Privacy-preserving edge computing offloading scheme based on whale optimization algorithm

被引:7
作者
Liu, Zhenpeng [1 ,2 ]
Wang, Jingyi [1 ]
Gao, Zilin [1 ]
Wei, Jianhang [2 ,3 ]
机构
[1] Hebei Univ, Sch Elect Informat Engn, Baoding 071002, Peoples R China
[2] Hebei Univ, Informat Technol Ctr, Baoding 071002, Peoples R China
[3] Xinjiang Univ Sci & Technol, Network & Expt Management Ctr, Korla 841000, Peoples R China
关键词
Edge computing; Computing offloading; Differential privacy; Whale optimization algorithm;
D O I
10.1007/s11227-022-04756-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the problem of user's task offloading in mobile edge computing and the potential leakage of location privacy during the offloading process, a privacy-preserving computing offloading scheme based on whale optimization algorithm is proposed. Using differential privacy technology to obfuscate the user's location information, the user can make task offloading decisions according to the obfuscated distance. Considering the delay, energy consumption, and their weighted sum, the offloading problem is modeled as a convex optimization problem. Then, the whale optimization algorithm is adopted to solve this optimization problem to achieve a balance between privacy protection and resource consumption. Experiments are conducted to verify the relationship between the degree of privacy leakage, the computation-offloading cost and real distance, privacy-preserving impact factor, the respective weights of time delay and energy consumption The experimental results show that the offloading scheme proposed in this paper has good performance in terms of cost and privacy protection.
引用
收藏
页码:3005 / 3023
页数:19
相关论文
共 28 条
[1]   A Comprehensive Review on Security and Privacy Preservation in Cloud Environment [J].
Bingu, Rajesh ;
Jothilakshmi, S. ;
Srinivasu, N. .
SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2021, 2022, 93 :719-738
[2]   Privacy and Energy Co-Aware Data Aggregation Computation Offloading for Fog-Assisted IoT Networks [J].
Chen, Siguang ;
You, Zihui ;
Ruan, Xiukai .
IEEE ACCESS, 2020, 8 (08) :72424-72434
[3]  
Dixit Sunanda, 2022, IOT with Smart Systems: Proceedings of ICTIS 2021. Smart Innovation, Systems and Technologies (251), P719, DOI 10.1007/978-981-16-3945-6_71
[4]  
Elgendy I. A., 2022, Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions, P117
[5]   User allocation-aware edge cloud placement in mobile edge computing [J].
Guo, Yan ;
Wang, Shangguang ;
Zhou, Ao ;
Xu, Jinliang ;
Yuan, Jie ;
Hsu, Ching-Hsien .
SOFTWARE-PRACTICE & EXPERIENCE, 2020, 50 (05) :489-502
[6]  
Hosseinzadeh Minoo, 2022, 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), P319, DOI 10.1109/CCNC49033.2022.9700676
[7]   Survey on computation offloading in UAV-Enabled mobile edge computing [J].
Huda, S. M. Asiful ;
Moh, Sangman .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 201
[8]   A Survey on Task Offloading in Multi-access Edge Computing [J].
Islam, Akhirul ;
Debnath, Arindam ;
Ghose, Manojit ;
Chakraborty, Suchetana .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 118
[9]   Neural Combinatorial Optimization for Energy-Efficient Offloading in Mobile Edge Computing [J].
Jiang, Qingmiao ;
Zhang, Yuan ;
Yan, Jinyao .
IEEE ACCESS, 2020, 8 (08) :35077-35089
[10]   Task offloading mechanism based on federated reinforcement learning in mobile edge computing [J].
Li, Jie ;
Yang, Zhiping ;
Wang, Xingwei ;
Xia, Yichao ;
Ni, Shijian .
DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (02) :492-504