VeriORouting: Verification on intelligent routing outsourced to the cloud

被引:0
作者
Bai, Hui [1 ]
Yu, Xixun [1 ,2 ]
Yan, Zheng [1 ]
Zhang, Jialei [1 ]
Yang, Laurence T. [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Hainan Univ, Dept Comp Sci & Engn, Haikou 570228, Peoples R China
基金
中国国家自然科学基金;
关键词
Intelligent routing; Deep learning; Cloud computing; Verifiable computing; NETWORK;
D O I
10.1016/j.ins.2023.03.039
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current research on machine learning-based intelligent routing focuses on algorithm design and performance optimization. How to deploy it in practice remains a pressing issue. Existing deep learning-based intelligent routing algorithms suffer from a high computational cost, which is hard to be afforded by routers. Considering that the cloud can assist the routers with limited resources to handle complex computation, outsourcing deep learning-based intelligent routing computations to the cloud becomes a feasible solution to support intelligent routing. However, due to the untrustworthiness of the cloud, it is necessary for the routers to verify the truth of outsourced routing results. However, the literature has not yet explored this issue. In this paper, we proposed VeriORouting, a scheme to verify the correctness of outsourced deep learning-based intelligent routing results provided by the cloud. Facing a lazy cloud, VeriORouting allows routers to check the reliability of intelligent routing models by testing model accuracy, and to verify the routing results returned by the cloud without knowing the model by using verification functions generated with multilayer perceptron (MLP) and locality-sensitive hashing (LSH) in advance. We show the robustness of VeriORouting under two attacks raised by the cloud. We evaluate the performance of VeriORouting and compare it with a local intelligent routing scheme. The results show that VeriORouting outperforms the local scheme in terms of computational overhead and storage overhead, especially when the number of routers in the network increases. In terms of communication, VeriORouting reduces communication overhead between routers compared to the local scheme. In addition, we measure the verification performance of VeriORouting under a random attack. VeriORouting achieves a detection success rate of 73% with a false positive rate of 3%, and a detection success rate of 90% with a false positive rate of 25%.
引用
收藏
页码:410 / 430
页数:21
相关论文
共 37 条
[1]   High-speed high-security signatures [J].
Bernstein, Daniel J. ;
Duif, Niels ;
Lange, Tanja ;
Schwabe, Peter ;
Yang, Bo-Yin .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (02) :77-89
[2]   Programming Protocol-Independent Packet Processors [J].
Bosshart, Pat ;
Daly, Dan ;
Gibb, Glen ;
Izzard, Martin ;
McKeown, Nick ;
Rexford, Jennifer ;
Schlesinger, Cole ;
Talayco, Dan ;
Vahdat, Amin ;
Varghese, George ;
Walker, David .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) :87-95
[3]   Forwarding Metamorphosis: Fast Programmable Match-Action Processing in Hardware for SDN [J].
Bosshart, Pat ;
Gibb, Glen ;
Kim, Hun-Seok ;
Varghese, George ;
McKeown, Nick ;
Izzard, Martin ;
Mujica, Fernando ;
Horowitz, Mark .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :99-110
[4]   The Provable Security of Ed25519: Theory and Practice [J].
Brendel, Jacqueline ;
Cremers, Cas ;
Jackson, Dennis ;
Zhao, Mang .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2021, :1659-1676
[5]  
Charikar MS., 2002, S THEOR COMP, P380, DOI DOI 10.1145/509907.509965
[6]  
Chen Xuhui, 2018, ASIAN C MACHINE LEAR, P646
[7]   QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on SGX [J].
Chen, Yaxing ;
Zheng, Qinghua ;
Yan, Zheng ;
Liu, Dan .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (02) :485-499
[8]  
Chow R., 2009, Proceedings of the 2009 ACM workshop on Cloud computing security, P85, DOI DOI 10.1145/1655008.1655020
[9]  
Comiter M, 2019, Arxiv, DOI arXiv:1906.07148
[10]   An Extended Framework of Privacy-Preserving Computation With Flexible Access Control [J].
Ding, Wenxiu ;
Hu, Rui ;
Yan, Zheng ;
Qian, Xinren ;
Deng, Robert H. ;
Yang, Laurence T. ;
Dong, Mianxiong .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02) :918-930