计算机科学 ›› 2021, Vol. 48 ›› Issue (1): 65-71.doi: 10.11896/jsjkx.200500098
所属专题: 智能化边缘计算
余雪勇, 陈涛
YU Xue-yong, CHEN Tao
摘要: 随着移动边缘计算(Mobile Edge Computing,MEC)和无线充电技术(Wireless Power Transmission,WPT)的诞生和发展,越来越多的计算任务被卸载至MEC服务器以进行处理,并借助WPT技术为终端设备供电,以缓解终端设备计算能力受限和设备能耗过高的问题。由于卸载的任务和数据往往携带用户个人使用习惯等信息,因此将任务卸载到MEC服务器进行处理会导致新的隐私泄露问题。针对上述问题,文中首先对计算任务的隐私量进行定义,并设计了能够降低用户在MEC服务器累积隐私量的虚拟任务映射机制;然后,综合考虑映射机制与隐私约束的优化,提出了一种具有隐私保护效果的在线隐私感知计算卸载算法;最后,对仿真结果进行分析发现,所提卸载方法能够使用户累积隐私量保持在隐私阈值内,达到了隐私保护的效果,同时提高了系统计算速率,降低了用户计算时延。
中图分类号:
[1] LIN J,YU W,ZHANG N,et al.A Survey on Internet ofThings:Architecture,Enabling Technologies,Security and Privacy,and Applications[J].IEEE Internet of Things Journal,2017,4(5):1125-1142. [2] SUN X,ANSARI N.EdgeIoT:Mobile edge computing for the Internet of Things[J].IEEE Communications Magazine,2016,54(12):22-29. [3] SABELLA D,VAILLANT A,KUURE P,et al.Mobile-edgecomputing architecture:The role of MEC in the Internet of Things[J].IEEE Consumer Electronics Magazine,2016,5(4):84-91. [4] CORCORAN P,DATTA S K.Mobile-edge computing and theInternet of Things for consumers:Extending cloud computing and services to the edge of the network[J].IEEE Consumer Electronics Magazine,2016,5(4):73-74. [5] ZHANG J L,ZHAO Y C,CHEN B,et al.Survey on data security and privacy-preserving for the research of edge computing [J].Journal on Communications,2018,39(3):1-21. [6] YOUSEFPOUR A,ISHIGAKI G,GOUR R,et al.On reducing IoT service delay via fog offloading[J].IEEE Internet of Things Journal,2018,5(2):998-1010. [7] BI S Z,HO C K,ZHANG R.Wireless powered communication:Opportunities and challenges[J].IEEE Communications Magazine,2015,53(4):117-125. [8] WANG F,XU J,WANG X,et al.Joint offloading and computingoptimization in wireless powered mobile-edge computing systems[J].IEEE Transactions on Wireless Communications,2018,17(3):1784-1797. [9] BI S Z,ZHANG Y J.Computation Rate Maximization for Wireless Powered Mobile-Edge Computing with Binary Computation Offloading[J].IEEE Transactions on Wireless Communications,2017,17(6):4177-4190. [10] YANG Y C,WU L F,YIN G S,et al.A survey on security and privacy issues in Internet-of-Things[J].IEEE Internet Things Journal,2017,4(5):1250-1258. [11] REN H,LI H W,DAI Y S,et al.Querying in Internet of Things with privacy preserving:Challenges,solutions and opportunities[J].IEEE Network,2018,32(6):144-151. [12] ALRAWAIS A,ALHOTHAILY A,HU C Q,et al.Fog computing for the Internet of Things:Security and privacy issues[J].IEEE Internet Computing,2017,21(2):34-42. [13] WANGS,LUO Y,SUN L,et al.Design of Privacy Preservation Authentication Protocol in Pervasive Environment[J].Computer Engineering,2012,38(6):129-131. [14] LIU Y,SHAREN G W,ZHANG L W.Secure Authentication Approach of Mobile Terminals with Privacy Protection in the Mobile Cloud Computing[J].Journal of Chongqing University of Technology (Natural Science),2019,33(10):161-167. [15] WANG Y,GE H B,FENG A Q.Computation Offloading Strategy in Cloud-Assisted Mobile Edge Computing[J].Computer Engineering,2020,46(8):27-34. [16] HU J,YANG G,CHEN Z Y,et al.Research of Privacy-preserving Technology in Wireless Sensor Network Data Aggregation[J].Computer Engineering,2012,38(15):134-138. [17] BOTTA A,DONATO W D,PERSICO V,et al.Integration of cloud computing and Internet of Things:A survey[J].Future Generation Computer System,2016,56:684-700. [18] HE X F,LIU J,JIN R C,et al.Privacy-aware offloading in mobile-edge computing[C]// IEEE Global Communications Conference.Singapore,2017:1-6. [19] MIN M H,WAN X Y,XIAO L,et al.Learning-based privacy-aware offloading for healthcare IoT with energy harvesting[J].IEEE Internet of Things Journal,2019,6(3):4307-4316. [20] HE X F,JIN R C,DAI H Y.Deep PDS-learning for privacy-aware offloading in