GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8253985
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware Offloading in Mobile-Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
63
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 84 publications
(63 citation statements)
references
References 19 publications
0
63
0
Order By: Relevance
“…We represent a computation task by (µ (t) , ϑ) with µ (t) and ϑ being, respectively, the input data size (in bits) and the number of CPU cycles required to accomplish one input bit of the computation task. This work assumes that the task arrival sequence {A k n,(t) : k ∈ N + } follows a Markov process [48]. Two options are available for each computation task 4 : 1) being processed locally at the MU; and 2) being offloaded to the logical MEC gateway in the computation slice.…”
Section: B Computation and Communication Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…We represent a computation task by (µ (t) , ϑ) with µ (t) and ϑ being, respectively, the input data size (in bits) and the number of CPU cycles required to accomplish one input bit of the computation task. This work assumes that the task arrival sequence {A k n,(t) : k ∈ N + } follows a Markov process [48]. Two options are available for each computation task 4 : 1) being processed locally at the MU; and 2) being offloaded to the logical MEC gateway in the computation slice.…”
Section: B Computation and Communication Modelsmentioning
confidence: 99%
“…3 It's straightforward that given the mobility model, the average overhead of a MU incurred during inter-BS handovers is fixed. 4 The kind of computation tasks that can only be processed at the mobile devices [48] does not affect the optimization goal and hence is neglected. 5 For simplicity, we assume that the CPU power at a mobile device matches the maximum computation task arrivals and a MU can hence process A where ς is the effective switched capacitance that depends on chip architecture of the mobile device [50] and ̺ is the CPUcycle frequency at a mobile device.…”
Section: B Computation and Communication Modelsmentioning
confidence: 99%
“…A number of studies on D2D offloading have been conducted in the literature [4], [11]- [16]. Based on their objectives, these works can be classified into the following categories: 1) reduction of task completion delay [11]- [13]; 2) provision of reliable task processing results [4], [14]; and 3) solution to the privacy leakage problem [15], [16].…”
Section: Related Workmentioning
confidence: 99%
“…Ni et al [15] proposed a random matrix-based location matching approach for mobile crowdsensing to allocate tasks without disclosing the location of the mobile devices. He et al [16] presented a task offloading scheduling algorithm based on a constrained Markov decision process problem to achieve a low task completion delay and low energy consumption while maintaining a sufficient level of privacy on the location and usage pattern. However, these works did not consider the reliability of the offloading results.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation