Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing

被引:1
作者
Zheng, Xiao [1 ]
Li, Mingchu [1 ,2 ]
Shah, Syed Bilal Hussain [1 ,3 ]
Dinh-Thuan Do [4 ]
Chen, Yuanfang [5 ]
Mavromoustakis, Constandinos X. [6 ,7 ]
Mastorakis, George [8 ]
Pallis, Evangelos [9 ]
机构
[1] Shandong Univ Technol, Sch Comp Sci & Technol, 266 Xincun West Rd, Zibo, Peoples R China
[2] Dalian Univ Technol, Sch Software, Tuqiang St, Dalian 116620, Kaifaqu, Peoples R China
[3] Manchester Metropolitan Univ, Sch Comp & Math, Manchester, Lancs, England
[4] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[5] Zhejiang Univ, Hangzhou, Zhejiang, Peoples R China
[6] Univ Nicosia, Mobile Syst Lab MoSys Lab, Dept Comp Sci, 46 Makedonitissas Ave, Nicosia, Cyprus
[7] Univ Nicosia, Res Fdn, 46 Makedonitissas Ave, Nicosia, Cyprus
[8] Hellen Mediterranean Univ, Dept Management Sci & Technol, Agios Nikolaos 72100, Crete, Greece
[9] Hellen Mediterranean Univ, Dept Elect & Comp Engn, 1 Thorvald Circle, Iraklion, Greece
关键词
Mobile edge computing; synthetic theories; mobile device; suboptimal; security strategies; quality of service; deep learning; WIRELESS; ALGORITHM;
D O I
10.1145/3458931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of a variety of complex and energy-intensive mobile applications by resource-limited mobile devices (MDs) is a huge challenge. Fortunately, mobile edge computing (MEC) as a new computing paragon can offer rich resources to perform all or part of the MD's task, which greatly reduces the energy consumption of the MD and improves the quality of service (QoS) for applications. However, offloading tasks to the edge server is vulnerable to attacks such as tampering and snooping, resulting in a deep learning (DL) security feature developed by major cloud service providers. An effective security strategy method to minimize ongoing attacks in the MEC setting is proposed. The algorithm is based on the synthetic principle of a special set of strategies, and it can quickly construct suboptimal solutions even if the number of targets achieves hundreds of millions. In addition, for a given structure and a given number of patrollers, the upper bound of the protection level can be obtained, and the lower bound required for a given protection level can also be inferred. These bounds apply to universal strategies. By comparing with the previous three basic experiments, it can be proved that our algorithm is better than the previous ones in terms of security and running time.
引用
收藏
页数:15
相关论文
共 38 条
  • [1] Basilico N., 2009, 8 INT C AUTONOMOUS A, P57
  • [2] A Security Game Model for Remote Software Protection
    Basilico, Nicola
    Lanzi, Andrea
    Monga, Mattia
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 437 - 443
  • [3] Basilico N, 2010, AAAI CONF ARTIF INTE, P1224
  • [4] Patrolling security games: Definition and algorithms for solving large instances with single patroller and single intruder
    Basilico, Nicola
    Gatti, Nicola
    Amigoni, Francesco
    [J]. ARTIFICIAL INTELLIGENCE, 2012, 184 : 78 - 123
  • [5] Basilico N, 2009, 2009 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 2, P557
  • [6] Bhattacharyya S, 2020, DE GR FRONT COMPU IN, V5, P1, DOI 10.1515/9783110610987-003
  • [7] Bosansky Branislav, 2011, 10 INT C AUTONOMOUS, V3, P989
  • [8] CodeBender: Remote Software Protection Using Orthogonal Replacement
    Ceccato, Mariano
    Tonella, Paolo
    [J]. IEEE SOFTWARE, 2011, 28 (02) : 28 - 34
  • [9] Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems
    Chen, Yuanfang
    Zhang, Yan
    Maharjan, Sabita
    Alam, Muhammad
    Wu, Ting
    [J]. IEEE NETWORK, 2019, 33 (04): : 36 - 41
  • [10] When Traffic Flow Prediction and Wireless Big Data Analytics Meet
    Chen, Yuanfang
    Guizani, Mohsen
    Zhang, Yan
    Wang, Lei
    Crespi, Noel
    Lee, Gyu Myoung
    Wu, Ting
    [J]. IEEE NETWORK, 2019, 33 (03): : 161 - 167