2022
DOI: 10.1016/j.comcom.2021.11.025
|View full text |Cite
|
Sign up to set email alerts
|

Combinatorial double auction for resource allocation with differential privacy in edge computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 27 publications
0
1
0
Order By: Relevance
“…In [1] a new strategy is proposed for protecting the privacy of transactions in the edge computing resource trading market. This approach includes the use of double auction system and applying differential privacy techniques based on Gaussian mechanisms.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [1] a new strategy is proposed for protecting the privacy of transactions in the edge computing resource trading market. This approach includes the use of double auction system and applying differential privacy techniques based on Gaussian mechanisms.…”
Section: Literature Surveymentioning
confidence: 99%
“…In an area powered by edge computing, edge servers are located beside the access points or base stations [14] . In the edge computing environment, vendors can hire resources according to the same pay-as-you-go business pattern as in cloud computing [15] . By sending users’ spatio-temporal data to the edge servers, the possibility of a user becoming a close contact with a COVID-19 patient can be detected.…”
Section: Introductionmentioning
confidence: 99%