Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes
<p>System architecture.</p> "> Figure 2
<p>Execution process of our scheme.</p> "> Figure 3
<p>Execution time of Message Encapsulation phase and Resource Allocation phase on the PC.</p> "> Figure 4
<p>Execution time of Message Encapsulation phase and Resource Allocation phase on the Raspberry Pi.</p> "> Figure 5
<p>Execution time of Test Authorization phase on the PC.</p> "> Figure 6
<p>Execution time of Test Authorization phase on the Raspberry Pi.</p> ">
Abstract
:1. Introduction
1.1. Our Contribution
1.2. Related Work
2. Background
2.1. System Architecture
- TA provides registration services for edge nodes and generates system parameters. In our scheme, TA is considered to be entirely trustworthy.
- End devices with limited computing and storage capabilities are users of the edge computing system and need to accomplish various tasks with the help of edge nodes.
- The gateway does the forwarding process for the received task and finds the appropriate edge nodes or cloud. Note that since the resource allocation is done by the gateway and not by the end device itself, only one group exists at every moment. In our scheme, the gateway is considered to be honest but curious [31], meaning that the gateway will honestly follow the protocol to complete the forwarding job but will try to violate the privacy of the end device.
- Edge nodes have a relatively limited computational and storage capacity [32,33], and thus generally need to collaborate to handle tasks. In our scheme, edge nodes may be compromised to become semi-malicious edge nodes. A semi-malicious edge node is defined as an edge node that will maintain system consistency but will behave maliciously (we call it an elimination attack) to weaken the privacy of the system. The elimination attack is defined as follows: Suppose an edge node with identity is corrupted by the smart gateway in the group setup phase. The elimination attack may “eliminate the necessity authorization“ via edge node . In other words, with the help of the corrupted edge node , the gateway is able to aggregate to a valid trapdoor for the message without the permission of edge node . The attack works as follows: (1) In the group public key generation phase, edge node broadcasts instead of ; (2) In the trapdoor generation phase, edge node generates the trapdoor with as normal; (3) In the trapdoor generation phase, the gateway does not include the partial trapdoor of the edge node in the aggregation process, i.e., it computes which turns out to be a valid trapdoor since has been canceled out in the group generation phase.
- The cloud is considered to have a sufficient computing and storage capacity, and some tasks that are not time-sensitive and require significant computing and storage resources will be sent to the cloud for processing.
2.2. Design Goals
- Metadata privacy: The gateway should be able to check whether a legitimate keyword is included in the encrypted metadata without learning the content of the metadata. When the gateway has no complete trapdoor, it will be equivalent to an eavesdropper. For an eavesdropper, indistinguishability is required. That is, the eavesdropper cannot distinguish whether two encrypted keywords are the same. In other words, one of the given two keywords is randomly chosen to be encrypted, and the attacker cannot distinguish which keyword the encrypted keyword corresponds to.
- Full key compromise resistance: Even if the attacker corrupts all the edge nodes in the system, the attacker still cannot decrypt the previously encrypted metadata.
- Semi-malicious edge node resistance: Semi-malicious edge nodes cannot disrupt other nodes’ participation in group public key generation via an elimination attack.
2.3. Bilinear Pairing
- Bilinear: , where .
- Non-degenerative: For each , there exists exactly one with .
2.4. Identity-Based Cryptosystem
2.5. Searchable Encryption
2.6. Extractable Zero-Knowledge Proof
3. Proposed Scheme
3.1. Preliminary Definitons
- Initialization. : The randomization algorithm Init takes the security parameter k as input and outputs the system master secret and public system parameters . The security parameter k is a parameter used to ensure the security of the scheme, usually including the secret key length and the output length of the hash function, etc.; this parameter needs to be chosen based on the tradeoffs between the desired security level and the performance requirements. The system parameters need to be public.
- Registration. : The deterministic algorithm Reg is run by TA and takes as input the identity of the edge node and outputs the private key corresponding to .
- Group Generation. : A group of edge nodes with total number k that want to build an edge computing system can run the algorithm to generate the corresponding group identity and group public key E.
- Keyword Generation. : A group of edge nodes with total number k generates a list of keywords for the end devices in the edge computing system.
- Message Encapsulation. : The algorithm can be run by any end device that knows the group public key. Inputting the group public key E and the metadata keyword m, the algorithm outputs the corresponding encryption keyword C. Finally, C and the task data need to be sent to the gateway.
