Verifying Outsourced Computation in an Edge Computing Marketplace

An edge computing marketplace could enable IoT devices (Outsourcers) to outsource computation to any participating node (Contractors) in their proximity. In return, these nodes receive a reward for providing computation resources. In this work, we propose a scheme that verifies the integrity of arbitrary deterministic functions and is resistant to both dishonest Outsourcers and Contractors who try to maximize their expected payoff. We tested our verification scheme with state-of-the-art pre-trained Convolutional Neural Network models designed for object detection. On all devices, our verification scheme causes less than 1ms computational overhead and a negligible network bandwidth overhead of at most 84 bytes per frame. Our implementation can also perform our verification scheme's tasks parallel to the object detection to eliminate any latency overhead. Compared to other proposed verification schemes, our scheme resists a comprehensive set of protocol violations without sacrificing performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/03/2021

The Promise and Challenges of Computation Deduplication and Reuse at the Network Edge

In edge computing environments, where devices may be in close proximity ...
research
06/14/2018

Fire SSD: Wide Fire Modules based Single Shot Detector on Edge Device

With the emergence of edge computing, there is an increasing need for ru...
research
01/19/2020

Modeling of Deep Neural Network (DNN) Placement and Inference in Edge Computing

With the edge computing becoming an increasingly adopted concept in syst...
research
06/19/2019

Multi-user Resource Control with Deep Reinforcement Learning in IoT Edge Computing

By leveraging the concept of mobile edge computing (MEC), massive amount...
research
07/11/2021

Sharing is Caring: A Mobile Edge Computing Perspective

In this paper, we consider a system model in conjunction with two major ...
research
10/18/2020

Joint Storage Allocation and Computation Design for Private Edge Computing

In recent years, edge computing (EC) has attracted great attention for i...

Please sign up or login with your details

Forgot password? Click here to reset