计算机科学 ›› 2021, Vol. 48 ›› Issue (1): 65-71.doi: 10.11896/jsjkx.200500098

所属专题: 智能化边缘计算

• 智能化边缘计算* 上一篇    下一篇

边缘计算场景中基于虚拟映射的隐私保护卸载算法

余雪勇, 陈涛   

  1. 江苏省无线通信重点实验室 南京 210003
  • 收稿日期:2020-05-21 修回日期:2020-08-14 出版日期:2021-01-15 发布日期:2021-01-15
  • 通讯作者: 余雪勇(yuxy@njupt.edu.cn)
  • 基金资助:
    国家自然科学基金资助项目(61871446);南京邮电大学自然科学基金项目(NY220047)

Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene

YU Xue-yong, CHEN Tao   

  1. Wireless Communication Key Lab of Jiangsu Province,Nanjing 210003,China
  • Received:2020-05-21 Revised:2020-08-14 Online:2021-01-15 Published:2021-01-15
  • About author:YU Xue-yong,born in 1979,Ph.D,associate professor.His main researchintere-sts include Internet of Thing (IoT),mobile edge computing and radio resource management on heterogeneous wireless networks.
  • Supported by:
    National Natural Science Foundation of China(61871446) and Natural Science Foundation of Nanjing University of Posts and Telecommunications(NY220047).

摘要: 随着移动边缘计算(Mobile Edge Computing,MEC)和无线充电技术(Wireless Power Transmission,WPT)的诞生和发展,越来越多的计算任务被卸载至MEC服务器以进行处理,并借助WPT技术为终端设备供电,以缓解终端设备计算能力受限和设备能耗过高的问题。由于卸载的任务和数据往往携带用户个人使用习惯等信息,因此将任务卸载到MEC服务器进行处理会导致新的隐私泄露问题。针对上述问题,文中首先对计算任务的隐私量进行定义,并设计了能够降低用户在MEC服务器累积隐私量的虚拟任务映射机制;然后,综合考虑映射机制与隐私约束的优化,提出了一种具有隐私保护效果的在线隐私感知计算卸载算法;最后,对仿真结果进行分析发现,所提卸载方法能够使用户累积隐私量保持在隐私阈值内,达到了隐私保护的效果,同时提高了系统计算速率,降低了用户计算时延。

关键词: 边缘计算, 计算卸载, 神经网络, 虚拟映射, 隐私保护

Abstract: With the development of mobile edge computing (MEC) and wireless power transfer (WPT),more and more computing tasks are offloaded to the MEC server for processing.The terminal equipment is powered by WPT technology to alleviate the limited computing power of the terminal equipment and high energy consumption of the terminal equipment.However,since the offloaded tasks and data often carry information such as users' personal usage habits,tasks are offloaded to the MEC server for processing results in new privacy leakage issues.A privacy-aware computation offloading method based on virtual mapping is proposed in this paper.Firstly,the privacy of the computing task is defined,and then a virtual task mapping mechanism that can reduce the amount of privacy accumulated by users on the MEC server is designed.Secondly,the online privacy-aware computing offloading algorithm is proposed by considering the optimization of the mapping mechanism and privacy constraints jointly.Finally,simulation results validate that the proposed offloading method can keep the cumulative privacy of users below the threshold,increase the system calculation rate and reduce users' calculation delay at the same time.

Key words: Computation offloading, Edge computing, Neural network, Privacy protection, Virtual mapping

中图分类号: 

