Privacy-preserving edge computing offloading scheme based on whale optimization algorithm

被引:7
作者
Liu, Zhenpeng [1 ,2 ]
Wang, Jingyi [1 ]
Gao, Zilin [1 ]
Wei, Jianhang [2 ,3 ]
机构
[1] Hebei Univ, Sch Elect Informat Engn, Baoding 071002, Peoples R China
[2] Hebei Univ, Informat Technol Ctr, Baoding 071002, Peoples R China
[3] Xinjiang Univ Sci & Technol, Network & Expt Management Ctr, Korla 841000, Peoples R China
关键词
Edge computing; Computing offloading; Differential privacy; Whale optimization algorithm;
D O I
10.1007/s11227-022-04756-1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming at the problem of user's task offloading in mobile edge computing and the potential leakage of location privacy during the offloading process, a privacy-preserving computing offloading scheme based on whale optimization algorithm is proposed. Using differential privacy technology to obfuscate the user's location information, the user can make task offloading decisions according to the obfuscated distance. Considering the delay, energy consumption, and their weighted sum, the offloading problem is modeled as a convex optimization problem. Then, the whale optimization algorithm is adopted to solve this optimization problem to achieve a balance between privacy protection and resource consumption. Experiments are conducted to verify the relationship between the degree of privacy leakage, the computation-offloading cost and real distance, privacy-preserving impact factor, the respective weights of time delay and energy consumption The experimental results show that the offloading scheme proposed in this paper has good performance in terms of cost and privacy protection.
引用
收藏
页码:3005 / 3023
页数:19
相关论文
共 28 条
[21]   Joint Offloading and Computing Optimization in Wireless Powered Mobile-Edge Computing Systems [J].
Wang, Feng ;
Xu, Jie ;
Wang, Xin ;
Cui, Shuguang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (03) :1784-1797
[22]  
Wang P., 2022, IEEE T COGN COMMUN, V8, P35077
[23]   Delay-Aware Microservice Coordination in Mobile Edge Computing: A Reinforcement Learning Approach [J].
Wang, Shangguang ;
Guo, Yan ;
Zhang, Ning ;
Yang, Peng ;
Zhou, Ao ;
Shen, Xuemin .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (03) :939-951
[24]   Computation offloading and resource allocation based on distributed deep learning and software defined mobile edge computing [J].
Wang, Zhongyu ;
Lv, Tiejun ;
Chang, Zheng .
COMPUTER NETWORKS, 2022, 205
[25]  
XIE R. C., 2018, J. Commun, V39, P138
[26]  
Zhao P., 2022, IEEE T CLOUD COMPUT, V1, P1
[27]   A Privacy-preserving Computation Offloading Method Based on k-Anonymity [J].
Zhao Xing ;
Peng Jianhua ;
You Wei ;
Chen Lu .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) :892-899
[28]  
Zheng H., 2021, COMPUT SYST APPL, V30, P9