Abstract
With the increasing maturity of Industrial Internet of Things (IIoT) technology, resource-constrained devices are widely applied to segments of the factory, which puts significant pressure on their computational capacity. In order to address this issue securely, we propose a verifiable and privacy-preserving outsourced computation system that employs SRAM PUF to safeguard the hardware security of devices and blockchain to achieve public verifiability and data privacy, thereby greatly guaranteeing the security of outsourced computation in the IIoT environment. Additionally, we protect the rights of calculators using a mechanism that identifies malicious calculators. Finally, compared with other existing schemes, the experimental results demonstrate that our scheme provides more efficient and secure outsourced computation services for IIoT devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, F., Xiang, T., Lei, X., Chen, J.: Highly efficient linear regression outsourcing to a cloud. IEEE Trans. Cloud Comput. 2(4), 499–508 (2014)
Ciulla, G., D’Amico, A.: Building energy performance forecasting: a multiple linear regression approach. Appl. Energy 253, 113500 (2019)
Gai, K., et al.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)
Gai, K., Fang, Z., et al.: Edge computing and lightning network empowered secure food supply management. IEEE IoT J. 9(16), 14247–14259 (2022)
Gai, K., Hu, Z., Zhu, L., Wang, R., Zhang, Z.: Blockchain meets DAG: a BlockDAG consensus mechanism. In: Qiu, M. (ed.) ICA3PP 2020. LNCS, vol. 12454, pp. 110–125. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-60248-2_8
Gai, K., Wu, Y., et al.: Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE IoT J. 6(5), 7992–8004 (2019)
Gai, K., Wu, Y., et al.: Differential privacy-based blockchain for industrial Internet-of-Things. IEEE TII 16(6), 4156–4165 (2020)
Hu, F., Lakdawala, S., et al.: Low-power, intelligent sensor hardware interface for medical data preprocessing. IEEE TITB 13(4), 656–663 (2009)
Kaya, H., Tüfekci, P., Gürgen, F.S.: Local and global learning methods for predicting power of a combined gas & steam turbine. In: Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE), pp. 13–18 (2012)
Li, D., Chen, R., et al.: Blockchain-based authentication for IIoT devices with PUF. J. Syst. Archit. 130, 102638 (2022)
Li, D., et al.: PUF-based intellectual property protection for CNN model. In: Memmi, G., Yang, B., Kong, L., Zhang, T., Qiu, M. (eds.) KSEM 2022. LNAI, vol. 13370, pp. 722–733. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-10989-8_57
Li, H., Yu, J., Zhang, H., Yang, M., Wang, H.: Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance. IEEE Internet Things J. 7(9), 8769–8779 (2020)
Li, J., Ming, Z., et al.: Resource allocation robustness in multi-core embedded systems with inaccurate information. J. Syst. Archit. 57(9), 840–849 (2011)
Li, T., Tian, Y., Xiong, J., Bhuiyan, M.Z.A.: FVP-EOC: fair, verifiable, and privacy-preserving edge outsourcing computing in 5G-enabled IIoT. IEEE Trans. Ind. Inf. 19(1), 940–950 (2023)
Li, Y., Gai, K., et al.: Intercrossed access controls for secure financial services on multimedia big data in cloud systems. ACM TMCCA 12(4s), 1–18 (2016)
Liu, Z., et al.: A privacy-preserving outsourcing computing scheme based on secure trusted environment. IEEE Trans. Cloud Comput. 1–12 (2022)
Qiu, H., Dong, T., et al.: Adversarial attacks against network intrusion detection in IoT systems. IEEE Internet Things J. 8(13), 10327–10335 (2020)
Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 159–166. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05764-0_17
Qiu, M., Chen, Z., et al.: Energy-aware data allocation with hybrid memory for mobile cloud systems. IEEE Syst. J. 11(2), 813–822 (2014)
Qiu, M., Jia, Z., et al.: Voltage assignment with guaranteed probability satisfying timing constraint for real-time multiproceesor DSP. JSPS 46, 55–73 (2007). https://doi.org/10.1007/s11265-006-0002-0
Qiu, M., et al.: Energy minimization with soft real-time and DVS for uniprocessor and multiprocessor embedded systems. In: IEEE DATE, pp. 1–6 (2007)
Qiu, M., et al.: Dynamic and leakage energy minimization with soft real-time loop scheduling and voltage assignment. IEEE TVLSI 18(3), 501–504 (2009)
Qiu, M., Thuraisingham, B., et al.: Special issue on robustness and efficiency in the convergence of artificial intelligence and IoT. IEEE IoT J. 8(12), 9460–9462 (2021)
Shao, J., Wei, G.: Secure outsourced computation in connected vehicular cloud computing. IEEE Netw. 32(3), 36–41 (2018)
Tian, Z., Li, M., Qiu, M., Sun, Y., Su, S.: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)
Tüfekci, P.: Prediction of full load electrical power output of a base load operated combined cycle power plant using machine learning methods. Int. J. Electr. Power Energy Syst. 60, 126–140 (2014)
Yang, H., Su, Y., et al.: Privacy-preserving outsourced inner product computation on encrypted database. IEEE TDSC 19(2), 1320–1337 (2022)
Yu, X., Yan, Z., Zhang, R.: Verifiable outsourced computation over encrypted data. Inf. Sci. 479, 372–385 (2019)
Zhang, H., Gao, P., et al.: Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression. arXiv preprint arXiv:2101.02334 (2021)
Zhang, H., Yu, J., et al.: Efficient and secure outsourcing scheme for RSA decryption in Internet of Things. IEEE IoT J. 7(8), 6868–6881 (2020)
Zhao, L., Chen, L.: Sparse matrix masking-based non-interactive verifiable (outsourced) computation, revisited. IEEE TDSC 17(6), 1188–1206 (2018)
Zhao, M., Hu, C., et al.: Towards dependable and trustworthy outsourced computing: a comprehensive survey and tutorial. JNCA 131, 55–65 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Li, J., Lei, X., Su, J., Zhao, H., Guan, Z., Li, D. (2023). Verifiable, Fair and Privacy-Preserving Outsourced Computation Based on Blockchain and PUF. In: Qiu, M., Lu, Z., Zhang, C. (eds) Smart Computing and Communication. SmartCom 2022. Lecture Notes in Computer Science, vol 13828. Springer, Cham. https://doi.org/10.1007/978-3-031-28124-2_54
Download citation
DOI: https://doi.org/10.1007/978-3-031-28124-2_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28123-5
Online ISBN: 978-3-031-28124-2
eBook Packages: Computer ScienceComputer Science (R0)