- Test Authorization. : In order to authorize the gateway to test a specific keyword m, each edge node in the group needs to generate the corresponding partial trapdoor . The gateway aggregates these partial trapdoors to generate the final trapdoor T.
- Resource allocation. : The gateway runs the algorithm, and the input is the complete trapdoor T and the encryption keyword C. The algorithm outputs 1 if C contains the corresponding keyword m; otherwise, it outputs 0. Subsequently, the gateway can decide the resource allocation result based on the output and the corresponding tag of the edge node.
3.2. The Proposal
- Initialization: Taking as input the security parameter k, the TA generates a bilinear pairing , where and are both cyclic groups with prime order q, and P is the generator of . TA randomly chooses as the system master secret and computes ; then, three cryptographic hash functions are selected, notated as , and . Then, TA generates a common reference string, which includes a description of the group , denoted by . Finally, the TA publishes all system parameters:
- Registration: During this phase, TA should provide a registration service for edge nodes. Specifically, each edge node sends its to TA through a secure channel, and TA first computes and subsequently computes as the private key of edge node .
- Group Generation: Suppose an edge system consists of k edge nodes with IDs , and a group public key needs to be negotiated at that phase. Each edge node needs to maintain a set that contains all valid edge node subscripts, i.e., . Subsequently, the edge nodes perform the following operations:
- –
- For , the i-th edge node chooses a random number and computes as well as a proof . Finally, the edge node sends to other edge nodes via a secure channel.
- –
- Upon receiving a set of from other edge nodes, an edge node verifies the validity of with regard to and for all . If is not valid, this also implies that the edge node is semi-malicious; therefore, the subscript of the node should be removed from the set S, i.e., update . Subsequently, these edge nodes need to select a serial number (which can be instantiated based on a concatenation of the date and the value of a counter of the number of the group generation) to negotiate and publicize a unique group ID:Finally, the edge node can compute and publish the group public key , where
- Keyword Generation: In this phase, the edge system nodes need to negotiate to generate a list of keywords for the end device. This list of keywords is sent through the secure channel to the end device that wants to use this edge system. In order to resist the keyword guessing attack [43], the edge system needs to select random strings as keywords and the end devices and edge nodes need to record the correspondence between the keywords and the required factors.
- Message Encapsulation: The end device can send task data with encrypted metadata to the gateway. In order to encrypt the keyword m in the metadata, an end device selects and computes the encrypted keyword , where
- Test Authorization: Suppose the set S contains k edge nodes, . To authorize the gateway to test the keyword list , the i-th edge node needs to compute the corresponding partial trapdoor for the keyword , where . Subsequently, the edge node sends the corresponding to the gateway via a secure channel in a specific keyword order, where . The or represents whether the i-th edge node is willing to perform the task represented by m or not, respectively. Receiving , the gateway computesis the trapdoor used to determine whether the encrypted metadata contain the keyword .
- Resource Allocation: After receiving the encryption keyword in the encrypted metadata, the gateway needs to determine whether the equation
4. Security Analysis
4.1. Security Model
- Private key queries: This query is used to model our proposed scheme’s full key compromise resistance property. Specifically, is allowed to perform this query to obtain the private key of the edge node with the identity , and the query’s output is the corresponding node’s private key.
- Group public key queries: can use this query to obtain the group public key for a group of edge nodes. responds with the corresponding group public key.
- Trapdoor queries: can request the trapdoor corresponding to metadata m, and, as a response, runs the Test Authorization algorithm to obtain and return the trapdoor.
- Private key queries: This query is used to model our proposed scheme’s full key compromise resistance property. Specifically, is allowed to perform this query to obtain the private key of the edge node with identity , and the query’s output is the corresponding node’s private key.
- Group public key queries: can use this query to obtain the group public key for a group of edge nodes. responds with the corresponding group public key.
- Trapdoor queries: can request the trapdoor corresponding to metadata m, and, as a response, runs the Test Authorization algorithm to obtain and return the trapdoor.
- Semi-malicious corruptions queries: needs to maintain an initially empty list with records of the format . is allowed to add malicious records to .
4.2. Security Proofs
- queries: needs to maintain an initially empty list . When is input, first checks whether the record exists in , and, if it does, it returns to ; otherwise, randomly selects , computes , adds the record to , and returns to .
- queries: needs to maintain an initially empty list . When is input, first checks whether the record exists in , and, if it does, it returns to . Otherwise, flips a coin , assuming that the probability of the coin yielding 1 is and the probability of yielding 0 is , and, subsequently, randomly selects .
