JOURNAL ARTICLE

Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes

Zihou ZhangJiangtao LiYufeng LiYuanhang He

Year: 2024 Journal:   Sensors Vol: 24 (10)Pages: 2989-2989   Publisher: Multidisciplinary Digital Publishing Institute

Abstract

Edge computing provides higher computational power and lower transmission latency by offloading tasks to nearby edge nodes with available computational resources to meet the requirements of time-sensitive tasks and computationally complex tasks. Resource allocation schemes are essential to this process. To allocate resources effectively, it is necessary to attach metadata to a task to indicate what kind of resources are needed and how many computation resources are required. However, these metadata are sensitive and can be exposed to eavesdroppers, which can lead to privacy breaches. In addition, edge nodes are vulnerable to corruption because of their limited cybersecurity defenses. Attackers can easily obtain end-device privacy through unprotected metadata or corrupted edge nodes. To address this problem, we propose a metadata privacy resource allocation scheme that uses searchable encryption to protect metadata privacy and zero-knowledge proofs to resist semi-malicious edge nodes. We have formally proven that our proposed scheme satisfies the required security concepts and experimentally demonstrated the effectiveness of the scheme.

Keywords:
Metadata Computer science Edge computing Enhanced Data Rates for GSM Evolution Encryption Resource allocation Distributed computing Computer network Computer security World Wide Web

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
45
Refs
0.05
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Resource Allocation Techniques in Edge/Fog Computing

Darpan MajumderS. Mohan KumarD. V. AshokaA. Shajin Nargunam

Journal:   2021 International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT) Year: 2021 Pages: 1-5
BOOK-CHAPTER

Resource allocation models in/for edge computing

Mohammad Ali KhoshkholghiMichel Gokan KhanYogesh SharmaJavid Taheri

Institution of Engineering and Technology eBooks Year: 2020 Pages: 125-146
JOURNAL ARTICLE

Green resource allocation for mobile edge computing

Anqi MengGuandong WeiYao ZhaoXiaozheng GaoZhanxin Yang

Journal:   Digital Communications and Networks Year: 2022 Vol: 9 (5)Pages: 1190-1199
© 2026 ScienceGate Book Chapters — All rights reserved.