计算机技术、通信工程 |
|
|
|
|
基于区块链的车联网矩阵计算安全卸载方案 |
刘雪娇1(),宋庆武1,夏莹杰2,*() |
1. 杭州师范大学 信息科学与技术学院,浙江 杭州 311121 2. 浙江大学 计算机科学与技术学院,浙江 杭州 310027 |
|
Secure computation offloading scheme for matrix in Internet of vehicles based on blockchain |
Xue-jiao LIU1(),Qing-wu SONG1,Ying-jie XIA2,*() |
1. School of Information Science and Technology, Hangzhou Normal University, Hangzhou 311121, China 2. College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China |
1 |
李智勇, 王琦, 陈一凡, 等 车辆边缘计算环境下任务卸载研究综述[J]. 计算机学报, 2021, 44 (5): 963- 982 LI Zhi-yong, WANG Qi, CHEN Yi-fan, et al A survey on task offloading research in vehicular edge computing[J]. Chinese Journal of Computers, 2021, 44 (5): 963- 982
doi: 10.11897/SP.J.1016.2021.00963
|
2 |
DAI H, ZENG X Y, YU Z L, et al A scheduling algorithm for autonomous driving tasks on mobile edge computing servers[J]. Journal of Systems Architecture, 2019, 94: 14- 23
doi: 10.1016/j.sysarc.2019.02.004
|
3 |
HU L, TIAN Y W, YANG J, et al Ready player one: UAV-clustering-based multi-task offloading for vehicular VR/AR gaming[J]. IEEE Network, 2019, 33 (3): 42- 48
doi: 10.1109/MNET.2019.1800357
|
4 |
赵梓铭, 刘芳, 蔡志平, 等 边缘计算: 平台、应用与挑战[J]. 计算机研究与发展, 2018, 55 (2): 327- 337 ZHAO Zi-ming, LIU Fang, CAI Zhi-ping, et al Edge computing: platforms, applications and challenges[J]. Journal of Computer Research and Development, 2018, 55 (2): 327- 337
doi: 10.7544/issn1000-1239.2018.20170228
|
5 |
GENNARO R, GENTRY C, PARNO B. Non-interactive verifiable computing: outsourcing computation to untrusted workers [C]// Annual Cryptology Conference. Berlin: Springer, 2010: 465-482.
|
6 |
MISHRA P K, RATHEE D, DUONG D H, et al Fast secure matrix multiplications over ring-based homomorphic encryption[J]. Information Security Journal: A Global Perspective, 2020, 30 (4): 219- 234
|
7 |
JIANG X Q, KIM M, LAUTER K, et al. Secure outsourced matrix computation and application to neural networks [C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2018: 1209-1222.
|
8 |
OLIVA G, CIOABA S, HADJICOSTIS C N Distributed calculation of edge-disjoint spanning trees for robustifying distributed algorithms against man-in-the-middle attacks[J]. IEEE Transactions on Control of Network Systems, 2017, 5 (4): 1646- 1656
|
9 |
ABBAS N, ZHANG Y, TAHERKORDI A, et al Mobile edge computing: a survey[J]. IEEE Internet of Things Journal, 2017, 5 (1): 450- 465
|
10 |
ZHANG S M, LI H W, DAI Y S, et al. EPP-DMM: an efficient and privacy-protected delegation scheme for matrix multiplication [C]// IEEE Global Communications Conference. Piscataway: IEEE, 2017: 1-6.
