Skip to main content

Advertisement

Log in

AI model auditing scheme towards cloud-edge high-performance computing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

High-performance Computing (HPC) uses high-performance computers or computer clusters to handle complex computational tasks. Moreover, the cloud-edge architecture is well-suited for this computing model. In many HPC scenarios, specific AI models are trained on HPC and then distributed to edge servers closer to users, providing low-latency and high-efficiency intelligent services. However, ensuring the integrity of models presents a significant challenge, as even minor changes to model parameters can have substantial negative impacts on real-world applications. For example, a single erroneous instruction in intelligent transportation could lead to a traffic accident. To address this, periodic auditing of AI models stored on edge servers is necessary. We propose the AI Model Auditing scheme (AIMA), which leverages the characteristic that multiple edge servers locally store the model. A distributed and collaborative model integrity verification method is designed, eliminating the need for HPC to expend significant computational resources on generating homomorphic verification tags, which constitute the primary computational overhead in existing data auditing schemes. Additionally, we developed a consensus protocol tailored for AI model auditing based on Practical Byzantine Fault Tolerance (PBFT). By constructing a blockchain to record audit results, HPC can obtain tamper-proof model audit records. Furthermore, we introduce update strategies for AI models and edge server groups, enhancing the practicality of the proposed scheme. Finally, we analyze the security features of the scheme and validate its efficiency in a simulated cloud-edge HPC environment. Experimental results demonstrate that AIMA incurs lower computational overhead than the compared schemes during both the audit preparation and execution phases, while the computational and storage costs introduced by consensus remain entirely acceptable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Bez JL, Byna S, Ibrahim S (2023) I/o access patterns in hpc applications: a 360-degree survey. ACM Comput Surv 56(2):1–41

    Article  MATH  Google Scholar 

  2. Keller Tesser R, Borin E (2023) Containers in hpc: a survey. J Supercomput 79(5):5759–5827

    Article  MATH  Google Scholar 

  3. Yin J, Hines J, Herron E, Ghosal T, Liu H, Prentice S, Lama V, Wang F (2025) Chathpc: empowering hpc users with large language models. J Supercomput 81(1):194

    Article  Google Scholar 

  4. Wang R, Tang LV, Hu Y (2024) Genetic factors, risk prediction and ai application of thrombotic diseases. Exp Hematol Oncol 13(1):89

    Article  MATH  Google Scholar 

  5. Ljepava N (2022) Ai-enabled marketing solutions in marketing decision making: Ai application in different stages of marketing process. TEM Journal 11(3):1308–1315

    Article  MATH  Google Scholar 

  6. Ohue M, Yasuo N, Takata M (2025) Innovations in mathematical modeling, Ai, and optimization techniques. J Supercomput 81(1):1–4

    Article  MATH  Google Scholar 

  7. Li Y, Shen J, Ji S, Lai Y-H (2023) Blockchain-based data integrity verification scheme in aiot cloud-edge computing environment. IEEE Trans Eng Manag 2:96

    Google Scholar 

  8. Xu X, Li H, Li Z, Zhou X (2022) Safe: synergic data filtering for federated learning in cloud-edge computing. IEEE Trans Industr Inf 19(2):1655–1665

    Article  MATH  Google Scholar 

  9. Xu Y, Bai T, Yu W, Chang S, Atkinson PM, Ghamisi P (2023) Ai security for geoscience and remote sensing: challenges and future trends. IEEE Geosci Rem Sens Mag 11(2):60–85

    Article  Google Scholar 

  10. Grosse K, Bieringer L, Besold TR, Biggio B, Alahi A (2024) When your ai becomes a target: Ai security incidents and best practices. Proc AAAI Conf Artifi Intell 38:23041–23046

    Google Scholar 

  11. Li Y, Shen J, Vijayakumar P, Lai C-F, Sivaraman A, Sharma PK (2024) Next-generation consumer electronics data auditing scheme towards cloud-edge distributed and resilient machine learning. IEEE Trans Consum Electron 70(1):2244–2256

    Article  Google Scholar 

  12. Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp 598–609

  13. Shacham H, Waters B (2013) Compact proofs of retrievability. J Cryptol 26(3):442–483

    Article  MathSciNet  MATH  Google Scholar 

  14. Shen J, Zeng P, Choo K-KR, Li C (2023) A certificateless provable data possession scheme for cloud-based ehrs. IEEE Trans Inf Forensics Sec 7:963

