Abstract
With the development of fifth generation (5G) technology, mobile edge computing (MEC) is becoming an essential architecture which is envisioned as a cloud extension version. MEC system can push the resources from cloud side to edge side, aiming to solve many computation intensive problems. The task offloading policy is vital and has an important influence on MEC system. Meanwhile, privacy leakage may occur during the task offloading period which may degrade MEC system performance. The attention on these issues is lack according to existing works. Inspired by this, we present a privacy-preserving aware Multi-Armed Bandits based task allocation algorithm, Privacy Upper Confidence Bound (pUCB), to find a balance between the privacy preserving and the efficiency of task processing. In addition, we take regret analysis of the proposed algorithm. The extensive simulation results show that pUCB scheme can achieve a higher optimal rate, a lower lock rate and less total time cost comparing with traditional Multi-arm bandits (MAB) based algorithm.
H. Li and L. Shi—Co-first authors. This work was supported by The Major Key Project of PCL (Grant No. PCL2021A02), National Natural Science Foundation of China (Grant Nos. 61802221) and the Guangdong Talent Project 2021TQ06X117.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhone, X., Wang, X., Yang, T., et al.: POTAM: a parallel optimal task allocation mechanism for large-scale delay sensitive mobile edge computing. IEEE Trans. Commun. 70(4), 2499–2517 (2022)
Wang, X., Ye, J., John, C.S.: Decentralized task offloading in edge computing: A multi-user multi-armed bandit approach. In: Proceedings of the IEEE Conference on Computer Communications, pp. 1199–1208. IEEE (2022)
Hua, C., Wang, L., Gu, P.: Online offloading in dense wireless networks: an adversary multi-armed bandit approach. In: Proceedings of 10th International Conference on Wireless Communications and Signal Processing, pp. 1–6. IEEE (2018)
Gao, S., Yang, T., Ni, H., Zhang, G.: Multi-armed bandits scheme for tasks offloading in MEC-enabled maritime communication networks. In: Proceedings of 9th IEEE/CIC International Conference on Communications, pp. 232–237. IEEE (2020)
Wu, B., Chen, T., Ni, W., Wang, X.: Multi-agent multi-armed bandit learning for online management of edge-assisted computing 69(12), 8188–8199 (2021)
Ghoorchian, S., Maghsudi, S.: Multi-armed bandit for energy-efficient and delay-sensitive edge computing in dynamic networks with uncertainty 7(1), 279–293 (2021)
Wang, W., Ge, S., Zhou, X.: Location-privacy-aware service migration in mobile edge computing. In: Proceedings of 2020 IEEE Wireless Communications and Networking Conference, pp. 1–6. IEEE (2020)
Gone, W., Zhang, B., Li, C.: Privacy-aware online task assignment framework for mobile crowdsensing. In: Proceedings of 2019 IEEE International Conference on Communications, pp. 1–6. IEEE (2019)
Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2), 235–256 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Li, H., Shi, L., Zhong, X., Ji, Y., Zhang, S. (2023). Privacy-Aware Task Allocation with Service Differentiation for Mobile Edge Computing: Multi-armed Bandits Approach. In: Gao, F., Wu, J., Li, Y., Gao, H. (eds) Communications and Networking. ChinaCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 500. Springer, Cham. https://doi.org/10.1007/978-3-031-34790-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-34790-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34789-4
Online ISBN: 978-3-031-34790-0
eBook Packages: Computer ScienceComputer Science (R0)