Privacy-Preserving Coded Mobile Edge Computing for Low-Latency Distributed Inference

@article{Schlegel2021PrivacyPreservingCM,
title={Privacy-Preserving Coded Mobile Edge Computing for Low-Latency Distributed Inference},
author={Reent Schlegel and Siddhartha Kumar and Eirik Rosnes and Alexandre Graell i Amat},
journal={IEEE Journal on Selected Areas in Communications},
year={2021},
volume={40},
pages={788-799}
}
• Published 7 October 2021
• Computer Science
• IEEE Journal on Selected Areas in Communications
We consider a mobile edge computing scenario where a number of devices want to perform a linear inference <inline-formula> <tex-math notation="LaTeX">${W}{x}$ </tex-math></inline-formula> on some local data <inline-formula> <tex-math notation="LaTeX">${x}$ </tex-math></inline-formula> given a network-side matrix <inline-formula> <tex-math notation="LaTeX">${W}$ </tex-math></inline-formula>. The computation is performed at the network edge over a number of edge servers. We propose a coding…
6 Citations

Figures from this paper

• Computer Science
Computer Networks
• 2023
A chunk-based joint probabilistic caching (JPC) approach is employed to mislead an adversary eavesdropping on the communication inside an EC and maximizing the adversary's error in estimating the requested file and requesting cache.
The concepts of user privacy and edge computing are introduced and a state-of-the-art overview of current literature as it relates to privacy preservation in honest-but-curious edge computing is provided.
• Computer Science
Sensors
• 2023
Simulated experimental results demonstrate that this scheme is effective in protecting the location privacy and association privacy of mobile devices and reducing the average completion time of tasks compared with the-state-of-art techniques.
• Computer Science
IEEE Transactions on Communications
• 2023
Two novel federated learning schemes that mitigate the effect of straggling devices by introducing redundancy on the devices' data across the network and provides straggler resiliency and robustness against model inversion attacks are presented.
• Computer Science
ICC 2022 - IEEE International Conference on Communications
• 2022
We present a novel coded federated learning (FL) scheme for linear regression that mitigates the effect of straggling devices while retaining the privacy level of conventional FL. The proposed scheme
• Anni HuangChunzhi MengMiaoru Su
• Computer Science
2022 International Conference on Knowledge Engineering and Communication Systems (ICKES)
• 2022
This paper studies the method of dynamic scanning desensitization of sensitive data based on low code modeling language technology, and uses low code technology to build a data desensitized system, which meets the user's needs and has good performance.

References

SHOWING 1-10 OF 32 REFERENCES

• Computer Science
IEEE Transactions on Information Theory
• 2019
The key novelty in this work is that in the particular regime where the number of available processing nodes is greater than the total number of dot products, Short-Dot has lower expected computation time under straggling under an exponential model compared to existing strategies.
• Computer Science
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
• 2020
An edge computing scenario where users want to perform a linear computation on local, private data and a network-wide, public matrix is considered, and a scheme that guarantees information-theoretic user data privacy against an eavesdropper with access to a number of edge servers or their corresponding communication links is provided.
• Computer Science
IEEE Transactions on Information Theory
• 2018
This paper focuses on two of the most basic building blocks of distributed learning algorithms: matrix multiplication and data shuffling, and uses codes to reduce communication bottlenecks, exploiting the excess in storage.
• Computer Science
IEEE Transactions on Communications
• 2020
A solution based on new codes, called Staircase codes, which universally achieve the information theoretic limit on the download cost by the Master, leading to latency reduction, and is validated with extensive implementation on Amazon EC2.
• Computer Science
AISTATS
• 2019
LCC is proved the optimality of LCC by showing that it achieves the optimal tradeoff between resiliency, security, and privacy, and speeds up the conventional uncoded implementation of distributed least-squares linear regression by up to up to \$13.43\times, and achieves a speedup over the state-of-the-art straggler mitigation strategies.
• Computer Science
2016 IEEE Globecom Workshops (GC Wkshps)
• 2016
An information-theoretic lower bound on the latency- load tradeoff is proved, which is shown to be within a constant multiplicative gap from the achieved tradeoff at the two end points.
• Computer Science
Defense + Commercial Sensing
• 2019
A private and rateless adaptive coded computation (PRAC) algorithm is developed by taking into account the privacy requirements of IoBT applications and devices, and the heterogeneous and time-varying resources of edge devices, showing that PRAC outperforms known secure coded computing methods when resources are heterogeneous.
• Computer Science
IEEE Transactions on Wireless Communications
• 2020