Article
Mathematics
Xin Lu, Hongchen Guo
Summary: The traditional centralized power trading model is inefficient and lacks synchronized information, making it unsuitable for high-frequency and small-dollar distributed energy trading scenarios. To address these issues, we propose Trust-DETM, a model that utilizes a trusted execution environment to facilitate distributed energy trading. We introduce a reputation metric mechanism and a transaction matching algorithm based on this metric to accurately match transactions. We also propose a commitment scheme using smart contracts and the trusted execution environment to establish trust between producers and consumers. Experimental evaluations show that Trust-DETM achieves efficient trade matching and trusted execution in less running time compared to other distributed trading models.
Article
Computer Science, Theory & Methods
Peng Xu, Ruijie Sun, Wei Wang, Tianyang Chen, Yubo Zheng, Hai Jin
Summary: The FIDO2 protocol allows users to perform online authentication by setting a public key and proposes a lightweight trusted base for displaying transaction messages to ensure their correctness.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Engineering, Electrical & Electronic
Rong Chai, Mingzhu Li, Tiantian Yang, Qianbin Chen
Summary: This article explores the computation scheduling and offloading problem in mobile edge computing systems, proposing a parallel transmission and execution scheme to enhance task processing performance. By categorizing tasks into different priority levels and designing a dynamic priority-based computation scheduling and offloading algorithm, the maximum completion time of tasks is effectively reduced.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Telecommunications
Peyvand Teymoori, Arvin Hekmati, Terence D. Todd, Dongmei Zhao, George Karakostas
Summary: This paper discusses Preemptive Mobile Computation Offloading in the context of concurrent local execution, ensuring job deadlines are met by adapting to changing wireless channel conditions. An energy-optimal computation offloading algorithm, Optimal Preemptive Offloading (OPO), is formulated using Markovian decision process stopping theory, with three computationally efficient techniques introduced. The comparison of six algorithms shows tradeoffs between complexity and mobile energy saving performance.
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING
(2021)
Article
Biochemistry & Molecular Biology
Natnatee Dokmai, Can Kockan, Kaiyuan Zhu, XiaoFeng Wang, S. Cenk Sahinalp, Hyunghoon Cho
Summary: Genotype imputation is a crucial tool in genomics research, but privacy concerns hinder the utility of existing services. The authors introduce a secure hardware-based solution for privacy-preserving genotype imputation, achieving high accuracy and protection against known attacks. Their work represents a step towards privacy-preserving genomic analysis services.
Article
Computer Science, Information Systems
Jinsoo Jang, Brent Byunghoon Kang
Summary: Advancements in IoT have led to the deployment of numerous smart devices, attracting more attackers. A trusted execution environment (TEE) using TrustZone technology protects critical operations and sensitive data, but limited access hinders third-party adoption. Our proposed 3rdParTEE allows third-party IoT service providers to run trusted services, minimizing dependency on TEE maintainers, with only a 7% performance overhead observed during testing.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Xuewen Xia, Huixian Qiu, Xing Xu, Yinglong Zhang
Summary: In this paper, a multi-objective genetic algorithm (MOGA) is proposed and applied to optimize workflow scheduling problems under the cloud computing environment. An initialization scheduling sequence scheme is introduced to enhance search efficiency, and the longest common subsequence (LCS) is integrated into the genetic algorithm (GA) to achieve a balance between exploration and exploitation. Experimental results demonstrate that the proposed GALCS algorithm outperforms ordinary GA and other state-of-the-art algorithms in finding a better Pareto front.
INFORMATION SCIENCES
(2022)
Article
Engineering, Electrical & Electronic
Jinglei Li, Ying Shang, Meng Qin, Qinghai Yang, Nan Cheng, Wen Gao, Kyung Sup Kwak
Summary: This paper investigates a multiobjective task scheduling problem in MEC-aided 6G network and proposes an improved multiobjective cuckoo search (IMOCS) algorithm to address the problem. The algorithm uses an external archive to record nondominated solutions and improves the quality of solutions through fast nondominated sorting and crowding distance sorting. Simulation results demonstrate that the IMOCS algorithm outperforms four benchmark algorithms.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Computer Science, Information Systems
Yonghun Choi, Seonghoon Park, Seunghyeok Jeon, Rhan Ha, Hojung Cha
Summary: This paper proposes a scheme called SEGA to improve the energy efficiency of game applications on mobile devices. It reduces the energy consumption of smartphones and has a small impact on the quality of service.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Yubin Xia, Zhichao Hua, Yang Yu, Jinyu Gu, Haibo Chen, Binyu Zang, Haibing Guan
Summary: This article proposes a new design of TEEs to support system-level security services and achieve better extensibility. The design introduces a secure monitor for isolation and capability management, with each TEE instance named a Colony. Several security services are built using the new TEEs, and the system's efficiency is evaluated on different platforms and systems.
IEEE TRANSACTIONS ON COMPUTERS
(2022)
Article
Computer Science, Information Systems
Dalton Cezane Gomes Valadares, Alvaro Alvares de Carvalho Cesar Sobrinho, Angelo Perkusich, Kyller Costa Gorgonio
Summary: IoT scenarios often face security and privacy concerns, requiring the use of security technologies to protect data and reduce user distrust in external entities. This article proposes a trusted IoT architecture solution based on trusted execution environments and authentication, authorization, and encryption mechanisms, with simulations and model checking to test key security properties.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Prithi Samuel, Arumugham Vinothini, Jayashree Kanniappan
Summary: The increasing number of IoT devices presents challenges for communication. Traditional cloud computing model is not efficient for IoT tasks due to latency. This study proposes using mobile edge computing and fog concept to process IoT tasks independently. The POA-A1DCNN-LSTM algorithm is utilized to optimize energy consumption and task delay, improving the total utility of MEC servers.
COMPUTER COMMUNICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Rama Rani, Ritu Garg
Summary: The rapid growth of cloud data centers has led to significant energy consumption concerns for cloud service providers. The increasing demand for scientific workflow applications poses challenges for efficient workflow scheduling. The PBMO-DALO algorithm addresses the conflicting objectives of minimizing makespan and energy consumption in cloud data centers, outperforming other competing algorithms with better trade-off solutions.
APPLIED SOFT COMPUTING
(2021)
Article
Computer Science, Artificial Intelligence
Yumei Li, Xiumin Zhu, Shudian Song, Shuyue Ma, Feng Yang, Linbo Zhai
Summary: This paper studies the task offloading and parameters optimization of mobile augmented reality (MAR) applied to mobile devices in mobile edge computing. A server selection and parameters optimization (SSPO) algorithm is proposed to realize client task offloading and parameters optimization. Simulation results show that the proposed algorithm is better than the comparison algorithm.
EXPERT SYSTEMS WITH APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Hyunyoung Oh, Kevin Nam, Seongil Jeon, Yeongpil Cho, Yunheung Paek
Summary: Remote computing is an efficient computing model, but vulnerable to insider threats. MeetGo is a novel hardware solution that provides secure remote computing services independently, ensuring secure transactions and operations for applications like cryptocurrency wallets and GPGPUs.