Secure Edge-Aided Computations for Social Internet-of-Things Systems

  • Hanlin Zhang
  • , Jia Yu
  • , Mohammad S. Obaidat
  • , Pandi Vijayakumar
  • , Linqiang Ge
  • , Jie Lin
  • , Jianxi Fan
  • , Rong Hao

Research output: Contribution to journalArticlepeer-review

28 Scopus citations

Abstract

Devices in the Internet-of-Things (IoT) are networked and perform massive computations to support various social IoT systems. Applications in social IoT systems often involve complicated computations that are out of the computation capacity of some resource-constrained IoT devices. Thus, how to enable resource-constrained IoT devices to accomplish complex computations efficiently and securely is of significant importance. To address this problem, we develop a secure edge-aided computation scheme for the social IoT systems. We scope the framework of edge-aided computations and identify the security threats in such a system. We define the security requirements that the outsourcing algorithms should meet. Then, we provide two examples of secure outsourcing algorithms (matrix multiplication and modular exponentiation) that meet the given security requirements. The efficiency and security of the proposed algorithms are supported through the theoretical analysis and experimental results.

Original languageEnglish
Pages (from-to)76-87
Number of pages12
JournalIEEE Transactions on Computational Social Systems
Volume9
Issue number1
DOIs
StatePublished - 1 Feb 2022

Keywords

  • Edge computing
  • Internet of Things (IoT)
  • secure outsourcing computation
  • social IoT systems

Fingerprint

Dive into the research topics of 'Secure Edge-Aided Computations for Social Internet-of-Things Systems'. Together they form a unique fingerprint.

Cite this