4.8 Article

Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 11, 页码 8737-8748

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3116127

关键词

Cloud computing; Servers; Outsourcing; Privacy; Convex functions; Sparse matrices; Optimization; Cloud computing; convex optimization; Internet of Things (IoT); outsourcing computation; privacy preserving

资金

  1. National Natural Science Foundation of China [62172245, 61572267]
  2. Major Scientific and Technological Innovation Project of Shandong Province [2020CXGC010114]
  3. Key Research and Development Project of Qingdao [211-2-21-XX]
  4. Guangxi Key Laboratory of Cryptography and Information Security [GCIS202101]

向作者/读者索取更多资源

In this article, an efficient and secure outsourcing algorithm is proposed for solving large-scale convex optimization problems in the Internet of Things (IoT). The algorithm reduces computational complexity on the client side, protects sensitive data, and enables detection of malicious behavior from the cloud server.
With the development of cloud computing and the advent of Internet of Things (IoT), outsourcing computation, as an important application of cloud computing, has been widely researched in the field of academic and industry. The convex optimization problem, as a most common mathematical problem, often appears in some machine learning algorithms and smart grid designs. However, the process of solving the convex optimization problem is very complicated and time consuming. For some resource-constrained IoT devices, there are no enough computation resources and storage resources to deal with this problem. In this article, we proposed an efficient and secure outsourcing algorithm for solving the large-scale convex optimization problem with equality constraints in IoT. Our proposed algorithm can not only reduce the computational complexity on the client side, but also protect the client's sensitive data from being disclosed to the dishonest cloud server. In addition, the client can detect the malicious behavior from the cloud server with probability approximately 1. Finally, we give a theoretical analysis about correctness and security, and conduct experiments to show the feasibility of our proposed algorithm.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据