2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE C 2019
DOI: 10.1109/ithings/greencom/cpscom/smartdata.2019.00049
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware Data Offloading for Mobile Devices in Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…Moreover, these three methods almost all show linear growth, the security of data distribution and transmission can be enhanced by increasing the number of tasks. When the number of computing tasks is 5, 10, 15, 20 and 25, the privacy entropy of this method is 14.17, 49.78, 59.32, 68.02 and 83.33 respectively, which is better than the methods based on [26] and [27]. When the number of tasks is the same, although the privacy entropy of method in literature [27] is similar to the calculated value of proposed method, the proposed method performs better in terms of time consumption.…”
Section: Experiments and Analysismentioning
confidence: 90%
See 2 more Smart Citations
“…Moreover, these three methods almost all show linear growth, the security of data distribution and transmission can be enhanced by increasing the number of tasks. When the number of computing tasks is 5, 10, 15, 20 and 25, the privacy entropy of this method is 14.17, 49.78, 59.32, 68.02 and 83.33 respectively, which is better than the methods based on [26] and [27]. When the number of tasks is the same, although the privacy entropy of method in literature [27] is similar to the calculated value of proposed method, the proposed method performs better in terms of time consumption.…”
Section: Experiments and Analysismentioning
confidence: 90%
“…Since the value of privacy entropy is related to data security, the higher the average privacy entropy value, the higher the security of data transmission. From the comparison of average privacy entropy calculated by different methods shown in Figure 9, it can be seen that in terms of average privacy entropy, the proposed method has better performance than the methods in [26] and [27]. When the number of computing tasks is 5, 10, 15, 20 and 25, the average privacy entropy of proposed method is 2.02, 3.97, 5.96, 6.23 and 8.83 respectively.…”
Section: Experiments and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, for the sake of reducing service latency and energy consumption with security guarantee, the integration of privacy protection and computation offloading attracts great attention. For example, in [29], a privacy-aware data offloading method in edge computing was proposed to prohibit privacy leakage and achieve low latency. Similarly, He et al [30] developed a constrained Markov decision process based privacy-aware task offloading scheduling algorithm, which achieves the best possible delay and energy consumption with a high level of privacy.…”
Section: Related Workmentioning
confidence: 99%
“…The optimal values Updating the α i (k), β i (k) and R i (k) by formula (29) with momentum (30) and gradient function (31);…”
Section: Outputmentioning
confidence: 99%