2018
DOI: 10.1155/2018/8142102
|View full text |Cite
|
Sign up to set email alerts
|

Homomorphic Evaluation of the Integer Arithmetic Operations for Mobile Edge Computing

Abstract: With the rapid development of the 5G network and Internet of Things (IoT), lots of mobile and IoT devices generate massive amounts of multisource heterogeneous data. Effective processing of such data becomes an urgent problem. However, traditional centralised models of cloud computing are challenging to process multisource heterogeneous data effectively. Mobile edge computing (MEC) emerges as a new technology to optimise applications or cloud computing systems. However, the features of MEC such as content perc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…The library used for DGHV homomorphic operations is DGHVlib-v1.1 [52], [53]. It has various implementations of DGHV such as DGHV itself [50], CMNT [54] and CNT [55].…”
Section: Methodsmentioning
confidence: 99%
“…The library used for DGHV homomorphic operations is DGHVlib-v1.1 [52], [53]. It has various implementations of DGHV such as DGHV itself [50], CMNT [54] and CNT [55].…”
Section: Methodsmentioning
confidence: 99%
“…It was deemed essential to guarantee the security of end users and information of private and public systems such as smart grids and smart mobility. Gong et al [123] proposed a homomorphic encryption technique to guarantee transmission security and evaluate next-generation mobile edge computing. Also, Eckhoff and Wagner [59] discussed the applications areas, attackers and their data sources, privacy, enabling technologies of a smart city.…”
Section: Privacy and Security Issues In Drones And Iot Collaboramentioning
confidence: 99%
“…Additionally, our proposed method computes the normalisation and classification in the encrypted domain. Other implementations using FHE to provide security exist investigating use in mobile networks [17,18].…”
Section: Related Workmentioning
confidence: 99%