- –
- If , compute , add record to , and return as response.
- –
- Else, compute , add record to , and return as response.
- queries: needs to maintain an initially empty list . When is input, first checks whether record exists in , and, if it does, returns to ; otherwise, randomly selects , adds the record to , and returns to .
- Private key queries: The query takes as input, and, upon receiving this query, performs an query with as input, and then recovers the corresponding from , returning as a response.
- Semi-malicious corruptions queries: inputs , and adds the record to .
- Group public key queries: maintains a list with records of the formThe query receives as input; for , first determines whether there is a record associated with in , and, if not, randomly chooses , otherwise recovering the corresponding record from , and we note that, in this work, we use extractable knowledge proofs so that we can extract the from . Then, if , computes , and if , calculates . Finally, computesAdd the record
- Trapdoor queries: maintains a list with records of the form . The query receives as input, first recovering
- –
- If , since has knowledge of and the private key of , can use the Trapdoor algorithm to generate .
- –
- Else, if , computer .
- –
- Else, abort. We denote the event by Event 1.
If Event 1 does not occur, computes and adds the record to . - Challenge: chooses a group ID corresponding to , two keywords , and the group public key . Then, sends to . randomly selects , , sends as a response to , and finally, outputs its guess .
- Output: If , recovers the records from , for , recovers the record from . For , recovers the corresponding records from . For , we denote the value of the coin flip corresponding to as . It requires that only one coin corresponds to a value of 1. Then, randomly selects the pair from . Finally, outputsWhen Event 1 does not happen, will not notice the difference between the simulation and the real world, so we haveWe note that for to output a solution to the BDH problem, it is required that, for an index , and . And these occur with a probability of at least . Thus, we have outputting a solution to the BDH problem with the probability
5. Security Comparison and Performance Evaluation
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Satyanarayanan, M. The emergence of edge computing. Computer 2017, 50, 30–39. [Google Scholar] [CrossRef]
- Yang, C.; Shen, W.; Wang, X. The internet of things in manufacturing: Key issues and potential applications. IEEE Syst. Man Cybern. Mag. 2018, 4, 6–15. [Google Scholar] [CrossRef]
- Tzounis, A.; Katsoulas, N.; Bartzanas, T.; Kittas, C. Internet of Things in agriculture, recent advances and future challenges. Biosyst. Eng. 2017, 164, 31–48. [Google Scholar] [CrossRef]
- Jin, J.; Gubbi, J.; Marusic, S.; Palaniswami, M. An information framework for creating a smart city through internet of things. IEEE Internet Things J. 2014, 1, 112–121. [Google Scholar] [CrossRef]
- Yuehong, Y.; Zeng, Y.; Chen, X.; Fan, Y. The internet of things in healthcare: An overview. J. Ind. Inf. Integr. 2016, 1, 3–13. [Google Scholar]
- Mach, P.; Becvar, Z. Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 2017, 19, 1628–1656. [Google Scholar] [CrossRef]
- Aazam, M.; Huh, E.N. Fog computing and smart gateway based communication for cloud of things. In Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, Barcelona, Spain, 27–29 August 2014; pp. 464–470. [Google Scholar]
- Zhang, T.; Li, Y.; Chen, C.P. Edge computing and its role in Industrial Internet: Methodologies, applications, and future directions. Inf. Sci. 2021, 557, 34–65. [Google Scholar] [CrossRef]
- Hunkeler, U.; Truong, H.L.; Stanford-Clark, A. MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks. In Proceedings of the 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08), Bangalore, India, 5–10 January 2008; pp. 791–798. [Google Scholar]
- Beams, A.; Kannan, S.; Angel, S. Packet scheduling with optional client privacy. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event. 15–19 November 2021; pp. 3415–3430. [Google Scholar]
