2020
DOI: 10.1109/access.2020.2987749
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Energy Co-Aware Data Aggregation Computation Offloading for Fog-Assisted IoT Networks

Abstract: With the exponential growth of the data generated by Internet of Things (IoT) devices, computation offloading becomes a promising method to alleviate the computation burden of local IoT device and improve processing latency. In order to address the bottleneck problem of limited resources in IoT device more efficiently and provide security guarantee in data processing and forwarding process, in this paper, we propose a privacy and energy co-aware data aggregation computation offloading for fogassisted IoT netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…It can be present BDPS dependent upon Spark-RDD from the fog-IoT overlay structure for addressing the efficacy issue across the network orchestration. Chen et al [16] examined the privacy and energy co-aware data aggregation compute offloading to fog assists IoT network. In detail, a fog supported 3-layer security compute structure was established for counteracting security threats and allowing the aggregation function is executed from ciphertext.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It can be present BDPS dependent upon Spark-RDD from the fog-IoT overlay structure for addressing the efficacy issue across the network orchestration. Chen et al [16] examined the privacy and energy co-aware data aggregation compute offloading to fog assists IoT network. In detail, a fog supported 3-layer security compute structure was established for counteracting security threats and allowing the aggregation function is executed from ciphertext.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This method helps them to maintain privacy and charge less amount of fees from the users. In the paper, Chen et al [13], to provide more resources and security in IoT devices a data aggregation method has been proposed. In this method, a three-layer security framework using fog computing has been developed to provide integrity and confidentiality.…”
Section: Figure 1 Data Aggregation In Wsnsmentioning
confidence: 99%
“…to evaluate the attack risk, consider an energy constraint 𝐸 which consists of all the absolute nodes given as 𝕀 1 and consider the dishonest nodes as 𝕀 0 . These considerations are expressed as (13).…”
Section: 𝑦 ̃𝑗 = 𝑁(𝑦 𝑗 ) = 𝑦 𝑗 + 𝛿 𝑗mentioning
confidence: 99%
See 1 more Smart Citation
“…Nowadays cloud computing [1] plays the role of backbone in industry, education systems [2] and its popularity causes an explosive growth in cloud data and network traffic [3]. The exponential increase in the data and network traffic cause challenges in cloud computing [4] for instance, overloading of data centers and delays in task processing.…”
Section: Introductionmentioning
confidence: 99%