Computer Science ›› 2021, Vol. 48 ›› Issue (1): 65-71.doi: 10.11896/jsjkx.200500098

Special Issue: Intelligent Edge Computing

• Intelligent Edge Computing • Previous Articles     Next Articles

Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene

YU Xue-yong, CHEN Tao   

  1. Wireless Communication Key Lab of Jiangsu Province,Nanjing 210003,China
  • Received:2020-05-21 Revised:2020-08-14 Online:2021-01-15 Published:2021-01-15
  • About author:YU Xue-yong,born in 1979,Ph.D,associate professor.His main researchintere-sts include Internet of Thing (IoT),mobile edge computing and radio resource management on heterogeneous wireless networks.
  • Supported by:
    National Natural Science Foundation of China(61871446) and Natural Science Foundation of Nanjing University of Posts and Telecommunications(NY220047).

Abstract: With the development of mobile edge computing (MEC) and wireless power transfer (WPT),more and more computing tasks are offloaded to the MEC server for processing.The terminal equipment is powered by WPT technology to alleviate the limited computing power of the terminal equipment and high energy consumption of the terminal equipment.However,since the offloaded tasks and data often carry information such as users' personal usage habits,tasks are offloaded to the MEC server for processing results in new privacy leakage issues.A privacy-aware computation offloading method based on virtual mapping is proposed in this paper.Firstly,the privacy of the computing task is defined,and then a virtual task mapping mechanism that can reduce the amount of privacy accumulated by users on the MEC server is designed.Secondly,the online privacy-aware computing offloading algorithm is proposed by considering the optimization of the mapping mechanism and privacy constraints jointly.Finally,simulation results validate that the proposed offloading method can keep the cumulative privacy of users below the threshold,increase the system calculation rate and reduce users' calculation delay at the same time.

Key words: Computation offloading, Edge computing, Neural network, Privacy protection, Virtual mapping

CLC Number: 

  • TP393
[1] LIN J,YU W,ZHANG N,et al.A Survey on Internet ofThings:Architecture,Enabling Technologies,Security and Privacy,and Applications[J].IEEE Internet of Things Journal,2017,4(5):1125-1142.
[2] SUN X,ANSARI N.EdgeIoT:Mobile edge computing for the Internet of Things[J].IEEE Communications Magazine,2016,54(12):22-29.
[3] SABELLA D,VAILLANT A,KUURE P,et al.Mobile-edgecomputing architecture:The role of MEC in the Internet of Things[J].IEEE Consumer Electronics Magazine,2016,5(4):84-91.
[4] CORCORAN P,DATTA S K.Mobile-edge computing and theInternet of Things for consumers:Extending cloud computing and services to the edge of the network[J].IEEE Consumer Electronics Magazine,2016,5(4):73-74.
[5] ZHANG J L,ZHAO Y C,CHEN B,et al.Survey on data security and privacy-preserving for the research of edge computing [J].Journal on Communications,2018,39(3):1-21.
[6] YOUSEFPOUR A,ISHIGAKI G,GOUR R,et al.On reducing IoT service delay via fog offloading[J].IEEE Internet of Things Journal,2018,5(2):998-1010.
[7] BI S Z,HO C K,ZHANG R.Wireless powered communication:Opportunities and challenges[J].IEEE Communications Magazine,2015,53(4):117-125.
[8] WANG F,XU J,WANG X,et al.Joint offloading and computingoptimization in wireless powered mobile-edge computing systems[J].IEEE Transactions on Wireless Communications,2018,17(3):1784-1797.
[9] BI S Z,ZHANG Y J.Computation Rate Maximization for Wireless Powered Mobile-Edge Computing with Binary Computation Offloading[J].IEEE Transactions on Wireless Communications,2017,17(6):4177-4190.
[10] YANG Y C,WU L F,YIN G S,et al.A survey on security and privacy issues in Internet-of-Things[J].IEEE Internet Things Journal,2017,4(5):1250-1258.
[11] REN H,LI H W,DAI Y S,et al.Querying in Internet of Things with privacy preserving:Challenges,solutions and opportunities[J].IEEE Network,2018,32(6):144-151.
[12] ALRAWAIS A,ALHOTHAILY A,HU C Q,et al.Fog computing for the Internet of Things:Security and privacy issues[J].IEEE Internet Computing,2017,21(2):34-42.
[13] WANGS,LUO Y,SUN L,et al.Design of Privacy Preservation Authentication Protocol in Pervasive Environment[J].Computer Engineering,2012,38(6):129-131.
[14] LIU Y,SHAREN G W,ZHANG L W.Secure Authentication Approach of Mobile Terminals with Privacy Protection in the Mobile Cloud Computing[J].Journal of Chongqing University of Technology (Natural Science),2019,33(10):161-167.
[15] WANG Y,GE H B,FENG A Q.Computation Offloading Strategy in Cloud-Assisted Mobile Edge Computing[J].Computer Engineering,2020,46(8):27-34.
[16] HU J,YANG G,CHEN Z Y,et al.Research of Privacy-preserving Technology in Wireless Sensor Network Data Aggregation[J].Computer Engineering,2012,38(15):134-138.
[17] BOTTA A,DONATO W D,PERSICO V,et al.Integration of cloud computing and Internet of Things:A survey[J].Future Generation Computer System,2016,56:684-700.
[18] HE X F,LIU J,JIN R C,et al.Privacy-aware offloading in mobile-edge computing[C]// IEEE Global Communications Conference.Singapore,2017:1-6.
[19] MIN M H,WAN X Y,XIAO L,et al.Learning-based privacy-aware offloading for healthcare IoT with energy harvesting[J].IEEE Internet of Things Journal,2019,6(3):4307-4316.
[20] HE X F,JIN R C,DAI H Y.Deep PDS-learning for privacy-aware offloading in MEC-enabled IoT[J].IEEE Internet of Things Journal,2019,6(3):4547-4555.
[21] YOU C S,HUANG K B,CHAE H.Energy efficient mobilecloud computing powered by wireless energy transfer[J].IEEE Journal on Selected Areas in Communications,2016,34(5):1757-1771.
[22] BULTITUDE R.Measurement,characterization and modeling of indoor 800/900 MHz radio channels for digital communications[J].IEEE Communications Magazine,1987,25(6):5-12.
[23] HOWARD S J,PAHLAVAN K.Doppler spread measurements of indoor radio channel[J].Electronics Letters,1990,26(2):107-109.
[24] HERBERT S,WASSELL I,LOH T,et al.Characterizing thespectral properties and time variation of the in-vehicle wireless communication channel[J].IEEE Transactions on Communications,2014,62(7):2390-2399.
[25] GUO S T,XIAO B,YANG Y Y,et al.Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing[C]//IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications.San Francisco,2016:1-9.
[26] ZHAO X,PENG J H,YOU W.A Privacy-aware Computation Offloading Method Based on Lyapunov Optimization[J].Journal of Electronics & Information Technology,2020,42(3):704-711.
[27] LIANG H,BI S Z,ZHANG Y J.Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks[J].IEEE Transactions on Mobile Computing,2020,19(11):2581-2593.
[1] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[2] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[3] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[4] SUN Hui-ting, FAN Yan-fang, MA Meng-xiao, CHEN Ruo-yu, CAI Ying. Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC [J]. Computer Science, 2022, 49(9): 242-248.
[5] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[6] WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55.
[7] CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85.
[8] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[9] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[10] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[11] QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24.
[12] YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63.
[13] ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105.
[14] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[15] LIU Yue-hong, NIU Shao-hua, SHEN Xian-hao. Virtual Reality Video Intraframe Prediction Coding Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(7): 127-131.
Full text



No Suggested Reading articles found!