Privacy-preserving edge computing offloading scheme based on whale optimization algorithm

نویسندگان

چکیده

Abstract Aiming at the problem of user’s task offloading in mobile edge computing and potential leakage location privacy during process, a privacy-preserving scheme based on whale optimization algorithm is proposed. Using differential technology to obfuscate user's information, user can make decisions according obfuscated distance. Considering delay, energy consumption, their weighted sum, modeled as convex problem. Then, adopted solve this achieve balance between protection resource consumption. Experiments are conducted verify relationship degree leakage, computation-offloading cost real distance, impact factor, respective weights time delay consumption The experimental results show that proposed paper has good performance terms protection.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preserving Location Privacy in Mobile Edge Computing

The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...

متن کامل

UAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design

With the emergence of diverse mobile applications (such as augmented reality), the quality of experience of mobile users is greatly limited by their computation capacity and finite battery lifetime. Mobile edge computing (MEC) and wireless power transfer are promising to address this issue. However, these two techniques are susceptible to propagation delay and loss. Motivated by the chance of s...

متن کامل

Privacy-preserving Decentralized Optimization Based on ADMM

In this paper, we address the problem of privacypreservation in decentralized optimization, where N agents cooperatively minimize an objective function that is the sum of N strongly convex functions private to these individual agents. In most existing decentralized optimization approaches, participating agents exchange and disclose estimates explicitly, which may not be desirable when the estim...

متن کامل

Privacy Preserving Scheme for Location-Based Services

Homomorphic encryption schemes make it possible to perform arithmetic operations, like additions and multiplications, over encrypted values. This capability provides enhanced protection for data and offers new research directions, including blind data processing. Using homomorphic encryption schemes, a Location-Based Service (LBS) can process encrypted inputs to retrieve encrypted location-rela...

متن کامل

An Improvement of Privacy-Preserving Scheme Based on Random Substitutions

Data perturbation techniques are one of the most popular models for privacy-preserving data mining due to their practical utility [1]. In a typical data perturbation, before the data owner publishes the data, they randomly change the data in certain way to disguise the private information while preserving some statistical properties for obtaining meaningful data mining models. Agrawal and Harit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Supercomputing

سال: 2022

ISSN: ['0920-8542', '1573-0484']

DOI: https://doi.org/10.1007/s11227-022-04756-1