2021
DOI: 10.1109/tpds.2020.3041029
|View full text |Cite
|
Sign up to set email alerts
|

A Game-Based Approach for Cost-Aware Task Assignment With QoS Constraint in Collaborative Edge and Cloud Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(20 citation statements)
references
References 32 publications
0
20
0
Order By: Relevance
“…QoS describes the discrepancy between users' expectations (how to server SR) and users' perceptions (how to perform service). e user's quality of service (η sq i (x, T)) is evaluated with e η tc i � e ((S ex − S ac )/S ex ) is a fundamental expression to assess the price of service (PoS) with equation (9). Here, S ex and S ac refer to expected cost and actual cost, respectively:…”
Section: User Service Satisfactionmentioning
confidence: 99%
See 1 more Smart Citation
“…QoS describes the discrepancy between users' expectations (how to server SR) and users' perceptions (how to perform service). e user's quality of service (η sq i (x, T)) is evaluated with e η tc i � e ((S ex − S ac )/S ex ) is a fundamental expression to assess the price of service (PoS) with equation (9). Here, S ex and S ac refer to expected cost and actual cost, respectively:…”
Section: User Service Satisfactionmentioning
confidence: 99%
“…us, the DAG theory's importance tremendously changed over the past decade since it influences the service execution time and resource usage. erefore, this issue is formulated as NPhard [9], and many heuristic approaches resolved the same issue through resource usage consolidation [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…However, confronting illegal online access and malicious tampering, the log system lacks in log validation and user consensus. As a result, data privacy and integrity have been facing a tremendous threat [1][2][3].…”
Section: Introductionmentioning
confidence: 99%
“…Further, for the issue that signers can threaten the privacy of log information, we proposed a novel lattice-based blind signature scheme enhanced the security level to complete the signature operation in this system, which blindness protects the privacy of log information, and one-more unforgeability keeps the validity of the blind signature. (3) We analyze the security in theory and implement a complete security proof, which reduces the difficulty of malicious attackers to forge signatures to the SIS problem. Moreover, we evaluate the comprehensive performance and prove that our scheme has a smaller signature length compared with similar schemes.…”
Section: Introductionmentioning
confidence: 99%
“…A considerable number of individuals and organizations may be tempted to store their files on the third cloud server, reducing local data storage for convenience. Unfortunately, the cloud storage server is semihonest because it is possible to be curious about the user's stored data in real-world applications [4], and data security concerns have become serious barriers to prevent the widespread usage of cloud storage for IoT. In order to mitigate the concern, the simple and efficient solution is to encrypt the storage of data to prevent information from being exposed to server, but one limitation is that the encryption mechanism inevitably brings about inflexibilities of data accessing when used to some extent, such as querying keywords on encrypted datasets.…”
Section: Introductionmentioning
confidence: 99%