  • TP393
[1] LIN J,YU W,ZHANG N,et al.A Survey on Internet ofThings:Architecture,Enabling Technologies,Security and Privacy,and Applications[J].IEEE Internet of Things Journal,2017,4(5):1125-1142.
[2] SUN X,ANSARI N.EdgeIoT:Mobile edge computing for the Internet of Things[J].IEEE Communications Magazine,2016,54(12):22-29.
[3] SABELLA D,VAILLANT A,KUURE P,et al.Mobile-edgecomputing architecture:The role of MEC in the Internet of Things[J].IEEE Consumer Electronics Magazine,2016,5(4):84-91.
[4] CORCORAN P,DATTA S K.Mobile-edge computing and theInternet of Things for consumers:Extending cloud computing and services to the edge of the network[J].IEEE Consumer Electronics Magazine,2016,5(4):73-74.
[5] ZHANG J L,ZHAO Y C,CHEN B,et al.Survey on data security and privacy-preserving for the research of edge computing [J].Journal on Communications,2018,39(3):1-21.
[6] YOUSEFPOUR A,ISHIGAKI G,GOUR R,et al.On reducing IoT service delay via fog offloading[J].IEEE Internet of Things Journal,2018,5(2):998-1010.
[7] BI S Z,HO C K,ZHANG R.Wireless powered communication:Opportunities and challenges[J].IEEE Communications Magazine,2015,53(4):117-125.
[8] WANG F,XU J,WANG X,et al.Joint offloading and computingoptimization in wireless powered mobile-edge computing systems[J].IEEE Transactions on Wireless Communications,2018,17(3):1784-1797.
[9] BI S Z,ZHANG Y J.Computation Rate Maximization for Wireless Powered Mobile-Edge Computing with Binary Computation Offloading[J].IEEE Transactions on Wireless Communications,2017,17(6):4177-4190.
[10] YANG Y C,WU L F,YIN G S,et al.A survey on security and privacy issues in Internet-of-Things[J].IEEE Internet Things Journal,2017,4(5):1250-1258.
[11] REN H,LI H W,DAI Y S,et al.Querying in Internet of Things with privacy preserving:Challenges,solutions and opportunities[J].IEEE Network,2018,32(6):144-151.
[12] ALRAWAIS A,ALHOTHAILY A,HU C Q,et al.Fog computing for the Internet of Things:Security and privacy issues[J].IEEE Internet Computing,2017,21(2):34-42.
[13] WANGS,LUO Y,SUN L,et al.Design of Privacy Preservation Authentication Protocol in Pervasive Environment[J].Computer Engineering,2012,38(6):129-131.
[14] LIU Y,SHAREN G W,ZHANG L W.Secure Authentication Approach of Mobile Terminals with Privacy Protection in the Mobile Cloud Computing[J].Journal of Chongqing University of Technology (Natural Science),2019,33(10):161-167.
[15] WANG Y,GE H B,FENG A Q.Computation Offloading Strategy in Cloud-Assisted Mobile Edge Computing[J].Computer Engineering,2020,46(8):27-34.
[16] HU J,YANG G,CHEN Z Y,et al.Research of Privacy-preserving Technology in Wireless Sensor Network Data Aggregation[J].Computer Engineering,2012,38(15):134-138.
[17] BOTTA A,DONATO W D,PERSICO V,et al.Integration of cloud computing and Internet of Things:A survey[J].Future Generation Computer System,2016,56:684-700.
[18] HE X F,LIU J,JIN R C,et al.Privacy-aware offloading in mobile-edge computing[C]// IEEE Global Communications Conference.Singapore,2017:1-6.
[19] MIN M H,WAN X Y,XIAO L,et al.Learning-based privacy-aware offloading for healthcare IoT with energy harvesting[J].IEEE Internet of Things Journal,2019,6(3):4307-4316.
[20] HE X F,JIN R C,DAI H Y.Deep PDS-learning for privacy-aware offloading in MEC-enabled IoT[J].IEEE Internet of Things Journal,2019,6(3):4547-4555.
[21] YOU C S,HUANG K B,CHAE H.Energy efficient mobilecloud computing powered by wireless energy transfer[J].IEEE Journal on Selected Areas in Communications,2016,34(5):1757-1771.
