Skip to main content

Verifiable, Fair and Privacy-Preserving Outsourced Computation Based on Blockchain and PUF

  • Conference paper
  • First Online:
Smart Computing and Communication (SmartCom 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13828))

Included in the following conference series:

  • 777 Accesses

Abstract

With the increasing maturity of Industrial Internet of Things (IIoT) technology, resource-constrained devices are widely applied to segments of the factory, which puts significant pressure on their computational capacity. In order to address this issue securely, we propose a verifiable and privacy-preserving outsourced computation system that employs SRAM PUF to safeguard the hardware security of devices and blockchain to achieve public verifiability and data privacy, thereby greatly guaranteeing the security of outsourced computation in the IIoT environment. Additionally, we protect the rights of calculators using a mechanism that identifies malicious calculators. Finally, compared with other existing schemes, the experimental results demonstrate that our scheme provides more efficient and secure outsourced computation services for IIoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, F., Xiang, T., Lei, X., Chen, J.: Highly efficient linear regression outsourcing to a cloud. IEEE Trans. Cloud Comput. 2(4), 499–508 (2014)

    Article  Google Scholar 

  2. Ciulla, G., D’Amico, A.: Building energy performance forecasting: a multiple linear regression approach. Appl. Energy 253, 113500 (2019)

    Article  Google Scholar 

  3. Gai, K., et al.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)

    Google Scholar 

  4. Gai, K., Fang, Z., et al.: Edge computing and lightning network empowered secure food supply management. IEEE IoT J. 9(16), 14247–14259 (2022)

    Google Scholar 

  5. Gai, K., Hu, Z., Zhu, L., Wang, R., Zhang, Z.: Blockchain meets DAG: a BlockDAG consensus mechanism. In: Qiu, M. (ed.) ICA3PP 2020. LNCS, vol. 12454, pp. 110–125. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60248-2_8

    Chapter  Google Scholar 

  6. Gai, K., Wu, Y., et al.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE IoT J. 6(5), 7992–8004 (2019)

    Google Scholar 

  7. Gai, K., Wu, Y., et al.: Differential privacy-based blockchain for industrial Internet-of-Things. IEEE TII 16(6), 4156–4165 (2020)

    Google Scholar 

  8. Hu, F., Lakdawala, S., et al.: Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE TITB 13(4), 656–663 (2009)

    Google Scholar 

  9. Kaya, H., Tüfekci, P., Gürgen, F.S.: Local and global learning methods for predicting power of a combined gas & steam turbine. In: Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE), pp. 13–18 (2012)

    Google Scholar 

  10. Li, D., Chen, R., et al.: Blockchain-based authentication for IIoT devices with PUF. J. Syst. Archit. 130, 102638 (2022)

    Article  Google Scholar 

  11. Li, D., et al.: PUF-based intellectual property protection for CNN model. In: Memmi, G., Yang, B., Kong, L., Zhang, T., Qiu, M. (eds.) KSEM 2022. LNAI, vol. 13370, pp. 722–733. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-10989-8_57

    Chapter  Google Scholar 

  12. Li, H., Yu, J., Zhang, H., Yang, M., Wang, H.: Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance. IEEE Internet Things J. 7(9), 8769–8779 (2020)

    Article  Google Scholar 

  13. Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Archit. 57(9), 840–849 (2011)

    Article  Google Scholar 

  14. Li, T., Tian, Y., Xiong, J., Bhuiyan, M.Z.A.: FVP-EOC: fair, verifiable, and privacy-preserving edge outsourcing computing in 5G-enabled IIoT. IEEE Trans. Ind. Inf. 19(1), 940–950 (2023)

    Article  Google Scholar 

  15. Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM TMCCA 12(4s), 1–18 (2016)

    Google Scholar 

  16. Liu, Z., et al.: A privacy-preserving outsourcing computing scheme based on secure trusted environment. IEEE Trans. Cloud Comput. 1–12 (2022)

    Google Scholar 

  17. Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327–10335 (2020)

    Article  Google Scholar 

  18. Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 159–166. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05764-0_17

    Chapter  Google Scholar 

  19. Qiu, M., Chen, Z., et al.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813–822 (2014)

    Article  Google Scholar 

  20. Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. JSPS 46, 55–73 (2007). https://doi.org/10.1007/s11265-006-0002-0

    Article  Google Scholar 

  21. Qiu, M., et al.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE, pp. 1–6 (2007)

    Google Scholar 

  22. Qiu, M., et al.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE TVLSI 18(3), 501–504 (2009)

    Google Scholar 

  23. Qiu, M., Thuraisingham, B., et al.: Special issue on robustness and efficiency in the convergence of artificial intelligence and IoT. IEEE IoT J. 8(12), 9460–9462 (2021)

    Google Scholar 

  24. Shao, J., Wei, G.: Secure outsourced computation in connected vehicular cloud computing. IEEE Netw. 32(3), 36–41 (2018)

    Article  Google Scholar 

  25. Tian, Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)

    Article  Google Scholar 

  26. Tüfekci, P.: Prediction of full load electrical power output of a base load operated combined cycle power plant using machine learning methods. Int. J. Electr. Power Energy Syst. 60, 126–140 (2014)

    Article  Google Scholar 

  27. Yang, H., Su, Y., et al.: Privacy-preserving outsourced inner product computation on encrypted database. IEEE TDSC 19(2), 1320–1337 (2022)

    Google Scholar 

  28. Yu, X., Yan, Z., Zhang, R.: Verifiable outsourced computation over encrypted data. Inf. Sci. 479, 372–385 (2019)

    Article  Google Scholar 

  29. Zhang, H., Gao, P., et al.: Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression. arXiv preprint arXiv:2101.02334 (2021)

  30. Zhang, H., Yu, J., et al.: Efficient and secure outsourcing scheme for RSA decryption in Internet of Things. IEEE IoT J. 7(8), 6868–6881 (2020)

    Google Scholar 

  31. Zhao, L., Chen, L.: Sparse matrix masking-based non-interactive verifiable (outsourced) computation, revisited. IEEE TDSC 17(6), 1188–1206 (2018)

    Google Scholar 

  32. Zhao, M., Hu, C., et al.: Towards dependable and trustworthy outsourced computing: a comprehensive survey and tutorial. JNCA 131, 55–65 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinsheng Lei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, J., Lei, X., Su, J., Zhao, H., Guan, Z., Li, D. (2023). Verifiable, Fair and Privacy-Preserving Outsourced Computation Based on Blockchain and PUF. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-28124-2_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-28123-5

  • Online ISBN: 978-3-031-28124-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics