Privacy-Preserving Edge-Aided Eigenvalue Decomposition in Internet of Things

被引:0
作者
Zhao, Xiaotong [1 ]
Zhang, Hanlin [1 ]
Lin, Jie [2 ]
Liang, Fan [3 ]
Kong, Fanyu [4 ]
Xu, Hansong [5 ]
Hua, Kun [6 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
[3] Sam Houston State Univ, Dept Comp Sci, Huntsville, TX 77340 USA
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] Shanghai Jiao Tong Univ, Sch Cyber Sci & Engn, Shanghai 200240, Peoples R China
[6] Calif Polytech State Univ San Luis Obispo, Dept Elect Engn, San Luis Obispo, CA 93407 USA
基金
中国国家自然科学基金;
关键词
Servers; Matrix decomposition; Eigenvalues and eigenfunctions; Internet of Things; Protocols; Outsourcing; Edge computing; Computational efficiency; Vectors; Electronic mail; eigenvalue decomposition (EVD); parallel computing; privacy-preserving; SINGULAR-VALUE DECOMPOSITION; LARGE MATRIX; EFFICIENT; COMPUTATION; CLOUD;
D O I
10.1109/jiot.2025.3544245; 10.1109/JIOT.2025.3544245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Eigenvalue decomposition (EVD) is a fundamental yet time-consuming operation with extensive applications in Internet of Things (IoT). When the matrix dimension reaches millions, resource-limited IoT devices struggle to perform such computationally expensive operations. Edge computing, with its plentiful computing resources, offers an effective solution to this problem. However, privacy concerns arise because outsourced tasks may contain sensitive user data. In this article, we propose the first privacy-preserving, edge-assisted EVD outsourcing scheme that securely enables users to outsource EVD tasks to edge servers. We design a privacy-preserving matrix transformation method to encode the original data, ensuring that edge servers cannot access users' private information. Additionally, we design a verification scheme that enables the user to verify the correctness of the results returned by the edge servers. Our protocol supports parallel computation by multiple edge servers, thus enhancing the efficiency of EVD. The feasibility of our proposed scheme is demonstrated through both theoretical and experimental perspectives.
引用
收藏
页码:19901 / 19914
页数:14
相关论文
共 47 条
[21]   Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques [J].
Liu, Xiaoning ;
Zheng, Yifeng ;
Yuan, Xingliang ;
Yi, Xun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) :620-636
[22]   Privacy-Preserving Outsourced Calculation Toolkit in the Cloud [J].
Liu, Ximeng ;
Deng, Robert H. ;
Choo, Kim-Kwang Raymond ;
Yang, Yang ;
Pang, HweeHwa .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) :898-911
[23]   A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment [J].
Liu, Zewei ;
Hu, Chunqiang ;
Li, Ruinian ;
Xiang, Tao ;
Li, Xingwang ;
Yu, Jiguo ;
Xia, Hui .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) :2325-2336
[24]   PEDR: Exploiting phase error drift range to detect full-model rogue access point attacks [J].
Lu, Qian ;
Li, Shihao ;
Zhang, Jiahui ;
Jiang, Ruobing .
COMPUTERS & SECURITY, 2022, 114
[25]   SecFact: Secure Large-scale QR and LU Factorizations [J].
Luo, Changqing ;
Zhang, Kaijin ;
Salinas, Sergio ;
Li, Pan .
IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) :796-807
[26]   Resource Scheduling in Edge Computing: A Survey [J].
Luo, Quyuan ;
Hu, Shihong ;
Li, Changle ;
Li, Guanghui ;
Shi, Weisong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04) :2131-2165
[27]  
Meng Zhao, 2020, 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), P72, DOI 10.1109/CyberC49757.2020.00021
[28]  
Moon JF, 2015, 2015 18TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT), P490, DOI 10.1109/ICCITechn.2015.7488120
[29]   Lightweight scheme of secure outsourcing SVD of a large matrix on cloud [J].
Pramkaew, Chakan ;
Ngamsuriyaroj, Sudsanguan .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :92-102
[30]  
Quinn M.J., 1994, PARALLEL COMPUTING T, DOI DOI 10.1111/srt.12209