2022
DOI: 10.1016/j.jnca.2022.103395
|View full text |Cite
|
Sign up to set email alerts
|

A survey of privacy-preserving offloading methods in mobile-edge computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(9 citation statements)
references
References 201 publications
0
7
0
Order By: Relevance
“…Based on homomorphic encryption: Freedman and his team [9] innovatively represented elements as roots of polynomials and encrypted the coefficients of these polynomials using Paillier homomorphic encryption technology, combined with zero-knowledge proofs, to implement a two-party PSI protocol resistant to malicious attacks. In 2016, Freedman et al [10] further improved computational efficiency through the ElGamal encryption mechanism and reduced the protocol's computational complexity using Cuckoo Hash technology [4]. Abadi et al [11] introduced a set representation method based on point-value pairs of d-degree polynomials, implemented through the Paillier encryption scheme, reducing the multiplication complexity from O(d 2 ) to O(d) [4].…”
Section: Design Framework Based On Public Key Encryptionmentioning
confidence: 99%
“…Based on homomorphic encryption: Freedman and his team [9] innovatively represented elements as roots of polynomials and encrypted the coefficients of these polynomials using Paillier homomorphic encryption technology, combined with zero-knowledge proofs, to implement a two-party PSI protocol resistant to malicious attacks. In 2016, Freedman et al [10] further improved computational efficiency through the ElGamal encryption mechanism and reduced the protocol's computational complexity using Cuckoo Hash technology [4]. Abadi et al [11] introduced a set representation method based on point-value pairs of d-degree polynomials, implemented through the Paillier encryption scheme, reducing the multiplication complexity from O(d 2 ) to O(d) [4].…”
Section: Design Framework Based On Public Key Encryptionmentioning
confidence: 99%
“…Three types of privacy-preserving offloading in MEC namely organizing the offloading data, transferring offloaded data, and selecting the appropriate destination for offloading are discussed in this research work. 50 A three-layer cloudlet model 51 is implemented to provide a load balancing scheme during the larger number of mobile edge servers and user requests. The simulation results under various network sizes depict a significant reduction in intra-cluster load balancing.…”
Section: Research Backgroundmentioning
confidence: 99%
“…The issues required to minimize energy consumption, delay, and also parameters to increase revenue and system utilizations are addressed in this research work. Three types of privacy‐preserving offloading in MEC namely organizing the offloading data, transferring offloaded data, and selecting the appropriate destination for offloading are discussed in this research work 50 …”
Section: Research Backgroundmentioning
confidence: 99%
“…They covered offloading decisions and resource-allocation techniques in their surveys. The authors in [ 26 ] discussed privacy issues in offloading and classified various privacy-preserving offloading techniques. Reference [ 27 ] discussed the path planning techniques for UAVs.…”
Section: Introductionmentioning
confidence: 99%