首页 | 本学科首页   官方微博 | 高级检索  
     

边缘计算场景中基于虚拟映射的隐私保护卸载算法
引用本文:余雪勇,陈涛. 边缘计算场景中基于虚拟映射的隐私保护卸载算法[J]. 计算机科学, 2021, 48(1): 65-71. DOI: 10.11896/jsjkx.200500098
作者姓名:余雪勇  陈涛
作者单位:江苏省无线通信重点实验室 南京 210003;江苏省无线通信重点实验室 南京 210003
基金项目:南京邮电大学自然科学基金项目;国家自然科学基金资助项目
摘    要:随着移动边缘计算(Mobile Edge Computing,MEC)和无线充电技术(Wireless Power Transmission,WPT)的诞生和发展,越来越多的计算任务被卸载至MEC服务器以进行处理,并借助WPT技术为终端设备供电,以缓解终端设备计算能力受限和设备能耗过高的问题.由于卸载的任务和数据往往携...

关 键 词:边缘计算  计算卸载  隐私保护  虚拟映射  神经网络

Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene
YU Xue-yong,CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene[J]. Computer Science, 2021, 48(1): 65-71. DOI: 10.11896/jsjkx.200500098
Authors:YU Xue-yong  CHEN Tao
Affiliation:(Wireless Communication Key Lab of Jiangsu Province,Nanjing 210003,China)
Abstract:With the development of mobile edge computing(MEC)and wireless power transfer(WPT),more and more computing tasks are offloaded to the MEC server for processing.The terminal equipment is powered by WPT technology to alleviate the limited computing power of the terminal equipment and high energy consumption of the terminal equipment.However,since the offloaded tasks and data often carry information such as users’personal usage habits,tasks are offloaded to the MEC server for processing results in new privacy leakage issues.A privacy-aware computation offloading method based on virtual mapping is proposed in this paper.Firstly,the privacy of the computing task is defined,and then a virtual task mapping mechanism that can reduce the amount of privacy accumulated by users on the MEC server is designed.Secondly,the online privacy-aware computing offloading algorithm is proposed by considering the optimization of the mapping mechanism and privacy constraints jointly.Finally,simulation results validate that the proposed offloading method can keep the cumulative privacy of users below the threshold,increase the system calculation rate and reduce users’calculation delay at the same time.
Keywords:Edge computing  Computation offloading  Privacy protection  Virtual mapping  Neural network
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号