|
11 |
ZHANG S M, LI H W, DAI Y S, et al Verifiable outsourcing computation for matrix multiplication with improved efficiency and applicability[J]. IEEE Internet of Things Journal, 2018, 5 (6): 5076- 5088
doi: 10.1109/JIOT.2018.2867113
|
12 |
王晨旭, 程加成, 桑新欣, 等 区块链数据隐私保护: 研究现状与展望[J]. 计算机研究与发展, 2021, 58 (10): 2099- 2119 WANG Chen-xu, CHENG Jia-cheng, SANG Xin-xin, et al Data privacy-preserving for blockchain: state of the art and trends[J]. Journal of Computer Research and Development, 2021, 58 (10): 2099- 2119
doi: 10.7544/issn1000-1239.2021.20210804
|
13 |
MOLLAH M B, ZHAO J, NIYATO D, et al Blockchain for the internet of vehicles towards intelligent transportation systems: a survey[J]. IEEE Internet of Things Journal, 2020, 8 (6): 4157- 4185
|
14 |
俞建业, 戚湧, 王宝茁 基于Spark的车联网分布式组合深度学习入侵检测方法[J]. 计算机科学, 2021, 48 (Supple.1): 518- 523 YU Jian-ye, QI Yong, WANG Bao-zhuo Distributed combination deep learning intrusion detection method for Internet of vehicles based on spark[J]. Computer Science, 2021, 48 (Supple.1): 518- 523
doi: 10.11896/jsjkx.200700129
|
15 |
VASUDEVAN A, ANDERSON A, GREGG D. Parallel multi channel convolution using general matrix multiplication [C]// 28th IEEE International Conference on Application-Specific Systems, Architectures and Processors. Piscataway: IEEE, 2017: 19-24.
|
16 |
ZHOU J, WU F, ZHANG K, et al. Joint optimization of offloading and resource allocation in vehicular networks with mobile edge computing [C]// 10th International Conference on Wireless Communications and Signal Processing. Piscataway: IEEE, 2018: 1-6.
|
17 |
MOURAD A, TOUT H, WAHAB O A, et al Ad Hoc vehicular fog enabling cooperative low-latency intrusion detection[J]. IEEE Internet of Things Journal, 2020, 8 (2): 829- 843
|
18 |
CUI M Y, ZHONG S P, LI B Y, et al Offloading autonomous driving services via edge computing[J]. IEEE Internet of Things Journal, 2020, 7 (10): 10535- 10547
doi: 10.1109/JIOT.2020.3001218
|
19 |
WANG S M, YE D D, HUANG X M, et al Consortium blockchain for secure resource sharing in vehicular edge computing: a contract-based approach[J]. IEEE Transactions on Network Science and Engineering, 2020, 8 (2): 1189- 1201
|
20 |
LIAO H J, MU Y S, ZHOU Z Y, et al Blockchain and learning-based secure and intelligent task offloading for vehicular fog computing[J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22 (7): 4051- 4063
doi: 10.1109/TITS.2020.3007770
|
21 |
ISLAM S, BADSHA S, SENGUPTA S, et al Blockchain-enabled intelligent vehicular edge computing[J]. IEEE Network, 2021, 35 (3): 125- 131
doi: 10.1109/MNET.011.2000554
|
22 |
AVIZHEH S, NABI M, SAFAVI R, et al. Verifiable computation using smart contracts [C]// Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop. New York: ACM, 2019: 17-28.
|
23 |
DORSALA M R, SASTRY V N, CHAPRAM S Fair payments for verifiable cloud services using smart contracts[J]. Computers and Security, 2020, 90: 101712
doi: 10.1016/j.cose.2019.101712
|
24 |
DONG C Y, WANG Y L, ALDWEESH A, et al. Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing [C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2017: 211-227.
|
25 |
SALINAS S, LUO C Q, CHEN X H, et al. Efficient secure outsourcing of large-scale linear systems of equations [C]// IEEE Conference on Computer Communications. Piscataway: IEEE, 2015: 1035-1043.
|
26 |
ZHANG X Y, JIANG T, LI K C, et al New publicly verifiable computation for batch matrix multiplication[J]. Information Sciences, 2019, 479: 664- 678
doi: 10.1016/j.ins.2017.11.063
|
27 |
KONG S, CAI Y, XUE F, et al Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation[J]. International Journal of Wireless and Mobile Computing, 2018, 14 (1): 90- 96
doi: 10.1504/IJWMC.2018.089984
|
28 |
FU S J, YU Y P, XU M. A secure algorithm for outsourcing matrix multiplication computation in the cloud [C]// Proceedings of the 5th ACM International Workshop on Security in Cloud Computing. New York: ACM, 2017: 27-33.
|
29 |
WU Y, LIAO Y J, LIANG Y K, et al Secure and efficient protocol for outsourcing large-scale matrix multiplication to the cloud[J]. IEEE Access, 2020, 8: 227556- 227565
doi: 10.1109/ACCESS.2020.3045999
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|