- Sasy, S.; Goldberg, I. SoK: Metadata-Protecting Communication Systems. In Proceedings of the 24th Privacy Enhancing Technologies Symposium (PETS 2024), Bristol, UK, 15–20 July 2024. [Google Scholar]
- Barman, L.; Kol, M.; Lazar, D.; Gilad, Y.; Zeldovich, N. Groove: Flexible {Metadata-Private} Messaging. In Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), Carlsbad, CA, USA, 11–13 July 2022; pp. 735–750. [Google Scholar]
- Jiang, P.; Wang, Q.; Cheng, J.; Wang, C.; Xu, L.; Wang, X.; Wu, Y.; Li, X.; Ren, K. Boomerang:{Metadata-Private} Messaging under Hardware Trust. In Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23), Boston, MA, USA, 17–19 April 2023; pp. 877–899. [Google Scholar]
- Zhang, L.; Li, J. Enabling robust and privacy-preserving resource allocation in fog computing. IEEE Access 2018, 6, 50384–50393. [Google Scholar] [CrossRef]
- Xiao, Y.; Jia, Y.; Liu, C.; Cheng, X.; Yu, J.; Lv, W. Edge computing security: State of the art and challenges. Proc. IEEE 2019, 107, 1608–1631. [Google Scholar] [CrossRef]
- Dinh, T.Q.; Tang, J.; La, Q.D.; Quek, T.Q. Offloading in mobile edge computing: Task allocation and computational frequency scaling. IEEE Trans. Commun. 2017, 65, 3571–3584. [Google Scholar]
- Tran, T.X.; Pompili, D. Joint task offloading and resource allocation for multi-server mobile-edge computing networks. IEEE Trans. Veh. Technol. 2018, 68, 856–868. [Google Scholar] [CrossRef]
- Zhao, J.; Li, Q.; Gong, Y.; Zhang, K. Computation offloading and resource allocation for cloud assisted mobile edge computing in vehicular networks. IEEE Trans. Veh. Technol. 2019, 68, 7944–7956. [Google Scholar] [CrossRef]
- Lu, R.; Heung, K.; Lashkari, A.H.; Ghorbani, A.A. A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT. IEEE Access 2017, 5, 3302–3312. [Google Scholar] [CrossRef]
- Lyu, L.; Nandakumar, K.; Rubinstein, B.; Jin, J.; Bedo, J.; Palaniswami, M. PPFA: Privacy preserving fog-enabled aggregation in smart grid. IEEE Trans. Ind. Inform. 2018, 14, 3733–3744. [Google Scholar] [CrossRef]
- Zhang, L.; Zou, Y.; Wang, W.; Jin, Z.; Su, Y.; Chen, H. Resource allocation and trust computing for blockchain-enabled edge computing system. Comput. Secur. 2021, 105, 102249. [Google Scholar] [CrossRef]
- Kong, W.; Li, X.; Hou, L.; Yuan, J.; Gao, Y.; Yu, S. A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing. IEEE Internet Things J. 2022, 9, 13927–13941. [Google Scholar] [CrossRef]
- Zhou, J.; Choo, K.K.R.; Cao, Z.; Dong, X. PVOPM: Verifiable privacy-preserving pattern matching with efficient outsourcing in the malicious setting. IEEE Trans. Dependable Secur. Comput. 2019, 18, 2253–2270. [Google Scholar] [CrossRef]
- Li, T.; Tian, Y.; Xiong, J.; Bhuiyan, M.Z.A. FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT. IEEE Trans. Ind. Inform. 2023, 19, 940–950. [Google Scholar] [CrossRef]
- Wang, Y.; Su, Z.; Luan, T.H.; Li, J.; Xu, Q.; Li, R. SEAL: A Strategy-Proof and Privacy-Preserving UAV Computation Offloading Framework. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5213–5228. [Google Scholar] [CrossRef]
- Angel, S.; Kannan, S.; Ratliff, Z. Private resource allocators and their applications. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–20 May 2020; pp. 372–391. [Google Scholar]
- Ahmad, I.; Yang, Y.; Agrawal, D.; El Abbadi, A.; Gupta, T. Addra: Metadata-private voice communication over fully untrusted infrastructure. In Proceedings of the 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21), Virtual. 14–16 July 2021. [Google Scholar]
- Chor, B.; Kushilevitz, E.; Goldreich, O.; Sudan, M. Private information retrieval. J. ACM 1998, 45, 965–981. [Google Scholar] [CrossRef]
- Cai, C.; Zang, Y.; Wang, C.; Jia, X.; Wang, Q. Vizard: A metadata-hiding data analytic system with end-to-end policy controls. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 7–11 November 2022; pp. 441–454. [Google Scholar]
- Langowski, S.; Servan-Schreiber, S.; Devadas, S. Trellis: Robust and scalable metadata-private anonymous broadcast. Cryptology ePrint Archive. 2022. Available online: https://eprint.iacr.org/2022/1548 (accessed on 31 March 2024).