[22] BULTITUDE R.Measurement,characterization and modeling of indoor 800/900 MHz radio channels for digital communications[J].IEEE Communications Magazine,1987,25(6):5-12.
[23] HOWARD S J,PAHLAVAN K.Doppler spread measurements of indoor radio channel[J].Electronics Letters,1990,26(2):107-109.
[24] HERBERT S,WASSELL I,LOH T,et al.Characterizing thespectral properties and time variation of the in-vehicle wireless communication channel[J].IEEE Transactions on Communications,2014,62(7):2390-2399.
[25] GUO S T,XIAO B,YANG Y Y,et al.Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing[C]//IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications.San Francisco,2016:1-9.
[26] ZHAO X,PENG J H,YOU W.A Privacy-aware Computation Offloading Method Based on Lyapunov Optimization[J].Journal of Electronics & Information Technology,2020,42(3):704-711.
[27] LIANG H,BI S Z,ZHANG Y J.Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks[J].IEEE Transactions on Mobile Computing,2020,19(11):2581-2593.
[1] 周芳泉, 成卫青.
基于全局增强图神经网络的序列推荐
Sequence Recommendation Based on Global Enhanced Graph Neural Network
计算机科学, 2022, 49(9): 55-63. https://doi.org/10.11896/jsjkx.210700085
[2] 周乐员, 张剑华, 袁甜甜, 陈胜勇.
多层注意力机制融合的序列到序列中国连续手语识别和翻译
Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion
计算机科学, 2022, 49(9): 155-161. https://doi.org/10.11896/jsjkx.210800026
[3] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[4] 孙慧婷, 范艳芳, 马孟晓, 陈若愚, 蔡英.
VEC中基于动态定价的车辆协同计算卸载方案
Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC
计算机科学, 2022, 49(9): 242-248. https://doi.org/10.11896/jsjkx.210700166
[5] 宁晗阳, 马苗, 杨波, 刘士昌.
密码学智能化研究进展与分析
Research Progress and Analysis on Intelligent Cryptology
计算机科学, 2022, 49(9): 288-296. https://doi.org/10.11896/jsjkx.220300053
[6] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[7] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[8] 王润安, 邹兆年.
基于物理操作级模型的查询执行时间预测方法
Query Performance Prediction Based on Physical Operation-level Models
计算机科学, 2022, 49(8): 49-55. https://doi.org/10.11896/jsjkx.210700074
[9] 陈泳全, 姜瑛.
基于卷积神经网络的APP用户行为分析方法
Analysis Method of APP User Behavior Based on Convolutional Neural Network
计算机科学, 2022, 49(8): 78-85. https://doi.org/10.11896/jsjkx.210700121
[10] 朱承璋, 黄嘉儿, 肖亚龙, 王晗, 邹北骥.
基于注意力机制的医学影像深度哈希检索算法
Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism
计算机科学, 2022, 49(8): 113-119. https://doi.org/10.11896/jsjkx.210700153
[11] 檀莹莹, 王俊丽, 张超波.
基于图卷积神经网络的文本分类方法研究综述
Review of Text Classification Methods Based on Graph Convolutional Network
计算机科学, 2022, 49(8): 205-216. https://doi.org/10.11896/jsjkx.210800064
[12] 闫佳丹, 贾彩燕.
基于双图神经网络信息融合的文本分类方法
Text Classification Method Based on Information Fusion of Dual-graph Neural Network
计算机科学, 2022, 49(8): 230-236. https://doi.org/10.11896/jsjkx.210600042
[13] 李宗民, 张玉鹏, 刘玉杰, 李华.
基于可变形图卷积的点云表征学习
Deformable Graph Convolutional Networks Based Point Cloud Representation Learning
计算机科学, 2022, 49(8): 273-278. https://doi.org/10.11896/jsjkx.210900023
[14] 郝志荣, 陈龙, 黄嘉成.
面向文本分类的类别区分式通用对抗攻击方法
Class Discriminative Universal Adversarial Attack for Text Classification
计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077
[15] 齐秀秀, 王佳昊, 李文雄, 周帆.
基于概率元学习的矩阵补全预测融合算法
Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning
计算机科学, 2022, 49(7): 18-24. https://doi.org/10.11896/jsjkx.210600126
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!