Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1840845.1840887acmconferencesArticle/Chapter ViewAbstractPublication PagesislpedConference Proceedingsconference-collections
poster

Tradeoff between energy savings and privacy protection in computation offloading

Published: 18 August 2010 Publication History
  • Get Citation Alerts
  • Abstract

    Offloading can save energy on mobile systems for computation-intensive applications. The mobile systems send programs and data to grid-powered servers where computation is performed. Offloading, however, causes privacy concerns because sensitive data may be sent to servers. This paper investigates how to protect privacy in computation offloading. We use steganography to hide data before sending them to servers. This paper evaluates the tradeoff between energy savings and privacy protection for content-based image retrieval with different steganographic techniques. We implement these methods on a PDA and compare their energy consumption, performance, and effectiveness of protecting privacy.

    References

    [1]
    Rong and Pedram. Extending the Lifetime of a Network of Battery-Powered Mobile Devices by Remote Processing: a Markovian Decision-Based Approach. In DAC, pages 906--911, 2003.
    [2]
    Li et al. Computation Offloading to Save Energy on Handheld Devices: a Partition Scheme. In CASES, pages 238--246, 2001.
    [3]
    Wolski et al. Using Bandwidth Data to Make Computation Offloading Decisions. In IEEE International Symposium on Parallel and Distributed Processing, pages 1--8, 2008.
    [4]
    Hong et al. Energy Efficient Content-Based Image Retrieval for Mobile Systems. In ISCAS, pages 1673--1676, 2009.
    [5]
    S. Pearson. Taking Account of Privacy When Designing Cloud Computing Services. In Workshop on Software Engineering Challenges of Cloud Computing, pages 44--52, 2009.
    [6]
    De Capitani di Vimercati et al. Preserving Confidentiality of Security Policies in Data Outsourcing. In ACM Workshop on Privacy in the Electronic Society, pages 75--84, 2008.
    [7]
    Chandramouli et al. Image Steganography and Steganalysis: Concepts and Practice. In Digital Watermarking, pages 35--49, 2004.
    [8]
    Wu and Tsai. A Steganographic Method for Images by Pixel-value Differencing. In Pattern Recognition Letters, pages 1613--1626, 2003.
    [9]
    Nguyen et al. Multi Bit Plane Image Steganography. In International Workshop on Digital Watermarking, pages 61--70, 2006.
    [10]
    W. Ella. Detecting Steganography on a Large Scale. In Crossroads, volume 15, pages 3--6, 2008.
    [11]
    Xian et al. Adaptive Computation Offloading for Energy Conservation on Battery-powered Systems. In ICPADS, pages 1--8, 2007.
    [12]
    Kumar et al. Ranking Servers Based on Energy Savings for Computation Offloading. In ISLPED, pages 267--272, 2009.
    [13]
    Datta et al. Image Retrieval: Ideas, Influences, and Trends of the New Age. In ACM Computing Surveys, pages 34--94, 2008.
    [14]
    Jacobs et al. Fast Multiresolution Image Querying. In International Conference on Computer Graphics and Interactive Techniques., pages 277--286, 1995.
    [15]
    Lu et al. Secure Image Retrieval through Feature Protection. In IEEE International Conference on Acoustics, Speech and Signal Processing, pages 1533--1536, 2009.
    [16]
    Morkel et al. An Overview of Image Steganography. In Annual Information Security South Africa Conference, pages 1--12, 2005.
    [17]
    Fridrich et al. Detecting LSB Steganography in Color and Gray-scale Images. In IEEE Multimedia, volume 8, pages 22--28, 2001.
    [18]
    Corel test set. Available online: http://wang.ist.psu.edu/ jwang/test1.tar.
    [19]
    Zhang et al. Steganography with Least Histogram Abnormality. In Computer Network Security, pages 395--406, 2003.

    Cited By

    View all
    • (2024)Deep Reinforcement Learning-Based Joint Optimization of Delay and Privacy in Multiple-User MEC SystemsPrivacy Preservation in Distributed Systems10.1007/978-3-031-58013-0_8(187-216)Online publication date: 31-May-2024
    • (2024)Learning-Based Joint Optimization of Energy-Delay and Privacy in Multiple-User Edge-Cloud Collaboration MEC SystemsPrivacy Preservation in Distributed Systems10.1007/978-3-031-58013-0_10(231-254)Online publication date: 8-Apr-2024
    • (2023)Deep Reinforcement Learning-Based Joint Optimization of Delay and Privacy in Multiple-User MEC SystemsIEEE Transactions on Cloud Computing10.1109/TCC.2022.314023111:2(1487-1499)Online publication date: 1-Apr-2023
    • Show More Cited By

    Index Terms

    1. Tradeoff between energy savings and privacy protection in computation offloading

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ISLPED '10: Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
        August 2010
        458 pages
        ISBN:9781450301466
        DOI:10.1145/1840845
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        In-Cooperation

        • IEEE CAS

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 18 August 2010

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. computation offloading
        2. energy saving
        3. image retrieval
        4. privacy protection
        5. steganography

        Qualifiers

        • Poster

        Conference

        ISLPED'10
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 398 of 1,159 submissions, 34%

        Upcoming Conference

        ISLPED '24

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)10
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Jul 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Deep Reinforcement Learning-Based Joint Optimization of Delay and Privacy in Multiple-User MEC SystemsPrivacy Preservation in Distributed Systems10.1007/978-3-031-58013-0_8(187-216)Online publication date: 31-May-2024
        • (2024)Learning-Based Joint Optimization of Energy-Delay and Privacy in Multiple-User Edge-Cloud Collaboration MEC SystemsPrivacy Preservation in Distributed Systems10.1007/978-3-031-58013-0_10(231-254)Online publication date: 8-Apr-2024
        • (2023)Deep Reinforcement Learning-Based Joint Optimization of Delay and Privacy in Multiple-User MEC SystemsIEEE Transactions on Cloud Computing10.1109/TCC.2022.314023111:2(1487-1499)Online publication date: 1-Apr-2023
        • (2023)Learning-Based Privacy-Aware Maritime IoT CommunicationsReinforcement Learning for Maritime Communications10.1007/978-3-031-32138-2_3(53-78)Online publication date: 13-Apr-2023
        • (2022)Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a surveyJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-022-00365-811:1Online publication date: 3-Dec-2022
        • (2022)Multi-Agent Reinforcement Learning Aided Computation Offloading in Aerial Computing for the Internet-of-ThingsIEEE Transactions on Services Computing10.1109/TSC.2022.3190562(1-12)Online publication date: 2022
        • (2022)Learning-Based Joint Optimization of Energy Delay and Privacy in Multiple-User Edge-Cloud Collaboration MEC SystemsIEEE Internet of Things Journal10.1109/JIOT.2021.30886079:2(1491-1502)Online publication date: 15-Jan-2022
        • (2022)A survey of privacy-preserving offloading methods in mobile-edge computingJournal of Network and Computer Applications10.1016/j.jnca.2022.103395203:COnline publication date: 1-Jul-2022
        • (2021)Deep reinforcement learning-based computation offloading and resource allocation in security-aware mobile edge computingWireless Networks10.1007/s11276-021-02643-wOnline publication date: 17-May-2021
        • (2020)Task Offloading in Trusted Execution Environment empowered Edge Computing2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS)10.1109/ICPADS51040.2020.00050(316-323)Online publication date: Dec-2020
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media