TY - JOUR
T1 - Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing
AU - Zheng, Xiao
AU - Li, Mingchu
AU - Shah, Syed Bilal Hussain
AU - Do, Dinh Thuan
AU - Chen, Yuanfang
AU - Mavromoustakis, Constandinos X.
AU - Mastorakis, George
AU - Pallis, Evangelos
N1 - Funding Information:
Xiao Zheng, Mingchu Li, and Syed Bilal Hussain Shah contributed equally to this research. The article is supported by the National Nature Science Foundation of China under grant Nos 61572095 and 61877007. Authors’ addresses: X. Zheng, School of Computer Science and Technology, Shandong University of Technology, 266 Xin-cun West Road, Zibo, China; email: [email protected]; M. Li, School of Software, Dalian University of Technology, Tuqiang Street, Dalian, Kaifaqu, China, 116620; email: [email protected]; S. B. Hussain Shah, School of Computing and Mathematics, Manchester Metropolitan University, Metropolitan, Manchester, UK; email: [email protected]; D.-T. Do, Department of Computer Science and Information Engineering, Asia University, Taichung, Taichung, Taiwan; email: [email protected]; Y. Chen, Zhejiang University, Zhejiang, Hangzhou, China; email: [email protected]; C. X. Mavromoustakis, Department of Computer Science, Mobile Systems Laboratory (MoSys Lab), University of Nicosia and University of Nicosia Research Foundation, 46 Makedonitissas Avenue, Nicosia, Cyprus; email: [email protected]; G. Mastorakis, Department of Management Science and Technology, Hellenic Mediterranean University, Agios Nikolaos, Crete, Greece, 72100; email: [email protected]; E. Pallis, Department of Electrical and Computer Engineering, Hellenic Mediterranean University, 1 Thørväld Circle, Heraklion, Greece; email: [email protected]. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. © 2022 Association for Computing Machinery. 1533-5399/2022/05-ART49 $15.00 https://doi.org/10.1145/3458931
Publisher Copyright:
© 2022 Association for Computing Machinery.
PY - 2022/5
Y1 - 2022/5
N2 - The implementation of a variety of complex and energy-intensive mobile applications by resource-limited mobile devices (MDs) is a huge challenge. Fortunately, mobile edge computing (MEC) as a new computing paragon can offer rich resources to perform all or part of the MD's task, which greatly reduces the energy consumption of the MD and improves the quality of service (QoS) for applications. However, offloading tasks to the edge server is vulnerable to attacks such as tampering and snooping, resulting in a deep learning (DL) security feature developed by major cloud service providers. An effective security strategy method to minimize ongoing attacks in the MEC setting is proposed. The algorithm is based on the synthetic principle of a special set of strategies, and it can quickly construct suboptimal solutions even if the number of targets achieves hundreds of millions. In addition, for a given structure and a given number of patrollers, the upper bound of the protection level can be obtained, and the lower bound required for a given protection level can also be inferred. These bounds apply to universal strategies. By comparing with the previous three basic experiments, it can be proved that our algorithm is better than the previous ones in terms of security and running time.
AB - The implementation of a variety of complex and energy-intensive mobile applications by resource-limited mobile devices (MDs) is a huge challenge. Fortunately, mobile edge computing (MEC) as a new computing paragon can offer rich resources to perform all or part of the MD's task, which greatly reduces the energy consumption of the MD and improves the quality of service (QoS) for applications. However, offloading tasks to the edge server is vulnerable to attacks such as tampering and snooping, resulting in a deep learning (DL) security feature developed by major cloud service providers. An effective security strategy method to minimize ongoing attacks in the MEC setting is proposed. The algorithm is based on the synthetic principle of a special set of strategies, and it can quickly construct suboptimal solutions even if the number of targets achieves hundreds of millions. In addition, for a given structure and a given number of patrollers, the upper bound of the protection level can be obtained, and the lower bound required for a given protection level can also be inferred. These bounds apply to universal strategies. By comparing with the previous three basic experiments, it can be proved that our algorithm is better than the previous ones in terms of security and running time.
KW - deep learning
KW - mobile device
KW - Mobile edge computing
KW - quality of service
KW - security strategies
KW - suboptimal
KW - synthetic theories
UR - http://www.scopus.com/inward/record.url?scp=85130414853&partnerID=8YFLogxK
U2 - 10.1145/3458931
DO - 10.1145/3458931
M3 - Article
AN - SCOPUS:85130414853
SN - 1533-5399
VL - 22
JO - ACM Transactions on Internet Technology
JF - ACM Transactions on Internet Technology
IS - 2
M1 - 49
ER -