2022
DOI: 10.1109/access.2022.3175194
|View full text |Cite
|
Sign up to set email alerts
|

DPRL: Task Offloading Strategy Based on Differential Privacy and Reinforcement Learning in Edge Computing

Abstract: Mobile edge computing has been widely used in various IoT devices due to its excellent computing power and good interaction speed. Task offloading is the core of mobile edge computing. However, most of the existing task offloading strategies only focus on improving the unilateral performance of MEC, such as security, delay, and overhead. Therefore, focus on the security, delay and overhead of MEC, we propose a task offloading strategy based on differential privacy and reinforcement learning. This strategy opti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…In recent years, many works have utilized differential-privacy-based location perturbation techniques to effectively protect users' location privacy [14,18]. Differential privacy technology has superior privacy protection effects and can prevent attackers from re-identifying data based on known background knowledge [18,25].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, many works have utilized differential-privacy-based location perturbation techniques to effectively protect users' location privacy [14,18]. Differential privacy technology has superior privacy protection effects and can prevent attackers from re-identifying data based on known background knowledge [18,25].…”
Section: Related Workmentioning
confidence: 99%
“…In [29], Liu et al propose a privacy-preserving distributed deep deterministic policy gradient (P2D3PG) algorithm that solves the problem of maximizing the distributed edge caching (EC) hit rate under privacy protection constraints in a wireless communication system with MEC. In [14], Zhang et al studied differential privacy and RL task transfer strategy, established an MEC system model, and designed a four-layer policy network as an RL agent, but lacked a balance between privacy and computation offloading performance. To solve the above problems, our work proposes an RL-based algorithm that achieves a balance between privacy protection and computation offloading performance by combining differential privacy and RL technology.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation