{"title":"Revisiting Location Privacy in MEC-Enabled Computation Offloading","authors":"Jingyi Li;Wenzhong Ou;Bei Ouyang;Shengyuan Ye;Liekang Zeng;Lin Chen;Xu Chen","doi":"10.1109/TIFS.2025.3558593","DOIUrl":null,"url":null,"abstract":"Mobile Edge Computing (MEC) revolutionizes real-time applications by extending cloud capabilities to network edges, enabling efficient computation offloading from mobile devices. In recent years, the location privacy concern within MEC offloading has been recognized, prompting the proposal of various methodologies to mitigate this concern. However, this paper demonstrates that the prevailing privacy protection methods exhibit vulnerabilities. First, we analyze the shortcomings of current methodologies through both system modeling and evaluation metrics. Then, we introduce a Learning-based Trajectory Reconstruction Attack (LTRA) to expose the weaknesses, achieving up to 91.2% reconstruction accuracy against the state-of-the-art protection method. Further, based on <italic>w</i>-event differential privacy, we propose an <inline-formula> <tex-math>$\\ell $ </tex-math></inline-formula>-trajectory differentially private mechanism, i.e., OffloadingBD. Compared to the existing works, OffloadingBD provides more flexible and enhanced protection with sound privacy theoretical guarantee. Lastly, we conduct extensive experiments to evaluate LTRA and OffloadingBD. The experiment results show that LTRA has good generalization ability and OffloadingBD showcases a superior balance between privacy and utility compared with baselines.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"4396-4407"},"PeriodicalIF":6.3000,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10962268/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
Mobile Edge Computing (MEC) revolutionizes real-time applications by extending cloud capabilities to network edges, enabling efficient computation offloading from mobile devices. In recent years, the location privacy concern within MEC offloading has been recognized, prompting the proposal of various methodologies to mitigate this concern. However, this paper demonstrates that the prevailing privacy protection methods exhibit vulnerabilities. First, we analyze the shortcomings of current methodologies through both system modeling and evaluation metrics. Then, we introduce a Learning-based Trajectory Reconstruction Attack (LTRA) to expose the weaknesses, achieving up to 91.2% reconstruction accuracy against the state-of-the-art protection method. Further, based on w-event differential privacy, we propose an $\ell $ -trajectory differentially private mechanism, i.e., OffloadingBD. Compared to the existing works, OffloadingBD provides more flexible and enhanced protection with sound privacy theoretical guarantee. Lastly, we conduct extensive experiments to evaluate LTRA and OffloadingBD. The experiment results show that LTRA has good generalization ability and OffloadingBD showcases a superior balance between privacy and utility compared with baselines.
移动边缘计算(MEC)通过将云功能扩展到网络边缘,实现从移动设备高效卸载计算,从而彻底改变了实时应用程序。近年来,MEC卸载中的位置隐私问题已经得到了认识,促使提出了各种方法来缓解这一问题。然而,本文表明,目前流行的隐私保护方法存在漏洞。首先,我们通过系统建模和评估指标分析了当前方法的缺点。然后,我们引入了一种基于学习的轨迹重建攻击(LTRA)来暴露弱点,在最先进的保护方法下实现了高达91.2%的重建精度。进一步,在w事件差分隐私的基础上,我们提出了一种$\ well $轨迹差分隐私机制,即OffloadingBD。与现有作品相比,OffloadingBD提供了更加灵活和增强的保护,并提供了良好的隐私理论保障。最后,我们进行了大量的实验来评估LTRA和OffloadingBD。实验结果表明,与基线相比,LTRA具有良好的泛化能力,OffloadingBD在隐私和实用之间表现出更好的平衡。
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features