A Privacy-preserving Computation Offloading Method Based on k-Anonymity

被引:4
|
作者
Zhao Xing [1 ]
Peng Jianhua [1 ]
You Wei [1 ]
Chen Lu [1 ]
机构
[1] Peoples Liberat Army Strateg Support Force Inform, Zhengzhou 450001, Peoples R China
基金
中国国家自然科学基金;
关键词
Mobile Edge Computing(MEC); Computation offloading; Offloading decision; Privacy protection; k-anonymity; SECURITY;
D O I
10.11999/JEIT191046
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Users' offloading tasks and offloading frequencies in Mobile Edge Computing(MEC) may cause users to be locked out. A privacy-preserving computation offloading method based on k-anonymity is proposed in this paper. Firstly, based on the differences between offloading tasks and their frequencies, privacy constraint is proposed to establish a privacy-preserving computation offloading model based on offloading frequency; Then, a Privacy-preserving Computation Offloading algorithm based on Simulated Annealing (PCOSA) is utilized to obtain the optimal k- anonymous groups and the privacy constraint frequency of each task; Finally, the user's original offloading frequencies are changed to meet the privacy constraint while minimizing terminal energy consumption. Simulation results validate that the PCOSA can find out k users with the closest offloading performance to form anonymous sets, which protects effectively the privacy of all users.
引用
收藏
页码:892 / 899
页数:8
相关论文
共 18 条
  • [1] He Xiao, 2017, J CONTROL SCI ENG, V2017, P1
  • [2] Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT
    He, Xiaofan
    Jin, Richeng
    Dai, Huaiyu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) : 4547 - 4555
  • [3] A Virtual Node Migration Method for Sensing Side-channel Risk
    Huang Kaizhi
    Pan Qirun
    Yuan Quan
    You Wei
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (09) : 2164 - 2171
  • [4] Concurrent Task Scheduling and Dynamic Voltage and Frequency Scaling in a Real-Time Embedded System With Energy Harvesting
    Lin, Xue
    Wang, Yanzhi
    Chang, Naehyuck
    Pedram, Massoud
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (11) : 1890 - 1902
  • [5] Mobile Edge Computing: A Survey on Architecture and Computation Offloading
    Mach, Pavel
    Becvar, Zdenek
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (03): : 1628 - 1656
  • [6] MENG X, 2018, 2018 IEEE GLOB COMM, P1, DOI DOI 10.1109/GLOCOM.2018.8647703
  • [7] Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting
    Min, Minghui
    Wan, Xiaoyue
    Xiao, Liang
    Chen, Ye
    Xia, Minghua
    Wu, Di
    Dai, Huaiyu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 4307 - 4316
  • [8] Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives
    Ni, Jianbing
    Lin, Xiaodong
    Shen, Xuemin
    [J]. IEEE NETWORK, 2019, 33 (02): : 50 - 57
  • [9] Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing
    Ni, Jianbing
    Zhang, Aiqing
    Lin, Xiaodong
    Shen, Xuemin
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (06) : 146 - 152
  • [10] k-anonymity:: A model for protecting privacy
    Sweeney, L
    [J]. INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) : 557 - 570