Abstract:
The cloud-based Internet-of-Things (IoT) has been applied to support ubiquitous data collection and centralized data processing among various applications. Equipped with ...Show MoreMetadata
Abstract:
The cloud-based Internet-of-Things (IoT) has been applied to support ubiquitous data collection and centralized data processing among various applications. Equipped with powerful resources, a semi-trusted cloud is able to deduce private information by launching inference attack. Homomorphic Encryption (HE) has been proposed as an effective way to preserve privacy from inference attack while allowing certain computation over ciphertext. However, HE leads to longer latency due to additional communication and computation overheads. In this paper, we propose an optimization framework in privacy-preserving access control under cloud-fog computing systems. The optimization goal is to maximize the average user satisfaction in the system, where cost and latency serve as key metrics measuring user satisfaction. Due to the NP-hardness of the formulated problem, we propose a low-complexity suboptimal algorithm to solve it, where the access offloading decision making, user cooperation, and resource allocation are considered. Simulation results are presented to show the advantages of our proposed algorithm in terms of the average USI (User Satisfaction Index) and the number of users with zero USI.
Date of Conference: 18 November 2020 - 16 December 2020
Date Added to IEEE Xplore: 15 February 2021
ISBN Information:
ISSN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Access Control ,
- Optimization Framework ,
- Cloud-fog Computing ,
- Privacy-preserving Access Control ,
- Simulation Results ,
- Resource Allocation ,
- Cloud Computing ,
- Encryption ,
- Data Privacy ,
- Additional Calculations ,
- Computational Overhead ,
- Power Resources ,
- User Satisfaction ,
- Communication Overhead ,
- Offloading Decision ,
- Inference Attacks ,
- Data Availability ,
- Computation Time ,
- Computational Resources ,
- User Data ,
- Fog Nodes ,
- Latency Constraints ,
- Cost Constraints ,
- Task Offloading ,
- Communication Resources ,
- Communication Cost ,
- Random Distribution ,
- Local Nodes ,
- Processing Tasks ,
- Resource Allocation Scheme
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Access Control ,
- Optimization Framework ,
- Cloud-fog Computing ,
- Privacy-preserving Access Control ,
- Simulation Results ,
- Resource Allocation ,
- Cloud Computing ,
- Encryption ,
- Data Privacy ,
- Additional Calculations ,
- Computational Overhead ,
- Power Resources ,
- User Satisfaction ,
- Communication Overhead ,
- Offloading Decision ,
- Inference Attacks ,
- Data Availability ,
- Computation Time ,
- Computational Resources ,
- User Data ,
- Fog Nodes ,
- Latency Constraints ,
- Cost Constraints ,
- Task Offloading ,
- Communication Resources ,
- Communication Cost ,
- Random Distribution ,
- Local Nodes ,
- Processing Tasks ,
- Resource Allocation Scheme
- Author Keywords