- Liu, D. Efficient processing of encrypted data in honest-but-curious clouds. In Proceedings of the 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, CA, USA, 27 June–2 July 2016; pp. 970–974. [Google Scholar]
- Samie, F.; Tsoutsouras, V.; Bauer, L.; Xydis, S.; Soudris, D.; Henkel, J. Computation offloading and resource allocation for low-power IoT edge devices. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 7–12. [Google Scholar]
- Qiu, T.; Chi, J.; Zhou, X.; Ning, Z.; Atiquzzaman, M.; Wu, D.O. Edge computing in industrial internet of things: Architecture, advances and challenges. IEEE Commun. Surv. Tutor. 2020, 22, 2462–2488. [Google Scholar] [CrossRef]
- Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. SIAM J. Comput. 2003, 32, 586–615. [Google Scholar] [CrossRef]
- Gupta, D.S.; Ray, S.; Singh, T.; Kumari, M. Post-quantum lightweight identity-based two-party authenticated key exchange protocol for internet of vehicles with probable security. Comput. Commun. 2022, 181, 69–79. [Google Scholar] [CrossRef]
- Song, D.X.; Wagner, D.; Perrig, A. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, S&P 2000, Berkeley, CA, USA, 14–17 May 2000; pp. 44–55. [Google Scholar]
- Poh, G.S.; Chin, J.J.; Yau, W.C.; Choo, K.K.R.; Mohamad, M.S. Searchable symmetric encryption: Designs and challenges. ACM Comput. Surv. (CSUR) 2017, 50, 1–37. [Google Scholar] [CrossRef]
- Boneh, D.; Di Crescenzo, G.; Ostrovsky, R.; Persiano, G. Public key encryption with keyword search. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (Advances in Cryptology—EUROCRYPT 2004), Interlaken, Switzerland, 2–6 May 2004; pp. 506–522. [Google Scholar]
- Hwang, Y.H.; Lee, P.J. Public key encryption with conjunctive keyword search and its extension to a multi-user system. In Proceedings of the International Conference on Pairing-Based Cryptography, Tokyo, Japan, 2–4 July 2007; pp. 2–22. [Google Scholar]
- Goldwasser, S.; Micali, S.; Rackoff, C. The knowledge complexity of interactive proof-systems. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali; ACM Books: New York, NY, USA, 2019; pp. 203–225. [Google Scholar]
- Camenisch, J.; Kiayias, A.; Yung, M. On the portability of generalized schnorr proofs. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, 26–30 April 2009; pp. 425–442. [Google Scholar]
- Fischlin, M. Communication-efficient non-interactive proofs of knowledge with online extractors. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2005; pp. 152–168. [Google Scholar]
- Byun, J.W.; Rhee, H.S.; Park, H.A.; Lee, D.H. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Proceedings of the Workshop on Secure Data Management, Seoul, Republic of Korea, 10–11 September 2006; pp. 75–83. [Google Scholar]
- Cramer, R.; Damgård, I.; MacKenzie, P. Efficient zero-knowledge proofs of knowledge without intractability assumptions. In Proceedings of the International Workshop on Public Key Cryptography, Victoria, Australia, 18–20 January 2000; pp. 354–372. [Google Scholar]
- Block, A.R.; Holmgren, J.; Rosen, A.; Rothblum, R.D.; Soni, P. Public-coin zero-knowledge arguments with (almost) minimal time and space overheads. In Proceedings of the Theory of Cryptography Conference, Durham, NC, USA, 16–19 November 2020; pp. 168–197. [Google Scholar]
Metadata Privacy | Full Key Compromise Resistance | Semi-Malicious Edge Nodes Resistance | |
---|---|---|---|
Zhang et al.’s scheme [14] | ✓ | ✓ | ✗ |
Our proposed scheme | ✓ | ✓ | ✓ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, Z.; Li, J.; Li, Y.; He, Y. Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes. Sensors 2024, 24, 2989. https://doi.org/10.3390/s24102989
Zhang Z, Li J, Li Y, He Y. Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes. Sensors. 2024; 24(10):2989. https://doi.org/10.3390/s24102989
Chicago/Turabian StyleZhang, Zihou, Jiangtao Li, Yufeng Li, and Yuanhang He. 2024. "Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes" Sensors 24, no. 10: 2989. https://doi.org/10.3390/s24102989
APA StyleZhang, Z., Li, J., Li, Y., & He, Y. (2024). Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes. Sensors, 24(10), 2989. https://doi.org/10.3390/s24102989