A Novel Privacy-Preserving Incentive Mechanism for Multi-Access Edge Computing

被引:0
|
作者
You, Feiran [1 ,2 ]
Yuan, Xin [2 ]
Ni, Wei [2 ,3 ,4 ,5 ]
Jamalipour, Abbas [1 ]
机构
[1] Univ Sydney, Sch Elect & Comp Engn, Sydney, NSW 2006, Australia
[2] CSIRO, Data61, Sydney, NSW 2122, Australia
[3] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia
[4] Univ Technol Sydney, Sch Elect & Data Engn, Ultimo, NSW 2007, Australia
[5] Macquarie Univ, Sch Comp, Macquarie Pk, NSW 2109, Australia
关键词
Privacy; Task analysis; Games; Costs; Resource management; Computational modeling; Protection; Differential privacy (DP); user privacy; computation offloading; auction game; multi-access edge computing (MEC); ALLOCATION; NETWORKS;
D O I
10.1109/TCCN.2024.3391303
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Multi-access Edge Computing (MEC) has emerged as a promising solution for computation-intensive and latency-sensitive applications. Existing studies have often overlooked the critical aspect of users' privacy, hindering users from offloading their computation. This paper proposes a novel privacy-preserving mechanism for a two-level auction game aimed at incentivizing cloudlets and users to engage in computation offloading while safeguarding users' privacy. A many-to-many auction is designed between Data Center Operators (DCOs) and cloudlets to associate the cloudlets with the DCOs, where the perceivable privacy levels of users are parameterized as part of a DCO's utility. A many-to-one user-DCO auction is also designed, leveraging differential privacy (DP) to protect the users' private bid information. An exponential mechanism is developed, obfuscating intermediate reference prices disclosed during auctions by the DCOs, thereby safeguarding users' valuations, bid prices, and bidding behaviors. We prove that the proposed approach can guarantee DP, truthfulness, and equilibriums. Simulations demonstrate the superiority of the privacy-preserving two-layer auction game in reducing time delay and energy consumption while protecting the privacy of the users, surpassing the benchmark. The proposed mechanism effectively incentivizes computation offloading, making it a compelling choice for facilitating computation-intensive tasks.
引用
收藏
页码:1928 / 1943
页数:16
相关论文
共 50 条
  • [21] Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing
    Wan, Tao
    Yue, Shixin
    Liao, Weichuan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [22] Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility
    Akman, Gizem
    Ginzboorg, Philip
    Damir, Mohamed Taoufiq
    Niemi, Valtteri
    COMPUTERS, 2023, 12 (01)
  • [23] Privacy-Preserving Incentive Mechanism Design for Federated Cloud-Edge Learning
    Liu, Tianyu
    Di, Boya
    An, Peng
    Song, Lingyang
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2588 - 2600
  • [24] Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
    Ali, Belal
    Gregory, Mark A.
    Li, Shuo
    IEEE ACCESS, 2021, 9 (09): : 18706 - 18721
  • [25] Internet network location privacy protection with multi-access edge computing
    Zhang, Ping
    Durresi, Mimoza
    Durresi, Arjan
    COMPUTING, 2021, 103 (03) : 473 - 490
  • [26] Privacy-Preserving Asynchronous Federated Learning Mechanism for Edge Network Computing
    Lu, Xiaofeng
    Liao, Yuying
    Lio, Pietro
    Hui, Pan
    IEEE ACCESS, 2020, 8 : 48970 - 48981
  • [27] Privacy-Preserving Multi-Source Image Retrieval in Edge Computing
    Yan, Yuejing
    Xu, Yanyan
    Wang, Zhiheng
    Ouyang, Xue
    Zhang, Bo
    Rao, Zheheng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2892 - 2907
  • [28] Cerberus: Privacy-Preserving Computation in Edge Computing
    Zhang, Dilu
    Fan, Lei
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 43 - 49
  • [29] Multi-access Edge Computing as a Service
    Escaleira, Pedro
    Mota, Miguel
    Gomes, Diogo
    Barraca, Joao P.
    Aguiar, Rui L.
    2022 18TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM 2022): INTELLIGENT MANAGEMENT OF DISRUPTIVE NETWORK TECHNOLOGIES AND SERVICES, 2022, : 177 - 183
  • [30] Multi-Access Edge Computing: A Survey
    Filali, Abderrahime
    Abouaomar, Amine
    Cherkaoui, Soumaya
    Kobbane, Abdellatif
    Guizani, Mohsen
    IEEE ACCESS, 2020, 8 : 197017 - 197046