Privacy-Preserving Coded Mobile Edge Computing for Low-Latency Distributed Inference

نویسندگان

چکیده

We consider a mobile edge computing scenario where number of devices want to perform linear inference ${W}{x} $ on some local data notation="LaTeX">$ {x}$ given network-side matrix {W}$ . The computation is performed at the network over servers. propose coding scheme that provides information-theoretic privacy against notation="LaTeX">$z$ colluding (honest-but-curious) servers, while minimizing overall latency—comprising upload, computation, download, and decoding latency—in presence straggling proposed exploits Shamir’s secret sharing yield straggler mitigation, combined with replication provide spatial diversity for download. also two variants further reduce latency. For considered 9 reduces latency by 8% compared nonprivate recently introduced Zhang Simeone, providing an honest-but-curious server.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preserving Location Privacy in Mobile Edge Computing

The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...

متن کامل

Distributed Low-Latency Rendering for Mobile AR

Wearable augmented reality (AR) can help the task of a user by adding virtual objects to his view on the real world. To save power in the mobile unit, rendering can be offloaded to the backbone as much as possible. However, because of low latency requirements, images for mobile AR can not be rendered completely in the backbone. We developed a system capable of end-to-end latencies of 10ms, with...

متن کامل

Privacy Preserving Distributed Data Mining with Evolutionary Computing

Data mining is really a procedure for nontrivial extraction of implicit, formerly unknown, and potentially helpful information from data in databases. Actually, the word “knowledge discovery” is much more general compared to term “data mining.” Data mining is generally seen like a step towards the entire process of understanding discovery, although both of these terms are thought as synonyms wi...

متن کامل

Privacy Aware Authentication Scheme for Distributed Mobile Cloud Computing

As mobile users generally access different types of mobile cloud computing services from a variety of service providers, it is extremely tedious for users to register different user accounts on each service provider and maintain corresponding private keys or passwords for authentication usage. In this paper, I propose a encryption method call Attribute encryption method. Cloud computing is a re...

متن کامل

Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing

Attaining extremely low latency service in 5G cellular networks is an important challenge in the communication research field. A higher QoS in the next-generation network could enable several unprecedented services, such as Tactile Internet, Augmented Reality, and Virtual Reality. However, these services will all need support from powerful computational resources provided through cloud computin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Journal on Selected Areas in Communications

سال: 2022

ISSN: ['0733-8716', '1558-0008']

DOI: https://doi.org/10.1109/jsac.2022.3142295