“…Therefore, any offloading scheme for IIoT-based systems must ensure self-verification of the computation results, confidentiality, integrity, fairness, data access controllability, result's completeness, and cooperation among the IIoT network. 6,7 To achieve these requirements, we develop reputation and morphism-based offloading scheme capable of ensuring self-verification results, confidentiality, integrity, fairness, data access controllability, result's completeness, and cooperation during MPC in IIoT.…”