2018
DOI: 10.3390/s18093030
|View full text |Cite
|
Sign up to set email alerts
|

An IoT-Oriented Offloading Method with Privacy Preservation for Cloudlet-Enabled Wireless Metropolitan Area Networks

Abstract: With the development of the Internet of Things (IoT) technology, a vast amount of the IoT data is generated by mobile applications from mobile devices. Cloudlets provide a paradigm that allows the mobile applications and the generated IoT data to be offloaded from the mobile devices to the cloudlets for processing and storage through the access points (APs) in the Wireless Metropolitan Area Networks (WMANs). Since most of the IoT data is relevant to personal privacy, it is necessary to pay attention to data tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 52 publications
0
11
0
Order By: Relevance
“…us, privacy preservation is becoming more important [77][78][79]. In addition, intelligent IoT applications enhanced with cloud, edge, and fog computing increasingly deal with personal information to provide intelligent services, and many studies on personal information protection and data protection are being conducted [80][81][82][83].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…us, privacy preservation is becoming more important [77][78][79]. In addition, intelligent IoT applications enhanced with cloud, edge, and fog computing increasingly deal with personal information to provide intelligent services, and many studies on personal information protection and data protection are being conducted [80][81][82][83].…”
Section: Keyword Clustering and Evolution Of Research On Iotmentioning
confidence: 99%
“…As most of the IoT data is relevant to personal privacy, it is necessary to pay attention to data transmission security. The authors of [49] investigated an IoT-oriented offloading method (IOM) which is enclave with privacy preservation to solve the problem of privacy in Cloudlet-enabled Wireless Metropolitan Area Networks (CWMAN). Their research and that of [50] adopted the non-dominated sorting differential evolution algorithm (NSDE) in order to optimize the multi-objective problem.…”
Section: Related Workmentioning
confidence: 99%
“…The use of differential evolution is motivated by the nature of the problems arising in this area which are often modeled as multi-objective, multimodal or non-convex optimization problems, of which DE can handle effectively [30]. An example of a multi-objective problem is the case where DE was employed to optimize resource utilization, energy consumption and data transmission with security controls as constraints [31]. The multi-objective problem is known as deployment issues which include variables such as connectivity, coverage, lifetime, clustering and reliability [32], construction cost and total head loss in the network [33].…”
Section: Differential Evolution In Wireless Communicationmentioning
confidence: 99%