{"title":"A Novel Privacy-Preserving Incentive Mechanism for Multi-Access Edge Computing","authors":"Feiran You;Xin Yuan;Wei Ni;Abbas Jamalipour","doi":"10.1109/TCCN.2024.3391303","DOIUrl":null,"url":null,"abstract":"Multi-access Edge Computing (MEC) has emerged as a promising solution for computation-intensive and latency-sensitive applications. Existing studies have often overlooked the critical aspect of users’ privacy, hindering users from offloading their computation. This paper proposes a novel privacy-preserving mechanism for a two-level auction game aimed at incentivizing cloudlets and users to engage in computation offloading while safeguarding users’ privacy. A many-to-many auction is designed between Data Center Operators (DCOs) and cloudlets to associate the cloudlets with the DCOs, where the perceivable privacy levels of users are parameterized as part of a DCO’s utility. A many-to-one user-DCO auction is also designed, leveraging differential privacy (DP) to protect the users’ private bid information. An exponential mechanism is developed, obfuscating intermediate reference prices disclosed during auctions by the DCOs, thereby safeguarding users’ valuations, bid prices, and bidding behaviors. We prove that the proposed approach can guarantee DP, truthfulness, and equilibriums. Simulations demonstrate the superiority of the privacy-preserving two-layer auction game in reducing time delay and energy consumption while protecting the privacy of the users, surpassing the benchmark. The proposed mechanism effectively incentivizes computation offloading, making it a compelling choice for facilitating computation-intensive tasks.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"10 5","pages":"1928-1943"},"PeriodicalIF":7.4000,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cognitive Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10505934/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
Multi-access Edge Computing (MEC) has emerged as a promising solution for computation-intensive and latency-sensitive applications. Existing studies have often overlooked the critical aspect of users’ privacy, hindering users from offloading their computation. This paper proposes a novel privacy-preserving mechanism for a two-level auction game aimed at incentivizing cloudlets and users to engage in computation offloading while safeguarding users’ privacy. A many-to-many auction is designed between Data Center Operators (DCOs) and cloudlets to associate the cloudlets with the DCOs, where the perceivable privacy levels of users are parameterized as part of a DCO’s utility. A many-to-one user-DCO auction is also designed, leveraging differential privacy (DP) to protect the users’ private bid information. An exponential mechanism is developed, obfuscating intermediate reference prices disclosed during auctions by the DCOs, thereby safeguarding users’ valuations, bid prices, and bidding behaviors. We prove that the proposed approach can guarantee DP, truthfulness, and equilibriums. Simulations demonstrate the superiority of the privacy-preserving two-layer auction game in reducing time delay and energy consumption while protecting the privacy of the users, surpassing the benchmark. The proposed mechanism effectively incentivizes computation offloading, making it a compelling choice for facilitating computation-intensive tasks.
期刊介绍:
The IEEE Transactions on Cognitive Communications and Networking (TCCN) aims to publish high-quality manuscripts that push the boundaries of cognitive communications and networking research. Cognitive, in this context, refers to the application of perception, learning, reasoning, memory, and adaptive approaches in communication system design. The transactions welcome submissions that explore various aspects of cognitive communications and networks, focusing on innovative and holistic approaches to complex system design. Key topics covered include architecture, protocols, cross-layer design, and cognition cycle design for cognitive networks. Additionally, research on machine learning, artificial intelligence, end-to-end and distributed intelligence, software-defined networking, cognitive radios, spectrum sharing, and security and privacy issues in cognitive networks are of interest. The publication also encourages papers addressing novel services and applications enabled by these cognitive concepts.