Abstract
High-performance Computing (HPC) uses high-performance computers or computer clusters to handle complex computational tasks. Moreover, the cloud-edge architecture is well-suited for this computing model. In many HPC scenarios, specific AI models are trained on HPC and then distributed to edge servers closer to users, providing low-latency and high-efficiency intelligent services. However, ensuring the integrity of models presents a significant challenge, as even minor changes to model parameters can have substantial negative impacts on real-world applications. For example, a single erroneous instruction in intelligent transportation could lead to a traffic accident. To address this, periodic auditing of AI models stored on edge servers is necessary. We propose the AI Model Auditing scheme (AIMA), which leverages the characteristic that multiple edge servers locally store the model. A distributed and collaborative model integrity verification method is designed, eliminating the need for HPC to expend significant computational resources on generating homomorphic verification tags, which constitute the primary computational overhead in existing data auditing schemes. Additionally, we developed a consensus protocol tailored for AI model auditing based on Practical Byzantine Fault Tolerance (PBFT). By constructing a blockchain to record audit results, HPC can obtain tamper-proof model audit records. Furthermore, we introduce update strategies for AI models and edge server groups, enhancing the practicality of the proposed scheme. Finally, we analyze the security features of the scheme and validate its efficiency in a simulated cloud-edge HPC environment. Experimental results demonstrate that AIMA incurs lower computational overhead than the compared schemes during both the audit preparation and execution phases, while the computational and storage costs introduced by consensus remain entirely acceptable.







Similar content being viewed by others
References
Bez JL, Byna S, Ibrahim S (2023) I/o access patterns in hpc applications: a 360-degree survey. ACM Comput Surv 56(2):1–41
Keller Tesser R, Borin E (2023) Containers in hpc: a survey. J Supercomput 79(5):5759–5827
Yin J, Hines J, Herron E, Ghosal T, Liu H, Prentice S, Lama V, Wang F (2025) Chathpc: empowering hpc users with large language models. J Supercomput 81(1):194
Wang R, Tang LV, Hu Y (2024) Genetic factors, risk prediction and ai application of thrombotic diseases. Exp Hematol Oncol 13(1):89
Ljepava N (2022) Ai-enabled marketing solutions in marketing decision making: Ai application in different stages of marketing process. TEM Journal 11(3):1308–1315
Ohue M, Yasuo N, Takata M (2025) Innovations in mathematical modeling, Ai, and optimization techniques. J Supercomput 81(1):1–4
Li Y, Shen J, Ji S, Lai Y-H (2023) Blockchain-based data integrity verification scheme in aiot cloud-edge computing environment. IEEE Trans Eng Manag 2:96
Xu X, Li H, Li Z, Zhou X (2022) Safe: synergic data filtering for federated learning in cloud-edge computing. IEEE Trans Industr Inf 19(2):1655–1665
Xu Y, Bai T, Yu W, Chang S, Atkinson PM, Ghamisi P (2023) Ai security for geoscience and remote sensing: challenges and future trends. IEEE Geosci Rem Sens Mag 11(2):60–85
Grosse K, Bieringer L, Besold TR, Biggio B, Alahi A (2024) When your ai becomes a target: Ai security incidents and best practices. Proc AAAI Conf Artifi Intell 38:23041–23046
Li Y, Shen J, Vijayakumar P, Lai C-F, Sivaraman A, Sharma PK (2024) Next-generation consumer electronics data auditing scheme towards cloud-edge distributed and resilient machine learning. IEEE Trans Consum Electron 70(1):2244–2256
Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 598–609
Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483
Shen J, Zeng P, Choo K-KR, Li C (2023) A certificateless provable data possession scheme for cloud-based ehrs. IEEE Trans Inf Forensics Sec 7:963
Li Y, Zheng W, Pandi V, Bhuiyan MZA, Thamilarasi C (2023) Parallel and batch multiple replica auditing protocol for edge computing. In: 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), pp 254–261. IEEE
Kumar S, Banka H, Kaushik B (2023) Ultra-lightweight blockchain-enabled rfid authentication protocol for supply chain in the domain of 5g mobile edge computing. Wireless Netw 29(5):2105–2126
Zhang M, Cao R, Duan F, Yang Y, Lu Y, Zhang M, Lu X (2022) Research on lightweight blockchain technology based on edge computing. In: 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC), pp 533–539. IEEE
Meng X, Liu B, Meng X, Liang Y, Deng H (2024) A lightweight group authentication protocol for blockchain-based vehicular edge computing networks. IEEE Trans Intell Transp Syst 5:621
Al-Mamun A, Shen H, Zhao D (2022) Dean: A lightweight and resource-efficient blockchain protocol for reliable edge computing. In: 2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp 1261–1271. IEEE
Zeeshan J, Liu T (2023) Lightweight blockchain-based technique for detection and prevention man in the middle attacks in mobile edge computing environment. In: Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), vol. 12800, pp 441–447. SPIE
Vaithianathan M, Patil M, Ng SF, Udkar S (2023) Comparative study of fpga and gpu for high-performance computing and Ai. ESP Int J Adv Comput Technol 1(1):37–46
Ning S, Zhu H, Feng C, Gu J, Jiang Z, Ying Z, Midkiff J, Jain S, Hlaing MH, Pan DZ et al (2024) Photonic-electronic integrated circuits for high-performance computing and Ai accelerators. J Lightwave Technol 5:21
Chaturvedi P, Khan A, Tian M, Huerta E, Zheng H (2022) Inference-optimized Ai and high performance computing for gravitational wave detection at scale. Front Artifi Intell 5:828672
Ahmad SZ, Qamar F (2024) A hybrid Ai based framework for enhancing security in satellite based IoT networks using high performance computing architecture. Sci Rep 14(1):30695
Gundu SR, Charanarur P, Chandelkar KK, Samanta D, Poonia RC, Chakraborty P (2022) Sixth-generation (6G) mobile cloud security and privacy risks for Ai system using high-performance computing implementation. Wirel Commun Mob Comput 2022(1):4397610
Kommineni M (2022) Investigating high-performance computing techniques for optimizing and accelerating Ai algorithms using quantum computing and specialized hardware. Int J Innov Sci Eng 16(1):66–80
Li T, Chu J, Hu L (2022) Cia: a collaborative integrity auditing scheme for cloud data with multi-replica on multi-cloud storage providers. IEEE Trans Parallel Distrib Syst 34(1):154–162
Li B, He Q, Yuan L, Chen F, Lyu L, Yang Y (2022) Edgewatch: Collaborative investigation of data integrity at the edge based on blockchain. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, New York, NY, USA, pp 3208–3218
Li B, He Q, Chen F, Dai H, Jin H, Xiang Y, Yang Y (2021) Cooperative assurance of cache data integrity for mobile edge computing. IEEE Trans Inf Forensics Secur 16:4648–4662
Li B, He Q, Chen F, Jin H, Xiang Y, Yang Y (2021) Auditing cache data integrity in the edge computing environment. IEEE Trans Parallel Distrib Syst 32(5):1210–1223
Cui G, He Q, Li B, Xia X, Chen F, Jin H, Xiang Y, Yang Y (2021) Efficient verification of edge data integrity in edge computing environment. IEEE Trans Serv Comput 15(6):3233–3244
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, Y., Zheng, W. & Ji, S. AI model auditing scheme towards cloud-edge high-performance computing. J Supercomput 81, 615 (2025). https://doi.org/10.1007/s11227-025-07121-0
Accepted:
Published:
DOI: https://doi.org/10.1007/s11227-025-07121-0