Optimal Task Allocation and Coding Design for Secure Edge Computing with Heterogeneous Edge Devices

Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

2 Scopus Citations
View graph of relations

Author(s)

  • Jin Wang
  • Chunming Cao
  • Kejie Lu
  • Admela Jukan
  • Wei Zhao

Related Research Unit(s)

Detail(s)

Original languageEnglish
Journal / PublicationIEEE Transactions on Cloud Computing
Publication statusOnline published - 8 Jan 2021

Abstract

In recent years, edge computing has attracted significant attention because it can effectively support many delay-sensitive applications. Despite such a salient feature, edge computing also faces many challenges, especially for efficiency and security, because edge devices are usually heterogeneous and may be untrustworthy. To address these challenges, we propose a unified framework to provide efficiency and confidentiality by coded distributed computing. Within the proposed framework, we use matrix multiplication, a fundamental building block of many distributed machine learning algorithms, as the representative computation task. To minimize resource consumption while achieving information-theoretic security, we investigate two highly-coupled problems, (1) task allocation that assigns data blocks in a computing task to edge devices, and (2) linear code design that generates data blocks by encoding the original data with random information. Specifically, we first theoretically analyze the necessary conditions for the optimal solution. Based on the theoretical analysis, we develop an efficient task allocation algorithm. Using the task allocation, we then design secure coded computing schemes, for two cases, (1) with redundant computation and (2) without redundant computation. Moreover, we also theoretically analyze the optimization of the proposed scheme. Finally, we conduct extensive simulation experiments to demonstrate the effectiveness of the proposed schemes.

Research Area(s)

  • Cloud computing, coded computing, Computational modeling, confidentiality, Edge computing, efficiency, Encoding, linear coding, optimization, Resource management, Security, task allocation, Task analysis