Unlock instant, AI-driven research and patent intelligence for your innovation.

A privacy-preserving matrix multiplication task outsourcing method based on edge computing

A privacy protection and edge computing technology, applied in the computer field, can solve problems such as the lack of matrix multiplication task computing power of IoT devices, and achieve the effects of improving data security, reducing computing pressure, and reducing time complexity

Active Publication Date: 2022-02-25
QINGDAO UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of this application is to provide a matrix multiplication task outsourcing method, device, IoT device, and readable storage medium based on edge computing that supports privacy protection, so as to solve the lack of computing power for current IoT devices to complete matrix multiplication tasks The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy-preserving matrix multiplication task outsourcing method based on edge computing
  • A privacy-preserving matrix multiplication task outsourcing method based on edge computing
  • A privacy-preserving matrix multiplication task outsourcing method based on edge computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to enable those skilled in the art to better understand the solution of the present application, the present application will be further described in detail below in conjunction with the drawings and specific implementation methods. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0062] figure 1 It is a system model of edge computing. In IoT systems, devices (including sensors, smartphones, and wearable devices, etc.) are connected to enable the use and interaction of various applications, but these devices have limited computing and storage capacity. In edge computing, computing resources are located at the edge of the network, close to end devices. These edge servers provide sufficient computin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a privacy-protected matrix multiplication task outsourcing method based on edge computing, which is applied to IoT devices and can outsource matrix multiplication tasks on IoT devices to a certain number of edge servers for execution, reducing time Complexity, reducing the computing pressure of IoT devices; and using the basic transformation matrix to blindly encrypt the two input matrices, avoiding information leakage and improving data security; finally, the sub-calculation results of the edge server can be verified, Avoid getting erroneous calculation results and improve the reliability of outsourcing solutions. In addition, the present application also provides an edge computing-based outsourced device for matrix multiplication operations that supports privacy protection, an Internet of Things device, and a readable storage medium, the technical effects of which correspond to those of the above-mentioned method.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an edge computing-based outsourcing method, device, Internet of Things device, and readable storage medium for matrix multiplication tasks that support privacy protection. Background technique [0002] Various devices in the Internet of Things (IoT) are networked, and applications often involve complex calculations that may exceed the computing capabilities of some resource-constrained IoT devices. Therefore, how to make resource-constrained IoT devices effectively and safely complete complex calculations is of great importance. [0003] Secure outsourced computing has been extensively studied in recent years, which enables devices with limited computing power to outsource heavy workloads to parties with high computing power in a secure and verifiable manner. Existing studies focus on outsourcing tasks to one or two cloud servers that are far away from the end IoT us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F17/16H04L9/40
CPCG06F21/602G06F17/16H04L63/0428
Inventor 张翰林于佳于清李玥李新亮
Owner QINGDAO UNIV