Browse > Article
http://dx.doi.org/10.3837/tiis.2022.08.002

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization  

Chen, Lu (Information Engineering University)
Tang, Hongbo (Information Engineering University)
Zhao, Yu (Information Engineering University)
You, Wei (Information Engineering University)
Wang, Kai (Information Engineering University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.16, no.8, 2022 , pp. 2490-2506 More about this Journal
Abstract
In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.
Keywords
Mobile edge computing; Computing offloading; Usage pattern; Privacy protection; Lyapunov optimization;
Citations & Related Records
연도 인용수 순위
  • Reference
1 X. Xu, C. He, Z. Xu, L. Qi, S. Wan, and M. Z. A. Bhuiyan, "Joint optimization of offloading utility and privacy for edge computing enabled IoT," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2622-2629, 2020.   DOI
2 Y. Zhong, T. Q. Quek, and X. Ge, "Heterogeneous cellular networks with spatio-temporal traffic: Delay analysis and scheduling," IEEE Journal on Selected Areas in Communications, vol. 35, no. 6 pp. 1373-1386, 2017.   DOI
3 H. Ko, H. Lee, T. Kim, and S. Pack, "LPGA: Location Privacy-Guaranteed Offloading Algorithm in Cache-Enabled Edge Clouds," IEEE Transactions on Cloud Computing, pp. 1-1, 2020.
4 S. W. Ko, K. Han, and K. Huang, "Wireless networks for mobile edge computing: spatial modeling and latency analysis," IEEE Transactions on Wireless Communications, vol. 17, no. 8, pp.5225-5240, 2018.   DOI
5 J. Yang and T. Johansson, "An overview of cryptographic primitives for possible use in 5G and beyond," Science China Information Sciences, vol. 63, no. 12, pp. 5-26, 2020.
6 X. He, J. Liu, R. Jin, and H. Dai, "Privacy-aware offloading in mobile-edge computing," in Proc. of the IEEE Global Communications Conference, Singapore, pp. 1-6, 2017.
7 X. Ge, B. Yang, J. Ye, G. Mao, C. X. Wang, and T. Han, "Spatial spectrum and energy efficiency of random cellular networks," IEEE Transactions on Communications, vol. 63, no. 3, pp.1019-1030, 2015.   DOI
8 S. Huang, B. Lv, and R. Wang, "Mdp-based scheduling design for mobile-edge computing systems with random user arrival," in Proc. of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa Village, USA, pp.1-6, Dec, 2019.
9 Y. Mao, J. Zhang, S. H. Song, and K. B. Letaief, "Power-delay trade off in multi-user mobile-edge computing systems," in Proc. of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, pp. 1-6, 2016.
10 A. P. Miettinen, and J. K. Nurminen, "Energy efficiency of mobile clients in cloud computing," in Proc. of the 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10), 2010.
11 J. Moura, and D. Hutchison, "Game theory for multi-access edge computing: Survey, use cases, and future trends," IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 260-288, 2019.   DOI
12 X. ZHAO, J. PENG, W. YOU, and L. CHEN, "A Privacy-preserving Computation Offloading Method Based on k-Anonymity," Journal of Electronics & Information Technology, vol. 43, no.4, pp.892-899, 2021.
13 X. He, R. Jin, and H. Dai, "Deep PDS-learning for privacy-aware offloading in MEC-enabled IoT," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4547-4555, 2019.   DOI
14 J. Xu, and S. Ren, "Online learning for offloading and auto scaling in renewable-powered mobile edge computing," in Proc. of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC USA, 2016.
15 Y. Cui, V. K. Lau, R. Wang, H. Huang, and S. Zhang, "A survey on delay-aware resource control for wireless systems-Large deviation theory, stochastic Lyapunov drift, and distributed stochastic learning," IEEE Transactions on Information Theory, vol. 58, no. 3, pp. 1677-1701, 2012.   DOI
16 R. Roman, J. Lopez, and M. Mambo, "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges," Future Generation Computer Systems, vol. 78, pp. 680-698, 2018.   DOI
17 Z. Xiao, X. Dai, H. Jiang, D. Wang, H. Chen, L. Yang, and F. Zeng, "Vehicular task offloading via heat-aware mec cooperation using game-theoretic method," IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2038-2052, 2020.   DOI
18 X. Liu and Y. Deng, "Learning-based prediction, rendering and association optimization for MEC-enabled wireless virtual reality (vr) network," IEEE Transactions on Wireless Communications, vol. 20, no. 10, pp. 6356-6370, 2021.   DOI
19 T. Gopalakrishnan, D. Ruby, F. Al-Turjman, D. Gupta, I. V. Pustokhina, D. A. Pustokhin, and K. Shankar, "Deep learning enabled data offloading with cyber attack detection model in mobile edge computing systems," IEEE Access, vol. 8, pp. 185938-185949, 2020.   DOI
20 N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, "Mobile edge computing: A survey," IEEE Internet of Things Journal, vol.5, no.1, pp. 450-465, 2018.   DOI
21 K. Kaur, S. Garg, G. Kaddoum, M. Guizani, and D. N. K. Jayakody, "A lightweight and privacy-preserving authentication protocol for mobile edge computing," in Proc. of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa Village, USA, pp. 1-6, 2019.
22 Y. Li, X. Wang, X. Gan, H. Jin, L. Fu, and X. Wang, "Learning-aided computation offloading for trusted collaborative mobile edge computing," IEEE Transactions on Mobile Computing, vol. 19, no. 12, pp. 2833-2849, 2020.   DOI
23 C. F. Liu, M. Bennis, M. Debbah, and H. V. Poor, "Dynamic task offloading and resource allocation for ultra-reliable low-latency edge computing," IEEE Transactions on Communications, vol. 67, no. 6, pp. 4132-4150, 2019.   DOI
24 T. He, E. N. Ciftcioglu, S. Wang, and K. S. Chan, "Location privacy in mobile edge clouds: A chaff-based approach," IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp.2625-2636, 2017.   DOI
25 M. Bi, Y. Wang, Z. Cai, and X. Tong, "A privacy-preserving mechanism based on local differential privacy in edge computing," China Communications, vol. 17, no. 9, pp. 50-65, 2020.   DOI