2017
DOI: 10.1016/j.future.2016.12.017
|View full text |Cite
|
Sign up to set email alerts
|

Energy cost minimization with job security guarantee in Internet data center

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 55 publications
(71 reference statements)
0
10
0
Order By: Relevance
“…We can observe from Figure 3 that confidential service (denoted as E) is first employed to encrypt the offloaded task. e security levels and processing rates of cryptographic algorithms for confidential service [20,30,36,37] can be found in Table 2. en, to protect the offloaded computation task from alteration attacks, integrity service (denoted as H) is successively employed to implement a hash algorithm to it.…”
Section: Mobile Edge Computing Model As Depicted Inmentioning
confidence: 99%
See 1 more Smart Citation
“…We can observe from Figure 3 that confidential service (denoted as E) is first employed to encrypt the offloaded task. e security levels and processing rates of cryptographic algorithms for confidential service [20,30,36,37] can be found in Table 2. en, to protect the offloaded computation task from alteration attacks, integrity service (denoted as H) is successively employed to implement a hash algorithm to it.…”
Section: Mobile Edge Computing Model As Depicted Inmentioning
confidence: 99%
“…en, to protect the offloaded computation task from alteration attacks, integrity service (denoted as H) is successively employed to implement a hash algorithm to it. e security levels and processing rates of hash functions for integrity service [20,30,36,37] can be seen in Table 3. After the encrypted task is delivered to the ith edge server, it is firstly decrypted (denoted as DE) and its integrity is verified (denoted as IV), and then it is executed, and finally the computation result is sent to the mobile device.…”
Section: Mobile Edge Computing Model As Depicted Inmentioning
confidence: 99%
“…Li et al developed a resource optimization architecture for minimizing the energy cost in data centers while assuring system security and meeting delay targets. This approach considers the use of frameworks for adaptively timing computation to capitalize on utilizing resources that are the lowest cost or alternately most available [25].…”
Section: B Resource Efficiencymentioning
confidence: 99%
“…Some works do not try to minimize the energy consumption but the energy cost. Li et al [26] present a scheduling approach to minimize the cost of the energy consumed while guaranteeing security-related QoS. The security guarantee is obtained by adding security services at runtime according to the level of SLA of each task.…”
Section: Related Workmentioning
confidence: 99%
“…Our approach differs from most of the energy-efficient schedulers as the first goal is not to reduce to total energy consumed, but the non-renewable energy consumed. Therefore, it has more similarities with approaches such as [26], which tries to minimize the energy cost while having dynamic electricity pricing.…”
Section: Related Workmentioning
confidence: 99%