Skip to main content

Privacy-Aware Task Allocation with Service Differentiation for Mobile Edge Computing: Multi-armed Bandits Approach

  • Conference paper
  • First Online:
Communications and Networking (ChinaCom 2022)

Abstract

With the development of fifth generation (5G) technology, mobile edge computing (MEC) is becoming an essential architecture which is envisioned as a cloud extension version. MEC system can push the resources from cloud side to edge side, aiming to solve many computation intensive problems. The task offloading policy is vital and has an important influence on MEC system. Meanwhile, privacy leakage may occur during the task offloading period which may degrade MEC system performance. The attention on these issues is lack according to existing works. Inspired by this, we present a privacy-preserving aware Multi-Armed Bandits based task allocation algorithm, Privacy Upper Confidence Bound (pUCB), to find a balance between the privacy preserving and the efficiency of task processing. In addition, we take regret analysis of the proposed algorithm. The extensive simulation results show that pUCB scheme can achieve a higher optimal rate, a lower lock rate and less total time cost comparing with traditional Multi-arm bandits (MAB) based algorithm.

H. Li and L. Shi—Co-first authors. This work was supported by The Major Key Project of PCL (Grant No. PCL2021A02), National Natural Science Foundation of China (Grant Nos. 61802221) and the Guangdong Talent Project 2021TQ06X117.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhone, X., Wang, X., Yang, T., et al.: POTAM: a parallel optimal task allocation mechanism for large-scale delay sensitive mobile edge computing. IEEE Trans. Commun. 70(4), 2499–2517 (2022)

    Article  Google Scholar 

  2. Wang, X., Ye, J., John, C.S.: Decentralized task offloading in edge computing: A multi-user multi-armed bandit approach. In: Proceedings of the IEEE Conference on Computer Communications, pp. 1199–1208. IEEE (2022)

    Google Scholar 

  3. Hua, C., Wang, L., Gu, P.: Online offloading in dense wireless networks: an adversary multi-armed bandit approach. In: Proceedings of 10th International Conference on Wireless Communications and Signal Processing, pp. 1–6. IEEE (2018)

    Google Scholar 

  4. Gao, S., Yang, T., Ni, H., Zhang, G.: Multi-armed bandits scheme for tasks offloading in MEC-enabled maritime communication networks. In: Proceedings of 9th IEEE/CIC International Conference on Communications, pp. 232–237. IEEE (2020)

    Google Scholar 

  5. Wu, B., Chen, T., Ni, W., Wang, X.: Multi-agent multi-armed bandit learning for online management of edge-assisted computing 69(12), 8188–8199 (2021)

    Google Scholar 

  6. Ghoorchian, S., Maghsudi, S.: Multi-armed bandit for energy-efficient and delay-sensitive edge computing in dynamic networks with uncertainty 7(1), 279–293 (2021)

    Google Scholar 

  7. Wang, W., Ge, S., Zhou, X.: Location-privacy-aware service migration in mobile edge computing. In: Proceedings of 2020 IEEE Wireless Communications and Networking Conference, pp. 1–6. IEEE (2020)

    Google Scholar 

  8. Gone, W., Zhang, B., Li, C.: Privacy-aware online task assignment framework for mobile crowdsensing. In: Proceedings of 2019 IEEE International Conference on Communications, pp. 1–6. IEEE (2019)

    Google Scholar 

  9. Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 47(2), 235–256 (2002)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoxiong Zhong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, H., Shi, L., Zhong, X., Ji, Y., Zhang, S. (2023). Privacy-Aware Task Allocation with Service Differentiation for Mobile Edge Computing: Multi-armed Bandits Approach. In: Gao, F., Wu, J., Li, Y., Gao, H. (eds) Communications and Networking. ChinaCom 2022. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 500. Springer, Cham. https://doi.org/10.1007/978-3-031-34790-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34790-0_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34789-4

  • Online ISBN: 978-3-031-34790-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics