIANGULAR FORM [J].
GIVENS, W .
JOURNAL OF THE SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, 1958, 6 (01) :26-50