Edge-Enabled Distributed Deep Learning for 5G Privacy Protection

被引:4
作者
Sun, Qibo [1 ]
Xu, Jinliang [1 ]
Ma, Xiao [1 ]
Zhou, Ao [1 ]
Hsu, Ching-Hsien [2 ,3 ,4 ]
Wang, Shangguang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
[2] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[3] Foshan Univ, Sch Math & Big Data, Guangdong Hong Kong Macao Joint Lab Intelligent M, Foshan 528000, Peoples R China
[4] China Med Univ, China Med Univ Hosp, Dept Med Res, Taichung, Taiwan
来源
IEEE NETWORK | 2021年 / 35卷 / 04期
关键词
Servers; Deep learning; Training; Cloud computing; 5G mobile communication; Mobile handsets; Data models; SERVICE MIGRATION;
D O I
10.1109/MNET.021.2000292
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the limited storage and computing power, edge devices at the network edge cannot train deep learning models locally. Traditional deep learning training requires users to upload a local dataset to a cloud center, and trains the data using massive computation resources of the cloud center. However, it results in two bad effects: uploading a local dataset to a centralized cloud center controlled by a third party leaves user data privacy at risk; and uploading multimedia data will consume huge bandwidth resources of mobile users and storage resources of the cloud center, resulting in low scalability in term of the number of edge devices. To deal with these two problems, we propose an edge-enabled distributed deep learning platform by dividing a general deep learning training network into a front and back subnetwork. Specifically, the front subnetwork consisting of several layers is deployed close to input data and is trained separately at each edge device using the local dataset, and the outputs of all front subnetworks are sent to the back subnetwork for later training at a cloud center; while the back subnetwork is deployed at the cloud center, and its output is sent to each front subnetwork. As no original dataset is transferred from edge devices to the cloud center, the platform can protect data privacy and has high scalability. Above that, another two measures are taken to ensure data privacy: asymmetric encryption technology is adopted to guarantee the safety and integrality of the transferred parameters between edge servers and the cloud center; and blockchain technology is used to monitor the actions of the stakeholders in this platform and thereby ensure trust among the stakeholders. Experimental results show the validation of the proposed method.
引用
收藏
页码:213 / 219
页数:7
相关论文
共 19 条
[1]   Emerging Edge Computing Technologies for Distributed IoT Systems [J].
Alnoman, Ali ;
Sharma, Shree Krishna ;
Ejaz, Waleed ;
Anpalagan, Alagan .
IEEE NETWORK, 2019, 33 (06) :140-147
[2]   A self-protecting agents based model for high-performance mobile-cloud computing [J].
Angin, Pelin ;
Bhargava, Bharat ;
Ranchal, Rohit .
COMPUTERS & SECURITY, 2018, 77 :380-396
[3]  
[Anonymous], 2014, NIPS WORKSH DISTR MA
[4]  
[Anonymous], 2012, PROC 26 INT C NEURAL
[5]   When Internet of Things Meets Blockchain: Challenges in Distributed Consensus [J].
Cao, Bin ;
Li, Yixin ;
Zhang, Lei ;
Zhang, Long ;
Mumtaz, Shahid ;
Zhou, Zhenyu ;
Peng, Mugen .
IEEE NETWORK, 2019, 33 (06) :133-139
[6]   Privacy in Neural Network Learning: Threats and Countermeasures [J].
Chang, Shan ;
Li, Chao .
IEEE NETWORK, 2018, 32 (04) :61-67
[7]   Fog Computing Based Face Identification and Resolution Scheme in Internet of Things [J].
Hu, Pengfei ;
Ning, Huansheng ;
Qiu, Tie ;
Zhang, Yanfei ;
Luo, Xiong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (04) :1910-1920
[8]   SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems [J].
Jindal, Anish ;
Aujla, Gagangeet Singh ;
Kumar, Neeraj ;
Chaudhary, Rajat ;
Obaidat, Mohammad S. ;
You, Ilsun .
IEEE NETWORK, 2018, 32 (06) :66-73
[9]   Gradient-based learning applied to document recognition [J].
Lecun, Y ;
Bottou, L ;
Bengio, Y ;
Haffner, P .
PROCEEDINGS OF THE IEEE, 1998, 86 (11) :2278-2324
[10]   Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT [J].
Liu, Tianen ;
Wang, Yingjie ;
Li, Yingshu ;
Tong, Xiangrong ;
Qi, Lianyong ;
Jiang, Nan .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :7928-7940