About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings

Research Article

A Secure and Verifiable Outsourcing Scheme for Machine Learning Data

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-66922-5_21,
        author={Cheng Li and Li Yang and Jianfeng Ma},
        title={A Secure and Verifiable Outsourcing Scheme for Machine Learning Data},
        proceedings={Security and Privacy in New Computing Environments. Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings},
        proceedings_a={SPNCE},
        year={2021},
        month={1},
        keywords={Machine learning Edge computing Privacy-preserving Mobile devices Outsourced computing},
        doi={10.1007/978-3-030-66922-5_21}
    }
    
  • Cheng Li
    Li Yang
    Jianfeng Ma
    Year: 2021
    A Secure and Verifiable Outsourcing Scheme for Machine Learning Data
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-66922-5_21
Cheng Li1, Li Yang1,*, Jianfeng Ma1
  • 1: Xidian University, Xi’an
*Contact email: yangli@xidian.edu.cn

Abstract

In smart applications, such as smart medical devices, in order to prevent privacy leaks, more data needs to be processed and trained locally or near the local end. However, the storage and computing capabilities of smart devices are limited, so some computing tasks need to be outsourced; concurrently, the prevention of malicious nodes from accessing user data during outsourcing computing is required. Therefore, this paper proposes EVPP (efficient, verifiable, and privacy-preserving), a machine learning method based on a collaboration of edge computing devices. In this solution, the computationally intensive part of the model training process is outsourced. Meanwhile, a random encryption perturbation is performed on the outsourced training matrix, and verification factors are introduced to ensure the verifiability of the results. In addition, when a malicious service node is found, verifiable evidence can be generated to build a trust mechanism. Through the analysis of theoretical and experimental data, it can be shown that the scheme proposed in this paper can effectively use the computing power of the equipment.

Keywords
Machine learning Edge computing Privacy-preserving Mobile devices Outsourced computing
Published
2021-01-22
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-66922-5_21
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL