A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization |
Chen, Lu
(Information Engineering University)
Tang, Hongbo (Information Engineering University) Zhao, Yu (Information Engineering University) You, Wei (Information Engineering University) Wang, Kai (Information Engineering University) |
1 | X. Xu, C. He, Z. Xu, L. Qi, S. Wan, and M. Z. A. Bhuiyan, "Joint optimization of offloading utility and privacy for edge computing enabled IoT," IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2622-2629, 2020. DOI |
2 | Y. Zhong, T. Q. Quek, and X. Ge, "Heterogeneous cellular networks with spatio-temporal traffic: Delay analysis and scheduling," IEEE Journal on Selected Areas in Communications, vol. 35, no. 6 pp. 1373-1386, 2017. DOI |
3 | H. Ko, H. Lee, T. Kim, and S. Pack, "LPGA: Location Privacy-Guaranteed Offloading Algorithm in Cache-Enabled Edge Clouds," IEEE Transactions on Cloud Computing, pp. 1-1, 2020. |
4 | S. W. Ko, K. Han, and K. Huang, "Wireless networks for mobile edge computing: spatial modeling and latency analysis," IEEE Transactions on Wireless Communications, vol. 17, no. 8, pp.5225-5240, 2018. DOI |
5 | J. Yang and T. Johansson, "An overview of cryptographic primitives for possible use in 5G and beyond," Science China Information Sciences, vol. 63, no. 12, pp. 5-26, 2020. |
6 | X. He, J. Liu, R. Jin, and H. Dai, "Privacy-aware offloading in mobile-edge computing," in Proc. of the IEEE Global Communications Conference, Singapore, pp. 1-6, 2017. |
7 | X. Ge, B. Yang, J. Ye, G. Mao, C. X. Wang, and T. Han, "Spatial spectrum and energy efficiency of random cellular networks," IEEE Transactions on Communications, vol. 63, no. 3, pp.1019-1030, 2015. DOI |
8 | S. Huang, B. Lv, and R. Wang, "Mdp-based scheduling design for mobile-edge computing systems with random user arrival," in Proc. of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa Village, USA, pp.1-6, Dec, 2019. |
9 | Y. Mao, J. Zhang, S. H. Song, and K. B. Letaief, "Power-delay trade off in multi-user mobile-edge computing systems," in Proc. of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, pp. 1-6, 2016. |
10 | A. P. Miettinen, and J. K. Nurminen, "Energy efficiency of mobile clients in cloud computing," in Proc. of the 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10), 2010. |
11 | J. Moura, and D. Hutchison, "Game theory for multi-access edge computing: Survey, use cases, and future trends," IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 260-288, 2019. DOI |
12 | X. ZHAO, J. PENG, W. YOU, and L. CHEN, "A Privacy-preserving Computation Offloading Method Based on k-Anonymity," Journal of Electronics & Information Technology, vol. 43, no.4, pp.892-899, 2021. |
13 | X. He, R. Jin, and H. Dai, "Deep PDS-learning for privacy-aware offloading in MEC-enabled IoT," IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4547-4555, 2019. DOI |
14 | J. Xu, and S. Ren, "Online learning for offloading and auto scaling in renewable-powered mobile edge computing," in Proc. of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC USA, 2016. |
15 | Y. Cui, V. K. Lau, R. Wang, H. Huang, and S. Zhang, "A survey on delay-aware resource control for wireless systems-Large deviation theory, stochastic Lyapunov drift, and distributed stochastic learning," IEEE Transactions on Information Theory, vol. 58, no. 3, pp. 1677-1701, 2012. DOI |
16 | R. Roman, J. Lopez, and M. Mambo, "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges," Future Generation Computer Systems, vol. 78, pp. 680-698, 2018. DOI |
17 | Z. Xiao, X. Dai, H. Jiang, D. Wang, H. Chen, L. Yang, and F. Zeng, "Vehicular task offloading via heat-aware mec cooperation using game-theoretic method," IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2038-2052, 2020. DOI |
18 | X. Liu and Y. Deng, "Learning-based prediction, rendering and association optimization for MEC-enabled wireless virtual reality (vr) network," IEEE Transactions on Wireless Communications, vol. 20, no. 10, pp. 6356-6370, 2021. DOI |
19 | T. Gopalakrishnan, D. Ruby, F. Al-Turjman, D. Gupta, I. V. Pustokhina, D. A. Pustokhin, and K. Shankar, "Deep learning enabled data offloading with cyber attack detection model in mobile edge computing systems," IEEE Access, vol. 8, pp. 185938-185949, 2020. DOI |
20 | N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, "Mobile edge computing: A survey," IEEE Internet of Things Journal, vol.5, no.1, pp. 450-465, 2018. DOI |
21 | K. Kaur, S. Garg, G. Kaddoum, M. Guizani, and D. N. K. Jayakody, "A lightweight and privacy-preserving authentication protocol for mobile edge computing," in Proc. of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa Village, USA, pp. 1-6, 2019. |
22 | Y. Li, X. Wang, X. Gan, H. Jin, L. Fu, and X. Wang, "Learning-aided computation offloading for trusted collaborative mobile edge computing," IEEE Transactions on Mobile Computing, vol. 19, no. 12, pp. 2833-2849, 2020. DOI |
23 | C. F. Liu, M. Bennis, M. Debbah, and H. V. Poor, "Dynamic task offloading and resource allocation for ultra-reliable low-latency edge computing," IEEE Transactions on Communications, vol. 67, no. 6, pp. 4132-4150, 2019. DOI |
24 | T. He, E. N. Ciftcioglu, S. Wang, and K. S. Chan, "Location privacy in mobile edge clouds: A chaff-based approach," IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp.2625-2636, 2017. DOI |
25 | M. Bi, Y. Wang, Z. Cai, and X. Tong, "A privacy-preserving mechanism based on local differential privacy in edge computing," China Communications, vol. 17, no. 9, pp. 50-65, 2020. DOI |
![]() |