MEC-enabled IoT[J].IEEE Internet of Things Journal,2019,6(3):4547-4555. [21] YOU C S,HUANG K B,CHAE H.Energy efficient mobilecloud computing powered by wireless energy transfer[J].IEEE Journal on Selected Areas in Communications,2016,34(5):1757-1771. [22] BULTITUDE R.Measurement,characterization and modeling of indoor 800/900 MHz radio channels for digital communications[J].IEEE Communications Magazine,1987,25(6):5-12. [23] HOWARD S J,PAHLAVAN K.Doppler spread measurements of indoor radio channel[J].Electronics Letters,1990,26(2):107-109. [24] HERBERT S,WASSELL I,LOH T,et al.Characterizing thespectral properties and time variation of the in-vehicle wireless communication channel[J].IEEE Transactions on Communications,2014,62(7):2390-2399. [25] GUO S T,XIAO B,YANG Y Y,et al.Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing[C]//IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications.San Francisco,2016:1-9. [26] ZHAO X,PENG J H,YOU W.A Privacy-aware Computation Offloading Method Based on Lyapunov Optimization[J].Journal of Electronics & Information Technology,2020,42(3):704-711. [27] LIANG H,BI S Z,ZHANG Y J.Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks[J].IEEE Transactions on Mobile Computing,2020,19(11):2581-2593. |
[1] | 周芳泉, 成卫青. 基于全局增强图神经网络的序列推荐 Sequence Recommendation Based on Global Enhanced Graph Neural Network 计算机科学, 2022, 49(9): 55-63. https://doi.org/10.11896/jsjkx.210700085 |
[2] | 周乐员, 张剑华, 袁甜甜, 陈胜勇. 多层注意力机制融合的序列到序列中国连续手语识别和翻译 Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion 计算机科学, 2022, 49(9): 155-161. https://doi.org/10.11896/jsjkx.210800026 |
[3] | 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩. 基于分层抽样优化的面向异构客户端的联邦学习 Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients 计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263 |
[4] | 孙慧婷, 范艳芳, 马孟晓, 陈若愚, 蔡英. VEC中基于动态定价的车辆协同计算卸载方案 Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC 计算机科学, 2022, 49(9): 242-248. https://doi.org/10.11896/jsjkx.210700166 |
[5] | 宁晗阳, 马苗, 杨波, 刘士昌. 密码学智能化研究进展与分析 Research Progress and Analysis on Intelligent Cryptology 计算机科学, 2022, 49(9): 288-296. https://doi.org/10.11896/jsjkx.220300053 |
[6] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[7] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[8] | 王润安, 邹兆年. 基于物理操作级模型的查询执行时间预测方法 Query Performance Prediction Based on Physical Operation-level Models 计算机科学, 2022, 49(8): 49-55. https://doi.org/10.11896/jsjkx.210700074 |
[9] | 陈泳全, 姜瑛. 基于卷积神经网络的APP用户行为分析方法 Analysis Method of APP User Behavior Based on Convolutional Neural Network 计算机科学, 2022, 49(8): 78-85. https://doi.org/10.11896/jsjkx.210700121 |
[10] | 朱承璋, 黄嘉儿, 肖亚龙, 王晗, 邹北骥. 基于注意力机制的医学影像深度哈希检索算法 Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism 计算机科学, 2022, 49(8): 113-119. https://doi.org/10.11896/jsjkx.210700153 |
[11] | 檀莹莹, 王俊丽, 张超波. 基于图卷积神经网络的文本分类方法研究综述 Review of Text Classification Methods Based on Graph Convolutional Network 计算机科学, 2022, 49(8): 205-216. https://doi.org/10.11896/jsjkx.210800064 |
[12] | 闫佳丹, 贾彩燕. 基于双图神经网络信息融合的文本分类方法 Text Classification Method Based on Information Fusion of Dual-graph Neural Network 计算机科学, 2022, 49(8): 230-236. https://doi.org/10.11896/jsjkx.210600042 |
[13] | 李宗民, 张玉鹏, 刘玉杰, 李华. 基于可变形图卷积的点云表征学习 Deformable Graph Convolutional Networks Based Point Cloud Representation Learning 计算机科学, 2022, 49(8): 273-278. https://doi.org/10.11896/jsjkx.210900023 |
[14] | 郝志荣, 陈龙, 黄嘉成. 面向文本分类的类别区分式通用对抗攻击方法 Class Discriminative Universal Adversarial Attack for Text Classification 计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077 |
[15] | 齐秀秀, 王佳昊, 李文雄, 周帆. 基于概率元学习的矩阵补全预测融合算法 Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning 计算机科学, 2022, 49(7): 18-24. https://doi.org/10.11896/jsjkx.210600126 |
|