2019
DOI: 10.1016/j.future.2019.03.011
|View full text |Cite
|
Sign up to set email alerts
|

Security modeling and efficient computation offloading for service workflow in mobile edge computing

Abstract: It is a big challenge for resource-limited mobile devices (MDs) to execute various complex and energy-consumed mobile applications. Fortunately, as a novel computing paradigm, edge computing (MEC) can provide abundant computing resources to execute all or parts of the tasks of MDs and thereby can greatly reduce the energy of MD and improve the QoS of applications. However, offloading workflow tasks to the MEC servers are liable to external security threats (e.g., snooping, alteration). In this paper, we propos… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
53
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 82 publications
(53 citation statements)
references
References 49 publications
0
53
0
Order By: Relevance
“…We can observe from Figure 3 that confidential service (denoted as E) is first employed to encrypt the offloaded task. e security levels and processing rates of cryptographic algorithms for confidential service [20,30,36,37] can be found in Table 2. en, to protect the offloaded computation task from alteration attacks, integrity service (denoted as H) is successively employed to implement a hash algorithm to it.…”
Section: Mobile Edge Computing Model As Depicted Inmentioning
confidence: 99%
See 4 more Smart Citations
“…We can observe from Figure 3 that confidential service (denoted as E) is first employed to encrypt the offloaded task. e security levels and processing rates of cryptographic algorithms for confidential service [20,30,36,37] can be found in Table 2. en, to protect the offloaded computation task from alteration attacks, integrity service (denoted as H) is successively employed to implement a hash algorithm to it.…”
Section: Mobile Edge Computing Model As Depicted Inmentioning
confidence: 99%
“…en, to protect the offloaded computation task from alteration attacks, integrity service (denoted as H) is successively employed to implement a hash algorithm to it. e security levels and processing rates of hash functions for integrity service [20,30,36,37] can be seen in Table 3. After the encrypted task is delivered to the ith edge server, it is firstly decrypted (denoted as DE) and its integrity is verified (denoted as IV), and then it is executed, and finally the computation result is sent to the mobile device.…”
Section: Mobile Edge Computing Model As Depicted Inmentioning
confidence: 99%
See 3 more Smart Citations