2022
DOI: 10.1049/tje2.12124
|View full text |Cite
|
Sign up to set email alerts
|

Computing resource allocation strategy considering privacy protection mechanism in edge computing environment

Abstract: Aiming at the problem that it is difficult to achieve high privacy security and low time consumption in the process of user terminals resource allocation, this paper proposes a computing resource allocation strategy considering privacy protection mechanism in edge computing environment. Firstly, the problem is modelled as partially observable Markov decision process, and a reinforcement learning algorithm is proposed to minimize the failure rate of tasks. Secondly, the privacy entropy is used to protect the pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…In [12], there were five essential factors: concerns in fog computing, optimization process involved in fog and IoT, compared scheduling algorithms, rationalized the scheduling patterns and measures were also taken for improving scheduling. A protection mechanism for edge computing was analyzed in [13].…”
Section: Related Workmentioning
confidence: 99%
“…In [12], there were five essential factors: concerns in fog computing, optimization process involved in fog and IoT, compared scheduling algorithms, rationalized the scheduling patterns and measures were also taken for improving scheduling. A protection mechanism for edge computing was analyzed in [13].…”
Section: Related Workmentioning
confidence: 99%