Recode-Decode-and-Compare: An Efficient Verification Scheme for Coded Edge Computing Against Collusion Attack

被引:0
作者
Lu, Zhaobo [1 ]
Wang, Jin [1 ]
Zhou, Jingya [1 ]
Wang, Jianping [2 ]
Lu, Kejie [3 ]
机构
[1] Soochow Univ, Comp Sci & Technol, Suzhou 215006, Peoples R China
[2] City Univ Hong Kong, Comp Sci, Hong Kong, Peoples R China
[3] Univ Puerto Rico, Comp Sci & Engn, Mayaguez, PR USA
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT I | 2022年 / 13155卷
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Edge computing; Coded computing; Verification; Collusion attack; LATENCY;
D O I
10.1007/978-3-030-95384-3_33
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, coded computing has great breakthroughs in edge computing, which can support and optimise many latency-sensitive and computation-intensive applications. In edge computing, a practical issue is that, comparing to computing devices configured in the cloud data center, edge devices may be unreliable and untrustworthy. Since coded computing has potential in speeding up the computation and protecting the confidentiality of computing data, coded edge computing (CEC) emerges. For a major security issue: verify the correctness of computation result in CEC, the existing efficient work performs verification by comparing multiple final results. The attackers (malicious edge devices) studied before are independent, while collusion attack is the realistic and important scenario in distributed computing and edge computing. To improve the security of CEC, in this paper, we study the verification issue of collusion attack and design the efficient verification scheme: Recode-Decode-and-Compare (RDC). By re-encoding the encoded data, collusive attackers cannot infer the linear relationship between different intermediate results. Therefore, the user can verify the correctness by comparing multiple final results. We also conduct solid theoretical analyses to show the successful verification probability and verification overheads. Finally, extensive simulation experiments demonstrate that the RDC verification scheme can efficiently verify the computation result and outperforms the state-of-the-art works.
引用
收藏
页码:529 / 548
页数:20
相关论文
共 24 条
[1]  
Bhattad K., 2005, PROC WORKSHOP NETW, P281
[2]   Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes [J].
Bitar, Rawad ;
Parag, Parimal ;
El Rouayheb, Salim .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (08) :4609-4619
[3]   "Short-Dot": Computing Large Linear Transforms Distributedly Using Coded Short Dot Products [J].
Dutta, Sanghamitra ;
Cadambe, Viveck ;
Grover, Pulkit .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (10) :6171-6193
[4]  
[付敏 Fu Min], 2020, [仪表技术与传感器, Intstrument Technique and Sensor], P1
[5]  
Garcia R, 2011, EUROSYS 11: PROCEEDINGS OF THE EUROSYS 2011 CONFERENCE, P107
[6]   Faster Homomorphic Linear Transformations in HElib [J].
Halevi, Shai ;
Shoup, Victor .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 :93-120
[7]   Speeding Up Distributed Machine Learning Using Codes [J].
Lee, Kangwook ;
Lam, Maximilian ;
Pedarsani, Ramtin ;
Papailiopoulos, Dimitris ;
Ramchandran, Kannan .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (03) :1514-1529
[8]   A Fundamental Tradeoff Between Computation and Communication in Distributed Computing [J].
Li, Songze ;
Maddah-Ali, Mohammad Ali ;
Yu, Qian ;
Avestimehr, A. Salman .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (01) :109-128
[9]   Coding for Distributed Fog Computing [J].
Li, Songze ;
Maddah-Ali, Mohammad Ali ;
Avestimehr, A. Salman .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (04) :34-40
[10]   Toward Edge Intelligence: Multiaccess Edge Computing for 5G and Internet of Things [J].
Liu, Yaqiong ;
Peng, Mugen ;
Shou, Guochu ;
Chen, Yudong ;
Chen, Siyu .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) :6722-6747