2019
DOI: 10.1109/access.2019.2908858
|View full text |Cite
|
Sign up to set email alerts
|

Towards Attack and Defense Views of Rational Delegation of Computation

Abstract: Rational delegation of computation is an important technology of mobile Internet at present, which is significant to the construction of intelligent urban computing. In order to close to practical applications, many tasks need cooperation with edge computing and cloud computing. The delegated computation scheme with rational players guarantees the reliability of the calculation results by the utility function. This paper studies the rational delegation of computation and the security attack-defense from attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…One future direction would be to extend our scheme to rational delegation of computation such as [27], which may lead to more complex utility functions and incentive mechanisms, and we can analyze the players's capacity limitation of attack and defense. Another future direction would be to construct a composable scheme.…”
Section: Discussionmentioning
confidence: 99%
“…One future direction would be to extend our scheme to rational delegation of computation such as [27], which may lead to more complex utility functions and incentive mechanisms, and we can analyze the players's capacity limitation of attack and defense. Another future direction would be to construct a composable scheme.…”
Section: Discussionmentioning
confidence: 99%
“…Dealing with individual user data: assuming that ∆v represents the infinitesimal of interference, it can only be shared as a region, and the length of the quantization is L, thus I th = L∆v. Equation (10) can be simplified into L, and the infinitesimal ∆v of interference can be divided into the largest objective function [27][28][29][30]. Let l ∈ {1.2.…”
Section: Security Encryption Methods Of Upimentioning
confidence: 99%
“…e essence of network attack and defence confrontation is to detect, monitor, and promptly leverage defence mechanisms to interfere with or block attacks [1]. e attacks of the traditional edge computing network target active defence techniques, which can be mitigated to avoid data theft or data tampering by abnormal detection [2][3][4][5]. However, it cannot solve the problem of ubiquitous intrusion monitoring identification in edge computing networks.…”
Section: Introductionmentioning
confidence: 99%
“…erefore, the existing secure transmission technology generally belongs to the passive defence technology, which cannot actively avoid or suppress network attack behaviours and cannot meet the needs of security in edge computing networks. (3) In terms of network attack detection, the current research studies of mainstream intrusion detection for edge computing networks are focused on anomaly detection. Deep learning techniques are used to build behaviour models of edge computing networks and to detect and identify various types of network attacks based on model deviations.…”
Section: Introductionmentioning
confidence: 99%