Study on Delay Optimization of Fog Computing Edge Nodes Based on the CPSO-LB Algorithm

Author:

Wu J. Y.1ORCID,Xin R.1,Zhao J. B.2,Zheng T.1,Jiang D.1,Zhang P. F.1

Affiliation:

1. State Grid Hebei Information and Telecommunication Branch, Shijiazhuang 050021, China

2. State Grid Hebei Electric Power Co. Ltd., Shijiazhuang 050021, China

Abstract

With the development of modern science and technology as well as the steady advancement of urbanization, intelligent networks have emerged and are replacing traditional networks with the identity of next-generation networks. And information security is one of the most important research directions in the intelligent network construction. In order to resist the threat of privacy leakage during the data transmission of intelligent terminal, an original four-layer fog computing system which is suitable for intelligent network data collection, transmission, and processing structure is established in the paper. With the help of the Paillier algorithm for encryption and fine-grained aggregation, the fine-grained aggregated data as coefficients are embed in the cloud node, and Horner’s rule is conformed for unary polynomials, which further aggregates to reduce the amount of transmitted data, so that communication overhead is reduced as well. Meanwhile, the resolvability of Horner’s rules allows EPSI to finally obtain the subregional information plain text, and it is summed up to obtain cloud-level information data. Therefore, the comparative analysis of simulation experiments with other algorithms proves that the rational optimization of the research content in this paper plays a higher security role.

Publisher

Hindawi Limited

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems

Reference29 articles.

1. Efficient authentication key agreement protocol for mobile internet based on identity;Z. Wang;Journal of Communications,2017

2. An improved certificateless two-party authentication key agreement protocol;Y. W. Zhou;Chinese Journal of Computers,2017

3. A privacy-protected multi-level user power aggregation control scheme for smart grids;H. Shen;Journal of Cryptography,2016

4. A novel secure data transmission scheme in industrial internet of things;H. W. Hui;China Communications,2020

5. Layered adaptive compression design for efficient data collection in industrial wireless sensor networks

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Processing Delay Optimization for Data Intensive Applications for Fog/Cloud Computing Using Double Reinforcement Learning;2023 IEEE Fifth International Conference on Advances in Electronics, Computers and Communications (ICAECC);2023-09-07

2. Automatic Generation of Distribution Network Operation Data Report and Application of Data Mining;The 2021 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy;2021-10-28

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3