Physical-Layer Assisted Privacy-Preserving Offloading in Mobile-Edge Computing

As compared to the conventional cloud computing, the wireless offloading feature of the recently advocated mobile-edge computing (MEC) imposes a new risk of disclosing possibly private and sensitive user data to eavesdroppers. Physical-layer security approaches built on information theoretic methods are believed to provide a stronger notion of privacy than cryptography, and therefore, may be more suitable for defending eavesdropping in MEC. Nonetheless, incorporating a physical-layer security technique may fundamentally change the mobile users' offloading decisions. This suggests a compelling need for new judiciously designed offloading schemes that can jointly reap the benefits of both physical-layer security and MEC. With this consideration, a novel physical-layer assisted privacy-preserving offloading scheme is proposed in this work, in which the edge server proactively broadcasts jamming signals to impede eavesdropping and leverages full-duplex communication technique to effectively suppress the self-interference. Finding the optimal jamming power of the edge server and the corresponding optimal offloading ratio of the mobile user turns out to be a challenging bilevel optimization problem. By exploiting the structure of the considered problem, two efficient algorithms are developed for delay optimal and energy optimal privacy-preserving offloading, respectively. Numerical results are presented to validate the effectiveness of the proposed schemes.

[1]  Richeng Jin,et al.  Privacy-Aware Offloading in Mobile-Edge Computing , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[2]  Wei Yu,et al.  Fractional Programming for Communication Systems—Part I: Power Control and Beamforming , 2018, IEEE Transactions on Signal Processing.

[3]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[4]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[5]  Taneli Riihonen,et al.  Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.

[6]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[7]  Le Thi Hoai An,et al.  The DC (Difference of Convex Functions) Programming and DCA Revisited with DC Models of Real World Nonconvex Optimization Problems , 2005, Ann. Oper. Res..

[8]  Stephen P. Boyd,et al.  Variations and extension of the convex–concave procedure , 2016 .

[9]  Ting He,et al.  Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach , 2017, IEEE Journal on Selected Areas in Communications.

[10]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[11]  Jie Xu,et al.  Exploiting Physical-Layer Security for Multiuser Multicarrier Computation Offloading , 2018, IEEE Wireless Communications Letters.

[12]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[13]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.

[14]  Khaled Ben Letaief,et al.  Delay-optimal computation task scheduling for mobile-edge computing systems , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[15]  Kaibin Huang,et al.  Energy-Efficient Resource Allocation for Mobile-Edge Computation Offloading , 2016, IEEE Transactions on Wireless Communications.

[16]  Bing Chen,et al.  Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.

[17]  Richeng Jin,et al.  Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT , 2019, IEEE Internet of Things Journal.

[18]  Ruoheng Liu,et al.  Securing Wireless Communications at the Physical Layer , 2014 .

[19]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[20]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[21]  Qun Li,et al.  Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.

[22]  Kalyanmoy Deb,et al.  A Review on Bilevel Optimization: From Classical to Evolutionary Approaches and Applications , 2017, IEEE Transactions on Evolutionary Computation.

[23]  Zhiguo Ding,et al.  Secrecy Performance of Untrusted Relay Systems With a Full-Duplex Jamming Destination , 2018, IEEE Transactions on Vehicular Technology.

[24]  Björn E. Ottersten,et al.  Robust Cognitive Beamforming With Bounded Channel Uncertainties , 2009, IEEE Transactions on Signal Processing.

[25]  Kai-Kit Wong,et al.  Robust Masked Beamforming for MISO Cognitive Radio Networks With Unknown Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.