Privacy-Preserving Coded Mobile Edge Computing for Low-Latency Distributed Inference

被引:17
作者
Schlegel, Reent [1 ]
Kumar, Siddhartha [1 ]
Rosnes, Eirik [1 ]
Amat, Alexandre Graell Graell, I [1 ,2 ]
机构
[1] Simula UiB, N-5006 Bergen, Norway
[2] Chalmers Univ Technol, Dept Elect Engn, S-41296 Gothenburg, Sweden
基金
瑞典研究理事会;
关键词
Servers; Codes; Privacy; Data privacy; Cryptography; Computational modeling; Spatial diversity; Coded computing; joint beamforming; mobile edge computing; privacy; spatial diversity; TRANSMISSION; COMPUTATION;
D O I
10.1109/JSAC.2022.3142295
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We consider a mobile edge computing scenario where a number of devices want to perform a linear inference Wx on some local data x given a network-side matrix W. The computation is performed at the network edge over a number of edge servers. We propose a coding scheme that provides information-theoretic privacy against z colluding (honest-but-curious) edge servers, while minimizing the overall latency-comprising upload, computation, download, and decoding latency-in the presence of straggling servers. The proposed scheme exploits Shamir's secret sharing to yield data privacy and straggler mitigation, combined with replication to provide spatial diversity for the download. We also propose two variants of the scheme that further reduce latency. For a considered scenario with 9 edge servers, the proposed scheme reduces the latency by 8% compared to the nonprivate scheme recently introduced by Zhang and Simeone, while providing privacy against an honest-but-curious edge server.
引用
收藏
页码:788 / 799
页数:12
相关论文
共 33 条
[1]   Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes [J].
Bitar, Rawad ;
Parag, Parimal ;
El Rouayheb, Salim .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (08) :4609-4619
[2]   PRAC: Private and Rateless Adaptive Coded Computation at the Edge [J].
Bitar, Rawad ;
Xing, Yuxuan ;
Keshtkarjahromi, Yasaman ;
Dasari, Venkat ;
El Rouayheb, Salim ;
Seferoglu, Hulya .
DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES II, 2019, 11013
[3]   The Tail at Scale [J].
Dean, Jeffrey ;
Barroso, Luiz Andre .
COMMUNICATIONS OF THE ACM, 2013, 56 (02) :74-80
[4]   On the Optimal Recovery Threshold of Coded Matrix Multiplication [J].
Dutta, Sanghamitra ;
Fahim, Mohammad ;
Haddadpour, Farzin ;
Jeong, Haewon ;
Cadambe, Viveck ;
Grover, Pulkit .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (01) :278-301
[5]   "Short-Dot": Computing Large Linear Transforms Distributedly Using Coded Short Dot Products [J].
Dutta, Sanghamitra ;
Cadambe, Viveck ;
Grover, Pulkit .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (10) :6171-6193
[6]  
El Rouayheb S., 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), P1510, DOI 10.1109/ALLERTON.2010.5707092
[7]   An overview of recommender systems in the internet of things [J].
Felfernig, Alexander ;
Polat-Erdeniz, Seda ;
Uran, Christoph ;
Reiterer, Stefan ;
Atas, Muesluem ;
Thi Ngoc Trang Tran ;
Azzoni, Paolo ;
Kiraly, Csaba ;
Dolui, Koustabh .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2019, 52 (02) :285-309
[8]  
Frigard A., 2021, PROC 17 INT S WIRELE, P1
[9]   On Decoding Complexity of Reed-Solomon Codes on the Packet Erasure Channel [J].
Garrammone, Giuliano .
IEEE COMMUNICATIONS LETTERS, 2013, 17 (04) :773-776
[10]  
Hu Y.C., 2015, ETSI WHITE PAPER, V11