Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption

Abstract We present a privacy-preserving framework for Artificial Intelligence (AI) enabled composition for the edge networks. Edge computing is a very promising technology for provisioning realtime AI services due to low response time and network bandwidth requirements. Due to the lack of computational capabilities, an edge device alone cannot provide the complex AI services. Complex AI tasks should be divided into multiple sub-tasks and distributed among multiple edge devices for efficient service provisioning in the edge network. AI-enabled or automatic service composition is one of the essential AI tasks in the service provisioning. In edge computing-based service provisioning, service composition related tasks need to be offloaded to several edge nodes for efficient service. Edge nodes can be used for monitoring services, storing Quality-of-Service (QoS) data, and composing services to find the best composite service. Existing service composition methods use plaintext QoS data. Hence, attackers may compromise edge devices to reveal QoS data of services and modify them for giving an advantage to particular edge service providers, and the AI-based service composition becomes biased. From that point of view, a privacy-preserving framework for AI-based service composition is required for the edge networks. In our proposed framework, we introduce an AI-based composition model for edge services in the edge networks. Additionally, we present a privacy-preserving AI service composition framework to perform composition on encrypted QoS data using fully homomorphic encryption (FHE) algorithm. We conduct several experiments to evaluate the performance of our proposed privacy-preserving service composition framework using a synthetic QoS dataset.

[1]  Karin Bernsmed,et al.  A Server-side Approach to Privacy Policy Matching , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[2]  Dongxi Liu,et al.  Local Differential Privacy for Deep Learning , 2019, IEEE Internet of Things Journal.

[3]  Albert Y. Zomaya,et al.  Composition-Driven IoT Service Provisioning in Distributed Edges , 2018, IEEE Access.

[4]  Thomas Risse,et al.  Selecting skyline services for QoS-based web service composition , 2010, WWW '10.

[5]  Muhammad Asif,et al.  Automatic Number Plate Recognition System for Vehicle Identification Using Optical Character Recognition , 2009, 2009 International Conference on Education Technology and Computer.

[6]  Ivan Damgård,et al.  Publicly Auditable Secure Multi-Party Computation , 2014, SCN.

[7]  John Mylopoulos,et al.  Hierarchical hippocratic databases with minimal disclosure for virtual organizations , 2006, The VLDB Journal.

[8]  Ismaeel Al Ridhawi,et al.  Workflow-Net Based Service Composition Using Mobile Edge Nodes , 2017, IEEE Access.

[9]  Sanjay Ghemawat,et al.  MapReduce: simplified data processing on large clusters , 2008, CACM.

[10]  Nei Kato,et al.  New Perspectives on Future Smart FiWi Networks: Scalability, Reliability, and Energy Efficiency , 2016, IEEE Communications Surveys & Tutorials.

[11]  Craig Gentry,et al.  (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.

[12]  Barbara Carminati,et al.  A Privacy-Preserving Approach for Web Service Selection and Provisioning , 2011, 2011 IEEE International Conference on Web Services.

[13]  Phongphun Kijsanayothin,et al.  Privacy and Recovery in Composite Web Service Transactions , 2010 .

[14]  Ibrahim Khalil,et al.  Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption , 2017, PACIS.

[15]  I. V. Ramakrishnan,et al.  A Framework for Building Privacy-Conscious Composite Web Services , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[16]  Dijiang Huang,et al.  MoSeC: Mobile-Cloud Service Composition , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[17]  Ibrahim Khalil,et al.  Real-time Secure Health Surveillance for Smarter Health Communities , 2019, IEEE Communications Magazine.

[18]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[19]  Albert Y. Zomaya,et al.  Service Selection for Composition in Mobile Edge Computing Systems , 2018, 2018 IEEE International Conference on Web Services (ICWS).

[20]  Zhisheng Niu,et al.  Tasks scheduling and resource allocation in heterogeneous cloud for delay-bounded mobile edge computing , 2017, 2017 IEEE International Conference on Communications (ICC).

[21]  Xun Yi,et al.  Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption , 2020, J. Parallel Distributed Comput..

[22]  Tarik Taleb,et al.  On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration , 2017, IEEE Communications Surveys & Tutorials.

[23]  Albert Y. Zomaya,et al.  Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities , 2019, J. Parallel Distributed Comput..

[24]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[25]  MengChu Zhou,et al.  Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..

[26]  Michael Mrissa,et al.  Privacy-Aware DaaS Services Composition , 2011, DEXA.

[27]  Nei Kato,et al.  Energy Consumption Minimization for FiWi Enhanced LTE-A HetNets with UE Connection Constraint , 2016, IEEE Communications Magazine.

[28]  Nicola Zannone,et al.  Privacy-Aware Web Service Composition and Ranking , 2013, Int. J. Web Serv. Res..

[29]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[30]  Xiang Chen,et al.  Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.

[31]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[32]  Hong Ji,et al.  Combinational Auction-Based Service Provider Selection in Mobile Edge Computing Networks , 2017, IEEE Access.

[33]  Peter Richtárik,et al.  Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.

[34]  Ibrahim Khalil,et al.  Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform , 2019, Knowl. Based Syst..

[35]  Ismail Hakki Toroslu,et al.  A Semantic-Based User Privacy Protection Framework for Web Services , 2003, ITWP.