首页 | 官方网站   微博 | 高级检索  
     

边缘计算场景中基于虚拟映射的隐私保护卸载算法
引用本文:余雪勇,陈涛.边缘计算场景中基于虚拟映射的隐私保护卸载算法[J].计算机科学,2021,48(1):65-71.
作者姓名:余雪勇  陈涛
作者单位:江苏省无线通信重点实验室 南京 210003;江苏省无线通信重点实验室 南京 210003
基金项目:南京邮电大学自然科学基金项目;国家自然科学基金资助项目
摘    要:随着移动边缘计算(Mobile Edge Computing,MEC)和无线充电技术(Wireless Power Transmission,WPT)的诞生和发展,越来越多的计算任务被卸载至MEC服务器以进行处理,并借助WPT技术为终端设备供电,以缓解终端设备计算能力受限和设备能耗过高的问题。由于卸载的任务和数据往往携带用户个人使用习惯等信息,因此将任务卸载到MEC服务器进行处理会导致新的隐私泄露问题。针对上述问题,文中首先对计算任务的隐私量进行定义,并设计了能够降低用户在MEC服务器累积隐私量的虚拟任务映射机制;然后,综合考虑映射机制与隐私约束的优化,提出了一种具有隐私保护效果的在线隐私感知计算卸载算法;最后,对仿真结果进行分析发现,所提卸载方法能够使用户累积隐私量保持在隐私阈值内,达到了隐私保护的效果,同时提高了系统计算速率,降低了用户计算时延。

关 键 词:边缘计算  计算卸载  隐私保护  虚拟映射  神经网络

Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene
YU Xue-yong,CHEN Tao.Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene[J].Computer Science,2021,48(1):65-71.
Authors:YU Xue-yong  CHEN Tao
Affiliation:(Wireless Communication Key Lab of Jiangsu Province,Nanjing 210003,China)
Abstract:With the development of mobile edge computing(MEC)and wireless power transfer(WPT),more and more computing tasks are offloaded to the MEC server for processing.The terminal equipment is powered by WPT technology to alleviate the limited computing power of the terminal equipment and high energy consumption of the terminal equipment.However,since the offloaded tasks and data often carry information such as users’personal usage habits,tasks are offloaded to the MEC server for processing results in new privacy leakage issues.A privacy-aware computation offloading method based on virtual mapping is proposed in this paper.Firstly,the privacy of the computing task is defined,and then a virtual task mapping mechanism that can reduce the amount of privacy accumulated by users on the MEC server is designed.Secondly,the online privacy-aware computing offloading algorithm is proposed by considering the optimization of the mapping mechanism and privacy constraints jointly.Finally,simulation results validate that the proposed offloading method can keep the cumulative privacy of users below the threshold,increase the system calculation rate and reduce users’calculation delay at the same time.
Keywords:Edge computing  Computation offloading  Privacy protection  Virtual mapping  Neural network
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号