Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model

Published: 17 November 2020 Publication History

Abstract

In smart applications such as smart medical equipment, more data needs to be processed and trained locally and near the local end to prevent privacy leaks. However, the storage and computing capabilities of smart devices are limited, so some computing tasks need to be outsourced; concurrently, the prevention of malicious nodes from accessing user data during outsourcing computing is required. Therefore, this paper proposes EVPP (efficient, verifiable, and privacy-preserving), which is a computing outsourcing scheme used in the training process of machine learning models. The edge nodes outsource the complex computing process to the edge service node. First, we conducted a certain amount of testing to confirm the parts that need to be outsourced. In this solution, the computationally intensive part of the model training process is outsourced. Meanwhile, a random encryption perturbation is performed on the outsourced training matrix, and verification factors are introduced to ensure the verifiability of the results. In addition, the system can generate verifiable evidence that can be generated to build a trust mechanism when a malicious service node is found. At the same time, this paper also discusses the application of the scheme in other algorithms in order to be better applied. Through the analysis of theoretical and experimental data, it can be shown that the scheme proposed in this paper can effectively use the computing power of the equipment.

References

[1]
C. Petrov, “Big data statistics,” 2019, 2019 03 https://techjury.net/stats-about/big-datastatistics/.
[2]
X. Zhang, M. Qiao, L. Liu, Y. Xu, and W. Shi, “Collaborative cloud-edge computation for personalized driving behavior modeling,” in Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, pp. 209–221, Washington DC, USA, 2019.
[3]
K. Jia, H. Li, D. Liu, and S. Yu, “Enabling efficient and secure outsourcing of large matrix multiplications,” in 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–6, San Diego, CA, USA, 2015.
[4]
X. Lei, X. Liao, T. Huang, and F. Heriniaina, “Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud,” Information Sciences, vol. 280, pp. 205–217, 2014.
[5]
P. Li, J. Li, Z. Huang, C. Z. Gao, W. B. Chen, and K. Chen, “Privacy-preserving outsourced classification in cloud computing,” Cluster Computing, vol. 21, no. 1, pp. 277–286, 2018.
[6]
A. A. Abdellatif, A. Mohamed, C. F. Chiasserini, M. Tlili, and A. Erbad, “Edge computing for smart health: context-aware approaches, opportunities, and challenges,” IEEE Network, vol. 33, no. 3, pp. 196–203, 2019.
[7]
R. K. Pathinarupothi, P. Durga, and E. S. Rangan, “IoT-based smart edge for global health: remote monitoring with severity detection and alerts transmission,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2449–2462, 2018.
[8]
S. Chen, H. Wen, J. Wu, A. Xu, Y. Jiang, H. Song, and Y. Chen, “Radio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication,” Sensors, vol. 19, no. 16, p. 3610, 2019.
[9]
I. Froiz-Míguez, T. Fernández-Caramés, P. Fraga-Lamas, and L. Castedo, “Design, implementation and practical evaluation of an IoT home automation system for fog computing applications based on MQTT and ZigBee-WiFi sensor nodes,” Sensors, vol. 18, no. 8, p. 2660, 2018.
[10]
J. R. Torres Neto, G. P. Rocha Filho, L. Y. Mano, L. A. Villas, and J. Ueyama, “Exploiting offloading in IoT-based microfog: experiments with face recognition and fall detection,” Wireless Communications and Mobile Computing, vol. 2019, 13 pages, 2019.
[11]
W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.
[12]
W. Li, S. Zhang, Q. Su, Q. Wen, and Y. Chen, “An anonymous authentication protocol based on cloud for telemedical systems,” Wireless Communications and Mobile Computing, vol. 2018, 12 pages, 2018.
[13]
W. Ding, R. Hu, Z. Yan, X. Qian, R. H. Deng, L. T. Yang, and M. Dong, “An extended framework of privacy-preserving computation with flexible access control,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 918–930, 2020.
[14]
Q. Li, H. Zhu, J. Xiong, R. Mo, Z. Ying, and H. Wang, “Fine-grained multi-authority access control in IoT-enabled mhealth,” Annals of Telecommunications, vol. 74, no. 7-8, pp. 389–400, 2019.
[15]
K. T. Chui, R. W. Liu, M. D. Lytras, and M. Zhao, “Big data and IoT solution for patient behaviour monitoring,” Behaviour & Information Technology, vol. 38, no. 9, pp. 940–949, 2019.
[16]
X. Liu, R. H. Deng, K. R. Choo, and Y. Yang, “Privacy-preserving reinforcement learning design for patient-centric dynamic treatment regimes,” IEEE Transactions on Emerging Topics in Computing, 2019.
[17]
X. Liang, X. Du, G. Wang, and Z. Han, “A deep reinforcement learning network for traffic light cycle control,” IEEE Transactions on Vehicular Technology, vol. 68, no. 2, pp. 1243–1253, 2019.
[18]
P. Zhou, T. Braud, A. Alhilal, P. Hui, and J. Kangasharju, “ERL: Edge based reinforcement learning for optimized urban traffic light control,” in 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 849–854, Kyoto, Japan, 2019.
[19]
J. Joo, M. C. Park, D. S. Han, and V. Pejovic, “Deep Learning-Based Channel Prediction in Realistic Vehicular Communications,” IEEE Access, vol. 7, pp. 27846–27858, 2019.
[20]
B. Feng, Q. Fu, M. Dong, D. Guo, and Q. Li, “Multistage and elastic spam detection in mobile social networks through deep learning,” IEEE Network, vol. 32, no. 4, pp. 15–21, 2018.
[21]
Y. Yang, X. Huang, X. Liu, H. Cheng, J. Weng, X. Luo, and V. Chang, “A comprehensive survey on secure outsourced computation and its applications,” IEEE Access, vol. 7, pp. 159426–159465, 2019.
[22]
X. Liu, R. H. Deng, K. R. Choo, and Y. Yang, “Privacy-preserving outsourced support vector machine design for secure drug discovery,” IEEE Transactions on Cloud Computing, vol. 8, no. 2, pp. 610–622, 2020.
[23]
X. Zhang, Y. Wang, S. Lu, L. Liu, L. Xu, and W. Shi, “OpenEI: an open framework for edge intelligence,” in 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 1840–1851, Dallas, TX, USA, 2019.
[24]
Y. Sun, Q. Wen, Y. Zhang, H. Zhang, Z. Jin, and W. Li, “Two-cloud-servers-assisted secure outsourcing multiparty computation,” The Scientific World Journal, vol. 2014, 7 pages, 2014.
[25]
P. Mohassel and Y. Zhang, “SecureML: a system for scalable privacy-preserving machine learning,” in 2017 IEEE Symposium on Security and Privacy (SP), pp. 19–38, San Jose, CA, USA, 2017.
[26]
K. Huang, X. Liu, S. Fu, D. Guo, and M. Xu, “A lightweight privacy-preserving CNN feature extraction framework for mobile Sensing,” IEEE Transactions on Dependable and Secure Computing, p. 1, 2019.
[27]
A. M. Vengadapurvaja, G. Nisha, R. Aarthy, and N. Sasikaladevi, “An efficient homomorphic medical image encryption algorithm for cloud storage security,” Procedia Computer Science, vol. 115, pp. 643–650, 2017.
[28]
C. Piao, Y. Shi, J. Yan, C. Zhang, and L. Liu, “Privacy-preserving governmental data publishing: a fog-computing-based differential privacy approach,” Future Generation Computer Systems, vol. 90, pp. 158–174, 2019.
[29]
S. Salinas, C. Luo, X. Chen, W. Liao, and P. Li, “Efficient secure outsourcing of large-scale sparse linear systems of equations,” IEEE Transactions on Big Data, vol. 4, no. 1, pp. 26–39, 2018.
[30]
Y. Rahulamathavan, R. C. Phan, S. Veluru, K. Cumanan, and M. Rajarajan, “Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud,” IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 5, pp. 467–479, 2014.
[31]
X. Li, Y. Zhu, J. Wang, Z. Liu, Y. Liu, and M. Zhang, “On the soundness and security of privacy-preserving SVM for outsourcing data classification,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 906–912, 2018.
[32]
F. Liu, W. K. Ng, and W. Zhang, “Encrypted SVM for outsourced data mining,” in 2015 IEEE 8th International Conference on Cloud Computing, pp. 1085–1092, New York, NY, USA, 2015.
[33]
F. Liu, W. K. Ng, and W. Zhang, “Encrypted gradient descent protocol for outsourced data mining,” in 2015 IEEE 29th International Conference on Advanced Information Networking and Applications, pp. 339–346, Gwangiu, South Korea, 2015.
[34]
Y. Li, Z. L. Jiang, X. Wang, J. Fang, E. Zhang, and X. Wang, “Securely outsourcing ID3 decision tree in cloud computing,” Wireless Communications and Mobile Computing, vol. 2018, 10 pages, 2018.
[35]
X. Zhang, X. Chen, J. Wang, Z. Zhan, and J. Li, “Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing,” Soft Computing, vol. 22, no. 23, pp. 7719–7732, 2018.
[36]
L. Liu, J. Su, X. Liu, R. Chen, K. Huang, R. H. Deng, and X. Wang, “Toward highly secure yet efficient KNN classification scheme on outsourced cloud data,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9841–9852, 2019.
[37]
Q. Wu, F. Zhou, J. Xu, D. Feng, and B. Li, “Lightweight privacy-preserving equality query in edge computing,” IEEE Access, vol. 7, pp. 182588–182599, 2019.
[38]
L. Tao, Z. Li, and L. Wu, “Outlet: outsourcing wearable computing to the ambient mobile computing edge,” IEEE Access, vol. 6, pp. 18408–18419, 2018.
[39]
S. Salinas, C. Luo, X. Chen, and P. Li, “Efficient secure outsourcing of large-scale linear systems of equations,” in 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 1035–1043, Kowloon, Hong Kong, 2015.
[40]
Y. Yu, Y. Luo, D. Wang, S. Fu, and M. Xu, “Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations,” in 2016 IEEE International Conference on Communications (ICC), pp. 1–6, Kuala Lumpur, Malaysia, 2016.
[41]
X. Lei, X. Liao, T. Huang, and H. Li, “Cloud computing service: the caseof large matrix determinant computation,” IEEE Transactions on Services Computing, vol. 8, no. 5, pp. 688–700, 2015.
[42]
F. Chen, T. Xiang, X. Lei, and J. Chen, “Highly efficient linear regression outsourcing to a cloud,” IEEE Transactions on Cloud Computing, vol. 2, no. 4, pp. 499–508, 2014.
[43]
L. Zhou, Y. Zhu, and K. K. R. Choo, “Efficiently and securely harnessing cloud to solve linear regression and other matrix operations,” Future Generation Computer Systems, vol. 81, pp. 404–413, 2018.
[44]
C. Hu, A. Alhothaily, A. Alrawais, X. Cheng, C. Sturtivant, and H. Liu, “A secure and verifiable outsourcing scheme for matrix inverse computation,” in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1–9, Atlanta, GA, USA, 2017.
[45]
D. He, D. Wang, Q. Xie, and K. Chen, “Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation,” Science China Information Sciences, vol. 60, no. 5, 2017.
[46]
S. Qiu, D. Wang, G. Xu, and S. Kumari, “Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices,” IEEE Transactions on Dependable and Secure Computing, p. 1, 2020.
[47]
Z. Guan, X. Liu, L. Wu, J. Wu, R. Xu, J. Zhang, and Y. Li, “Cross-lingual multi-keyword rank search with semantic extension over encrypted data,” Information Sciences, vol. 514, pp. 523–540, 2020.
[48]
“Python-Paillier,” December 2019 https://github.com/data61/python-paillier.
[49]
F. Bergamaschi, S. Halevi, T. T. Halevi, and H. Hunt, “Homomorphic Training of 30,000 Logistic Regression Models,” in International Conference on Applied Cryptography and Network Security, pp. 592–611, Springer, 2019.
[50]
E. Alpaydin, Introduction to Machine Learning (3nd. ed.), The MIT Press, 2014.
[51]
K. Cheng, T. Fan, Y. Jin, Y. Liu, T. Chen, and Q. Yang, “SecureBoost: a lossless federated learning framework,” 2019, https://arxiv.org/pdf/1901.08755.pdf.
[52]
J. Zhang, Y. Zhao, J. Wang, and B. Chen, “FedMEC: improving efficiency of differentially private federated learning via mobile edge computing,” Mobile Networks and Applications, vol. 3, 2020.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Wireless Communications & Mobile Computing
Wireless Communications & Mobile Computing  Volume 2020, Issue
2020
4630 pages
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley and Sons Ltd.

United Kingdom

Publication History

Published: 17 November 2020

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Oct 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media