2019
DOI: 10.1186/s13638-019-1560-8
|View full text |Cite
|
Sign up to set email alerts
|

A time-efficient data offloading method with privacy preservation for intelligent sensors in edge computing

Abstract: Over the past years, with the development of hardware and software, the intelligent sensors, which are deployed in the wearable devices, smart phones, and etc., are leveraged to collect the data around us. The data collected by the sensors is analyzed, and the corresponding measures will be implemented. However, due to the limited computing resources of the sensors, the overload resource usage may occur. In order to satisfy the requirements for strong computing power, edge computing, which emerges as a novel p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 46 publications
0
17
0
Order By: Relevance
“…Apparently, this type of device mobility is considered trivial when it comes to studying the task offloading problem, as it does not impose any type of dynamicity to the network conditions. In certain cases, purely non-mobile devices like stationary IoT sensors are engaged in task offloading at the Edge, [110], [111]. Other works apply this assumption on mobile devices, to reduce the complexity of their proposed offloading solutions; for example, the authors in [112] assume that the statistics of the utilized wireless links remain unchanged during the processing of the users' tasks, reflecting a relatively static or low-mobility scenario.…”
Section: Static (Low-mobility)mentioning
confidence: 99%
“…Apparently, this type of device mobility is considered trivial when it comes to studying the task offloading problem, as it does not impose any type of dynamicity to the network conditions. In certain cases, purely non-mobile devices like stationary IoT sensors are engaged in task offloading at the Edge, [110], [111]. Other works apply this assumption on mobile devices, to reduce the complexity of their proposed offloading solutions; for example, the authors in [112] assume that the statistics of the utilized wireless links remain unchanged during the processing of the users' tasks, reflecting a relatively static or low-mobility scenario.…”
Section: Static (Low-mobility)mentioning
confidence: 99%
“…Moreover, these three methods almost all show linear growth, the security of data distribution and transmission can be enhanced by increasing the number of tasks. When the number of computing tasks is 5, 10, 15, 20 and 25, the privacy entropy of this method is 14.17, 49.78, 59.32, 68.02 and 83.33 respectively, which is better than the methods based on [26] and [27]. When the number of tasks is the same, although the privacy entropy of method in literature [27] is similar to the calculated value of proposed method, the proposed method performs better in terms of time consumption.…”
Section: Experiments and Analysismentioning
confidence: 89%
“…Game theory also provides a technique to support migration, e.g., the authors of [43] discuss a coalitional game based pricing scheme to reason on the offloading relationship between data and processing nodes. In [42], smart sensors are assumed to be the recording devices and privacy preservation is considered to be the outcome of the proposed approach. A Pareto evolutionary algorithm is proposed to optimize the average time consumption and average privacy entropy jointly.…”
Section: Related Workmentioning
confidence: 99%