Back to Search
Start Over
Secure Edge-Aided Computations for Social Internet-of-Things Systems
- Source :
- IEEE Transactions on Computational Social Systems. 9:76-87
- Publication Year :
- 2022
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2022.
-
Abstract
- Devices in the Internet-of-Things (IoT) are networked and perform massive computations to support various social IoT systems. Applications in social IoT systems often involve complicated computations that are out of the computation capacity of some resource-constrained IoT devices. Thus, how to enable resource-constrained IoT devices to accomplish complex computations efficiently and securely is of significant importance. To address this problem, we develop a secure edge-aided computation scheme for the social IoT systems. We scope the framework of edge-aided computations and identify the security threats in such a system. We define the security requirements that the outsourcing algorithms should meet. Then, we provide two examples of secure outsourcing algorithms (matrix multiplication and modular exponentiation) that meet the given security requirements. The efficiency and security of the proposed algorithms are supported through the theoretical analysis and experimental results.
- Subjects :
- Modular exponentiation
Scheme (programming language)
Scope (project management)
Computer science
business.industry
Computation
Distributed computing
Matrix multiplication
Outsourcing
Human-Computer Interaction
Modeling and Simulation
Social internet of things
Enhanced Data Rates for GSM Evolution
business
computer
Social Sciences (miscellaneous)
computer.programming_language
Subjects
Details
- ISSN :
- 23737476
- Volume :
- 9
- Database :
- OpenAIRE
- Journal :
- IEEE Transactions on Computational Social Systems
- Accession number :
- edsair.doi...........bef7fb473c25558f83ffcca27d514471
- Full Text :
- https://doi.org/10.1109/tcss.2020.3030904