• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

¿µ¹® ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ¿µ¹® ³í¹®Áö > TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

TIIS (Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization
¿µ¹®Á¦¸ñ(English Title) A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization
ÀúÀÚ(Author) Shuai Zhang   Cai Y. Pei   Wen Y. Liu   Lu Chen   Hongbo Tang   Yu Zhao   Wei You   Kai Wang  
¿ø¹®¼ö·Ïó(Citation) VOL 16 NO. 8 PP. 2490 ~ 2506 (2022. 8)
Çѱ۳»¿ë
(Korean Abstract)
¿µ¹®³»¿ë
(English Abstract)
In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.
Å°¿öµå(Keyword) Real-time traffic data   Data flow model   Data model   deep learning   path topology   traffic flow   State discrimination algorithm   Mobile edge computing   Computing offloading   Usage pattern   Privacy protection   Lyapunov optimization  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå