4.7 Article

Decode-and-Compare: An Efficient Verification Scheme for Coded Distributed Edge Computing

期刊

IEEE TRANSACTIONS ON CLOUD COMPUTING
卷 11, 期 3, 页码 2784-2802

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2022.3228243

关键词

Servers; Encoding; Cloud computing; Redundancy; Edge computing; Fault diagnosis; Decoding; Coded computing; edge computing; efficiency; verification

向作者/读者索取更多资源

This article discusses the potential, issues, and solutions of coded edge computing. By designing a general and efficient Decode-and-Compare Verification (DCV) scheme, computation results can be verified for correctness and faulty edge servers can be identified. Experimental results show that the DCV scheme outperforms other potential schemes in terms of computation time and accuracy.
Recently, edge computing has demonstrated increasing potential to provide low-latency computing services. Coded edge computing can not only make full use of the resources of heterogeneous edge computing servers, but also significantly reduce the negative effects of slow computing devices on computing time. Nevertheless, since edge servers may be unreliable or untrustworthy, the user will decode and get incorrect computation results even if it uses one incorrect sub-computation result returned by faulty edge servers. In this article, for the existing coded edge computing schemes, we focus on the distributed matrix-matrix multiplication and design a general and efficient Decode-and-Compare Verification (DCV) scheme to verify the correctness of computation results and identify faulty edge servers by utilizing the properties of coded computing itself. The DCV scheme contains two components: (1) computation result verification, i.e., obtain the computation result and verify its correctness, and (2) faulty edge server identification, i.e., identify the faulty edge servers by verifying the correctness of returned sub-computation results. For both the independent and collusion faulty edge server models, we conduct solid theoretical analyses on the required decoding rounds, the coding redundancy and the successful verification probability to demonstrate that the correct computation result can be efficiently verified. We also conduct a lot of experiments on the DCV scheme from different aspects and the results show that it achieves much less computation time to get the correct computation result compared with other potential schemes, including homomorphic encryption and local computation.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据