A Privacy-preserving Computation Offloading Method Based on k-Anonymity

被引:4
作者
Zhao Xing [1 ]
Peng Jianhua [1 ]
You Wei [1 ]
Chen Lu [1 ]
机构
[1] Peoples Liberat Army Strateg Support Force Inform, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile Edge Computing(MEC); Computation offloading; Offloading decision; Privacy protection; k-anonymity; SECURITY;
D O I
10.11999/JEIT191046
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Users' offloading tasks and offloading frequencies in Mobile Edge Computing(MEC) may cause users to be locked out. A privacy-preserving computation offloading method based on k-anonymity is proposed in this paper. Firstly, based on the differences between offloading tasks and their frequencies, privacy constraint is proposed to establish a privacy-preserving computation offloading model based on offloading frequency; Then, a Privacy-preserving Computation Offloading algorithm based on Simulated Annealing (PCOSA) is utilized to obtain the optimal k- anonymous groups and the privacy constraint frequency of each task; Finally, the user's original offloading frequencies are changed to meet the privacy constraint while minimizing terminal energy consumption. Simulation results validate that the PCOSA can find out k users with the closest offloading performance to form anonymous sets, which protects effectively the privacy of all users.
引用
收藏
页码:892 / 899
页数:8
相关论文
共 18 条
[1]  
[Anonymous], 2017, J CONTROL SCI ENG
[2]   Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT [J].
He, Xiaofan ;
Jin, Richeng ;
Dai, Huaiyu .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4547-4555
[3]   A Virtual Node Migration Method for Sensing Side-channel Risk [J].
Huang Kaizhi ;
Pan Qirun ;
Yuan Quan ;
You Wei .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (09) :2164-2171
[4]   Concurrent Task Scheduling and Dynamic Voltage and Frequency Scaling in a Real-Time Embedded System With Energy Harvesting [J].
Lin, Xue ;
Wang, Yanzhi ;
Chang, Naehyuck ;
Pedram, Massoud .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (11) :1890-1902
[5]   Mobile Edge Computing: A Survey on Architecture and Computation Offloading [J].
Mach, Pavel ;
Becvar, Zdenek .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (03) :1628-1656
[6]  
Meng X, 2018, 2018 IEEE GLOB COMM, P1, DOI DOI 10.1109/GLOCOM.2018.8647703
[7]   Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting [J].
Min, Minghui ;
Wan, Xiaoyue ;
Xiao, Liang ;
Chen, Ye ;
Xia, Minghua ;
Wu, Di ;
Dai, Huaiyu .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :4307-4316
[8]   Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives [J].
Ni, Jianbing ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE NETWORK, 2019, 33 (02) :50-57
[9]   Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing [J].
Ni, Jianbing ;
Zhang, Aiqing ;
Lin, Xiaodong ;
Shen, Xuemin .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (06) :146-152
[10]   k-anonymity:: A model for protecting privacy [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :557-570