2022
DOI: 10.1007/s11227-022-04756-1
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving edge computing offloading scheme based on whale optimization algorithm

Abstract: Aiming at the problem of user’s task offloading in mobile edge computing and the potential leakage of location privacy during the offloading process, a privacy-preserving computing offloading scheme based on whale optimization algorithm is proposed. Using differential privacy technology to obfuscate the user's location information, the user can make task offloading decisions according to the obfuscated distance. Considering the delay, energy consumption, and their weighted sum, the offloading problem is modele… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…As a distributed computing model that pushes data processing and storage to the network edge, edge computing has been expanding its application scope, but privacy issues have become increasingly prominent. Data encryption, K-anonymity, blockchain, and location perturbation techniques [7,[20][21][22] have been studied in the context of privacy protection in MEC. More specifically, location perturbation is a technique employed to protect privacy by introducing modifications or perturbations to the original location data.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…As a distributed computing model that pushes data processing and storage to the network edge, edge computing has been expanding its application scope, but privacy issues have become increasingly prominent. Data encryption, K-anonymity, blockchain, and location perturbation techniques [7,[20][21][22] have been studied in the context of privacy protection in MEC. More specifically, location perturbation is a technique employed to protect privacy by introducing modifications or perturbations to the original location data.…”
Section: Related Workmentioning
confidence: 99%
“…In [25], Miao et al propose an MEPA privacy-aware framework for MEC that uses differential privacy technology to protect location privacy in the dataset domain. A privacy-preserving computation offloading scheme based on the whale optimization algorithm is proposed in [7]. This scheme uses differential privacy technology to perturb users' locations and makes offloading decisions based on the perturbed distance.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…3)OGA-OPSO calculation 4)GAVECOS [8] calculation : GAVECOS is an offloading decision based on an improved genetic algorithm. Considering the edge and surrounding small mobile base stations.…”
Section: Experimental Descriptionmentioning
confidence: 99%