4.6 Article

Secure Edge-Aided Computations for Social Internet-of-Things Systems

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSS.2020.3030904

关键词

Outsourcing; Internet of Things; Security; Edge computing; Cloud computing; Servers; Task analysis; Edge computing; Internet of Things (IoT); secure outsourcing computation; social IoT systems

资金

  1. National Natural Science Foundation of China [61572267, 61402245]
  2. Joint Found of the National Natural Science Foundation of China [U1905211]
  3. Open Project of the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences [2019-MS-03]
  4. Natural Science Basic Research Plan in Shaanxi Province of China [2019JQ-124]
  5. K. C. Wong Education Foundation

向作者/读者索取更多资源

This article addresses the issue of resource-constrained IoT devices being unable to perform complex computations. A secure edge-aided computation scheme is proposed, which includes a framework, identification of security threats, and definition of security requirements. Two secure outsourcing algorithms meeting the requirements (matrix multiplication and modular exponentiation) are provided, with efficiency and security supported by theoretical analysis and experimental results.
Devices in the Internet-of-Things (IoT) are networked and perform massive computations to support various social IoT systems. Applications in social IoT systems often involve complicated computations that are out of the computation capacity of some resource-constrained IoT devices. Thus, how to enable resource-constrained IoT devices to accomplish complex computations efficiently and securely is of significant importance. To address this problem, we develop a secure edge-aided computation scheme for the social IoT systems. We scope the framework of edge-aided computations and identify the security threats in such a system. We define the security requirements that the outsourcing algorithms should meet. Then, we provide two examples of secure outsourcing algorithms (matrix multiplication and modular exponentiation) that meet the given security requirements. The efficiency and security of the proposed algorithms are supported through the theoretical analysis and experimental results.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据