    MATH  Google Scholar 

  15. Li Y, Zheng W, Pandi V, Bhuiyan MZA, Thamilarasi C (2023) Parallel and batch multiple replica auditing protocol for edge computing. In: 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), pp 254–261. IEEE

  16. Kumar S, Banka H, Kaushik B (2023) Ultra-lightweight blockchain-enabled rfid authentication protocol for supply chain in the domain of 5g mobile edge computing. Wireless Netw 29(5):2105–2126

    Article  MATH  Google Scholar 

  17. Zhang M, Cao R, Duan F, Yang Y, Lu Y, Zhang M, Lu X (2022) Research on lightweight blockchain technology based on edge computing. In: 2022 7th IEEE International Conference on Data Science in Cyberspace (DSC), pp 533–539. IEEE

  18. Meng X, Liu B, Meng X, Liang Y, Deng H (2024) A lightweight group authentication protocol for blockchain-based vehicular edge computing networks. IEEE Trans Intell Transp Syst 5:621

    MATH  Google Scholar 

  19. Al-Mamun A, Shen H, Zhao D (2022) Dean: A lightweight and resource-efficient blockchain protocol for reliable edge computing. In: 2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS), pp 1261–1271. IEEE

  20. Zeeshan J, Liu T (2023) Lightweight blockchain-based technique for detection and prevention man in the middle attacks in mobile edge computing environment. In: Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), vol. 12800, pp 441–447. SPIE

  21. Vaithianathan M, Patil M, Ng SF, Udkar S (2023) Comparative study of fpga and gpu for high-performance computing and Ai. ESP Int J Adv Comput Technol 1(1):37–46

    Google Scholar 

  22. Ning S, Zhu H, Feng C, Gu J, Jiang Z, Ying Z, Midkiff J, Jain S, Hlaing MH, Pan DZ et al (2024) Photonic-electronic integrated circuits for high-performance computing and Ai accelerators. J Lightwave Technol 5:21

    Google Scholar 

  23. Chaturvedi P, Khan A, Tian M, Huerta E, Zheng H (2022) Inference-optimized Ai and high performance computing for gravitational wave detection at scale. Front Artifi Intell 5:828672

    Article  Google Scholar 

  24. Ahmad SZ, Qamar F (2024) A hybrid Ai based framework for enhancing security in satellite based IoT networks using high performance computing architecture. Sci Rep 14(1):30695

    Article  MATH  Google Scholar 

  25. Gundu SR, Charanarur P, Chandelkar KK, Samanta D, Poonia RC, Chakraborty P (2022) Sixth-generation (6G) mobile cloud security and privacy risks for Ai system using high-performance computing implementation. Wirel Commun Mob Comput 2022(1):4397610

    Google Scholar 

  26. Kommineni M (2022) Investigating high-performance computing techniques for optimizing and accelerating Ai algorithms using quantum computing and specialized hardware. Int J Innov Sci Eng 16(1):66–80

    MATH  Google Scholar 

  27. Li T, Chu J, Hu L (2022) Cia: a collaborative integrity auditing scheme for cloud data with multi-replica on multi-cloud storage providers. IEEE Trans Parallel Distrib Syst 34(1):154–162

    Article  MATH  Google Scholar 

  28. Li B, He Q, Yuan L, Chen F, Lyu L, Yang Y (2022) Edgewatch: Collaborative investigation of data integrity at the edge based on blockchain. In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, New York, NY, USA, pp 3208–3218

  29. Li B, He Q, Chen F, Dai H, Jin H, Xiang Y, Yang Y (2021) Cooperative assurance of cache data integrity for mobile edge computing. IEEE Trans Inf Forensics Secur 16:4648–4662

    Article  MATH  Google Scholar 

  30. Li B, He Q, Chen F, Jin H, Xiang Y, Yang Y (2021) Auditing cache data integrity in the edge computing environment. IEEE Trans Parallel Distrib Syst 32(5):1210–1223

    Article  MATH  Google Scholar 

  31. Cui G, He Q, Li B, Xia X, Chen F, Jin H, Xiang Y, Yang Y (2021) Efficient verification of edge data integrity in edge computing environment. IEEE Trans Serv Comput 15(6):3233–3244

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenying Zheng.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Y., Zheng, W. & Ji, S. AI model auditing scheme towards cloud-edge high-performance computing. J Supercomput 81, 615 (2025). https://doi.org/10.1007/s11227-025-07121-0

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11227-025-07121-0

Keywords