{"title":"在支持边缘的 Metaverse 中实现弹性、安全和私有矩阵向量乘法的编码分布式计算","authors":"Houming Qiu;Kun Zhu;Nguyen Cong Luong;Dusit Niyato;Qiang Wu","doi":"10.1109/TCCN.2024.3391317","DOIUrl":null,"url":null,"abstract":"Metaverse is an immersive and photorealistic shared virtual world that requires efficient rendering and processing of millions of virtual objects and scenes. This leads to the requirements of computing time-sensitive and computation-intensive tasks, primarily focused on matrix multiplication. Cloud computing can be leveraged to process computation-intensive tasks. However, it is not able to meet the ultra-low latency requirements of immersive experiences due to the remote servers. In this paper, we propose an effectively distributed edge computing framework to compute high-dimensional matrix multiplication for the Metaverse. With the distributed edge computing, the high-dimensional matrix multiplication task is divided into multiple smaller subtasks, which are then assigned to nearby edge servers (workers). However, leveraging distributed edge servers raises emerging issues due to the existence of stragglers, malicious, and colluding servers, which limits the applications of distributed edge computing in the Metaverse system. Thus, we design a resilient, secure, and private coded distributed computing (RSPCDC) scheme to jointly address the aforementioned issues. Firstly, the RSPCDC scheme reduces overall computation latency by lowering the recovery threshold. Secondly, to identify malicious (e.g., Byzantine) workers, a verification approach is embedded in the scheme to promptly detect the Byzantine attack without requiring additional workers. Thirdly, the RSPCDC scheme provides (information-theoretic) privacy protection for the input data against the collusion of workers. Fourthly, the results of subtasks computed by stragglers are fully utilized to enhance the computation performance during the recovery of the final result. In addition, the RSPCDC scheme is designed and deployed in practical scenarios in which the computing resources of the workers are heterogeneous. Extensive performance evaluations are provided to demonstrate the improvement and effectiveness of the proposed RSPCDC scheme in comparison to existing schemes.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"10 5","pages":"1944-1958"},"PeriodicalIF":7.4000,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Coded Distributed Computing for Resilient, Secure and Private Matrix-Vector Multiplication in Edge-Enabled Metaverse\",\"authors\":\"Houming Qiu;Kun Zhu;Nguyen Cong Luong;Dusit Niyato;Qiang Wu\",\"doi\":\"10.1109/TCCN.2024.3391317\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Metaverse is an immersive and photorealistic shared virtual world that requires efficient rendering and processing of millions of virtual objects and scenes. This leads to the requirements of computing time-sensitive and computation-intensive tasks, primarily focused on matrix multiplication. Cloud computing can be leveraged to process computation-intensive tasks. However, it is not able to meet the ultra-low latency requirements of immersive experiences due to the remote servers. In this paper, we propose an effectively distributed edge computing framework to compute high-dimensional matrix multiplication for the Metaverse. With the distributed edge computing, the high-dimensional matrix multiplication task is divided into multiple smaller subtasks, which are then assigned to nearby edge servers (workers). However, leveraging distributed edge servers raises emerging issues due to the existence of stragglers, malicious, and colluding servers, which limits the applications of distributed edge computing in the Metaverse system. Thus, we design a resilient, secure, and private coded distributed computing (RSPCDC) scheme to jointly address the aforementioned issues. Firstly, the RSPCDC scheme reduces overall computation latency by lowering the recovery threshold. Secondly, to identify malicious (e.g., Byzantine) workers, a verification approach is embedded in the scheme to promptly detect the Byzantine attack without requiring additional workers. Thirdly, the RSPCDC scheme provides (information-theoretic) privacy protection for the input data against the collusion of workers. Fourthly, the results of subtasks computed by stragglers are fully utilized to enhance the computation performance during the recovery of the final result. In addition, the RSPCDC scheme is designed and deployed in practical scenarios in which the computing resources of the workers are heterogeneous. Extensive performance evaluations are provided to demonstrate the improvement and effectiveness of the proposed RSPCDC scheme in comparison to existing schemes.\",\"PeriodicalId\":13069,\"journal\":{\"name\":\"IEEE Transactions on Cognitive Communications and Networking\",\"volume\":\"10 5\",\"pages\":\"1944-1958\"},\"PeriodicalIF\":7.4000,\"publicationDate\":\"2024-04-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cognitive Communications and Networking\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10505937/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cognitive Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10505937/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Coded Distributed Computing for Resilient, Secure and Private Matrix-Vector Multiplication in Edge-Enabled Metaverse
Metaverse is an immersive and photorealistic shared virtual world that requires efficient rendering and processing of millions of virtual objects and scenes. This leads to the requirements of computing time-sensitive and computation-intensive tasks, primarily focused on matrix multiplication. Cloud computing can be leveraged to process computation-intensive tasks. However, it is not able to meet the ultra-low latency requirements of immersive experiences due to the remote servers. In this paper, we propose an effectively distributed edge computing framework to compute high-dimensional matrix multiplication for the Metaverse. With the distributed edge computing, the high-dimensional matrix multiplication task is divided into multiple smaller subtasks, which are then assigned to nearby edge servers (workers). However, leveraging distributed edge servers raises emerging issues due to the existence of stragglers, malicious, and colluding servers, which limits the applications of distributed edge computing in the Metaverse system. Thus, we design a resilient, secure, and private coded distributed computing (RSPCDC) scheme to jointly address the aforementioned issues. Firstly, the RSPCDC scheme reduces overall computation latency by lowering the recovery threshold. Secondly, to identify malicious (e.g., Byzantine) workers, a verification approach is embedded in the scheme to promptly detect the Byzantine attack without requiring additional workers. Thirdly, the RSPCDC scheme provides (information-theoretic) privacy protection for the input data against the collusion of workers. Fourthly, the results of subtasks computed by stragglers are fully utilized to enhance the computation performance during the recovery of the final result. In addition, the RSPCDC scheme is designed and deployed in practical scenarios in which the computing resources of the workers are heterogeneous. Extensive performance evaluations are provided to demonstrate the improvement and effectiveness of the proposed RSPCDC scheme in comparison to existing schemes.
期刊介绍:
The IEEE Transactions on Cognitive Communications and Networking (TCCN) aims to publish high-quality manuscripts that push the boundaries of cognitive communications and networking research. Cognitive, in this context, refers to the application of perception, learning, reasoning, memory, and adaptive approaches in communication system design. The transactions welcome submissions that explore various aspects of cognitive communications and networks, focusing on innovative and holistic approaches to complex system design. Key topics covered include architecture, protocols, cross-layer design, and cognition cycle design for cognitive networks. Additionally, research on machine learning, artificial intelligence, end-to-end and distributed intelligence, software-defined networking, cognitive radios, spectrum sharing, and security and privacy issues in cognitive networks are of interest. The publication also encourages papers addressing novel services and applications enabled by these cognitive concepts.