Privacy-preserving edge computing offloading scheme based on whale optimization algorithm
نویسندگان
چکیده
Abstract Aiming at the problem of user’s task offloading in mobile edge computing and potential leakage location privacy during process, a privacy-preserving scheme based on whale optimization algorithm is proposed. Using differential technology to obfuscate user's information, user can make decisions according obfuscated distance. Considering delay, energy consumption, their weighted sum, modeled as convex problem. Then, adopted solve this achieve balance between protection resource consumption. Experiments are conducted verify relationship degree leakage, computation-offloading cost real distance, impact factor, respective weights time delay consumption The experimental results show that proposed paper has good performance terms protection.
منابع مشابه
Preserving Location Privacy in Mobile Edge Computing
The burgeoning technology of Mobile Edge Computing is attracting the traditional LBS and LS to deploy due to its nature characters such as low latency and location awareness. Although this transplant will avoid the location privacy threat from the central cloud provider, there still exists the privacy concerns in the LS of MEC scenario. Location privacy threat arises during the procedure of the...
متن کاملUAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design
With the emergence of diverse mobile applications (such as augmented reality), the quality of experience of mobile users is greatly limited by their computation capacity and finite battery lifetime. Mobile edge computing (MEC) and wireless power transfer are promising to address this issue. However, these two techniques are susceptible to propagation delay and loss. Motivated by the chance of s...
متن کاملPrivacy-preserving Decentralized Optimization Based on ADMM
In this paper, we address the problem of privacypreservation in decentralized optimization, where N agents cooperatively minimize an objective function that is the sum of N strongly convex functions private to these individual agents. In most existing decentralized optimization approaches, participating agents exchange and disclose estimates explicitly, which may not be desirable when the estim...
متن کاملPrivacy Preserving Scheme for Location-Based Services
Homomorphic encryption schemes make it possible to perform arithmetic operations, like additions and multiplications, over encrypted values. This capability provides enhanced protection for data and offers new research directions, including blind data processing. Using homomorphic encryption schemes, a Location-Based Service (LBS) can process encrypted inputs to retrieve encrypted location-rela...
متن کاملAn Improvement of Privacy-Preserving Scheme Based on Random Substitutions
Data perturbation techniques are one of the most popular models for privacy-preserving data mining due to their practical utility [1]. In a typical data perturbation, before the data owner publishes the data, they randomly change the data in certain way to disguise the private information while preserving some statistical properties for obtaining meaningful data mining models. Agrawal and Harit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Supercomputing
سال: 2022
ISSN: ['0920-8542', '1573-0484']
DOI: https://doi.org/10.1007/s11227-022-04756-1