A trusted and collaborative framework for deep learning in IoT

Abstract More and more Internet of Things (IoT) applications provide intelligent services, with the development of artificial intelligence algorithms, such as deep reinforcement learning. However, along with the trend of utilizing a large model with high accuracy in AI-enabled IoT, resource-limited IoT devices are difficult to handle these large-scale models with high response latency. By collaborating with edge nodes, the devices could respond quickly. However, IoT applications contain a large amount of user privacy, and pushing data to others might lead to privacy leakage. Inspired by the trusted execution environment technology, we propose a framework that enables trusted collaboration for future AI-enabled IoTs, in terms of computation security and transmission security, where the data could be processed in an isolated environment, and two approaches are proposed to ensure the security in data transmission. Experimental results show that our framework provides flexible and dynamic collaboration with low overhead and can effectively support collaborative edge intelligence.

[1]  Sakir Sezer,et al.  NOTRINO: A NOvel Hybrid TRust Management Scheme for INternet-of-Vehicles , 2021, IEEE Transactions on Vehicular Technology.

[2]  Sorin Grigorescu,et al.  A Survey of Deep Learning Techniques for Autonomous Driving , 2020, J. Field Robotics.

[3]  Weisong Shi,et al.  Computing Systems for Autonomous Driving: State of the Art and Challenges , 2021, IEEE Internet of Things Journal.

[4]  Yan Xu,et al.  Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT , 2021, IEEE Transactions on Industrial Electronics.

[5]  Eyal de Lara,et al.  Cloudpath: a multi-tier cloud computing framework , 2017, SEC.

[6]  Geyong Min,et al.  Computation Offloading in Multi-Access Edge Computing Using a Deep Sequential Model Based on Reinforcement Learning , 2019, IEEE Communications Magazine.

[7]  Mianxiong Dong,et al.  Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.

[8]  Quan Zhang,et al.  Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics , 2018, IEEE Transactions on Parallel and Distributed Systems.

[9]  Jie Xu,et al.  Dynamic Authentication for Cross-Realm SOA-Based Business Processes , 2012, IEEE Transactions on Services Computing.

[10]  Frederik Vercauteren,et al.  FPGA-Based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data , 2019, 2019 IEEE International Symposium on High Performance Computer Architecture (HPCA).

[11]  Carlos V. Rozas,et al.  Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave , 2016, HASP 2016.

[12]  Xiaopei Wu,et al.  Edge Video Analytics for Public Safety: A Review , 2019, Proceedings of the IEEE.

[13]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[14]  Jason P. Jue,et al.  All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .

[15]  Yun Yang,et al.  A Game-Theoretical Approach for Mitigating Edge DDoS Attack , 2022, IEEE Transactions on Dependable and Secure Computing.

[16]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[17]  Bo Li,et al.  Auditing Cache Data Integrity in the Edge Computing Environment , 2021, IEEE Transactions on Parallel and Distributed Systems.

[18]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[19]  Gueyoung Jung,et al.  FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention , 2016, 2016 IEEE/ACM Symposium on Edge Computing (SEC).

[20]  Hong Zhong,et al.  How Edge Computing and Initial Congestion Window Affect Latency of Web-Based Services: Early Experiences with Baidu? , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).

[21]  Etienne Perot,et al.  End-to-End Deep Reinforcement Learning for Lane Keeping Assist , 2016, ArXiv.

[22]  Albert Y. Zomaya,et al.  Fast Adaptive Task Offloading in Edge Computing Based on Meta Reinforcement Learning , 2021, IEEE Transactions on Parallel and Distributed Systems.

[23]  Valerio Schiavoni,et al.  SGX-Aware Container Orchestration for Heterogeneous Clusters , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[24]  Paramvir Bahl,et al.  Real-Time Video Analytics: The Killer App for Edge Computing , 2017, Computer.

[25]  Yun Yang,et al.  CoopEdge: A Decentralized Blockchain-based Platform for Cooperative Edge Computing , 2021, WWW.

[26]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[27]  Xiaopei Wu,et al.  OpenVDAP: An Open Vehicular Data Analytics Platform for CAVs , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).

[28]  Lin Wang,et al.  MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs , 2019, 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS).

[29]  Michael Naehrig,et al.  CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.

[30]  Valerio Schiavoni,et al.  SecureStreams: A Reactive Middleware Framework for Secure Data Stream Processing , 2017, DEBS.

[31]  Abdelmadjid Bouabdallah,et al.  Trusted Execution Environment: What It is, and What It is Not , 2015, TrustCom 2015.

[32]  Quan Zhang,et al.  Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts , 2018, IEEE Internet of Things Journal.

[33]  Hong Zhong,et al.  Demo Abstract: EVAPS: Edge Video Analysis for Public Safety , 2016, 2016 IEEE/ACM Symposium on Edge Computing (SEC).

[34]  Ying-Chang Liang,et al.  Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.

[35]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[36]  Yubin Xia,et al.  Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX , 2020, ASPLOS.

[37]  David Bernstein,et al.  Containers and Cloud: From LXC to Docker to Kubernetes , 2014, IEEE Cloud Computing.

[38]  Long Lu,et al.  StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone , 2018, USENIX ATC.