A joint privacy protection algorithm for edge computing task offloading based on Dempster–Shafer evidence theory

Edge computing reduces system latency by offloading tasks from cloud servers to Internet of Things (IoT) devices. This architecture decreases network congestion, improves system efficiency, and enables real-time processing. However, in consideration of resource efficiency, user devices tend to selec...

Full description

Saved in:
Bibliographic Details
Published inPhysical communication Vol. 72; p. 102813
Main Authors Chen, Tian, Hao, Wanming, Yang, Wencong, Yang, Shouyi, Sun, Xuandi, Tang, Zhiqing
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.10.2025
Subjects
Online AccessGet full text
ISSN1874-4907
DOI10.1016/j.phycom.2025.102813

Cover

Abstract Edge computing reduces system latency by offloading tasks from cloud servers to Internet of Things (IoT) devices. This architecture decreases network congestion, improves system efficiency, and enables real-time processing. However, in consideration of resource efficiency, user devices tend to select the nearest cloud servers, which may enable potential malicious eavesdropping devices to infer user location through intercepted communication information. Existing research has used privacy entropy to measure user location privacy, and assigned different privacy entropy values to various types of cloud servers. However, user privacy protection in real-world scenarios depends on multiple factors, not just the classification of edge cloud servers. To solve this problem, we propose a joint privacy protection algorithm (JPPA), which introduces a novel metric for user location privacy guarantee called belief, this metric combines two key factors: task caching status and the geographical location of edge cloud servers. We formulate the problem as a constrained Markov decision process (CMDP), aiming to minimize the average network traffic subject to constraints on belief levels and energy outage probability. By transforming the CMDP into a linear programming problem, computational feasibility is ensured. Simulation results demonstrate that compared to traditional privacy entropy-constrained methods, JPPA reduces average network traffic overhead more effectively while ensuring user location privacy.
AbstractList Edge computing reduces system latency by offloading tasks from cloud servers to Internet of Things (IoT) devices. This architecture decreases network congestion, improves system efficiency, and enables real-time processing. However, in consideration of resource efficiency, user devices tend to select the nearest cloud servers, which may enable potential malicious eavesdropping devices to infer user location through intercepted communication information. Existing research has used privacy entropy to measure user location privacy, and assigned different privacy entropy values to various types of cloud servers. However, user privacy protection in real-world scenarios depends on multiple factors, not just the classification of edge cloud servers. To solve this problem, we propose a joint privacy protection algorithm (JPPA), which introduces a novel metric for user location privacy guarantee called belief, this metric combines two key factors: task caching status and the geographical location of edge cloud servers. We formulate the problem as a constrained Markov decision process (CMDP), aiming to minimize the average network traffic subject to constraints on belief levels and energy outage probability. By transforming the CMDP into a linear programming problem, computational feasibility is ensured. Simulation results demonstrate that compared to traditional privacy entropy-constrained methods, JPPA reduces average network traffic overhead more effectively while ensuring user location privacy.
ArticleNumber 102813
Author Hao, Wanming
Yang, Wencong
Yang, Shouyi
Chen, Tian
Sun, Xuandi
Tang, Zhiqing
Author_xml – sequence: 1
  givenname: Tian
  surname: Chen
  fullname: Chen, Tian
  email: tianchen@gs.zzu.edu.cn
  organization: School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou, 450001, Henan, China
– sequence: 2
  givenname: Wanming
  orcidid: 0000-0002-4465-3447
  surname: Hao
  fullname: Hao, Wanming
  email: iewmhao@zzu.edu.cn
  organization: School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou, 450001, Henan, China
– sequence: 3
  givenname: Wencong
  surname: Yang
  fullname: Yang, Wencong
  email: yangwencong@gs.zzu.edu.cn
  organization: School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou, 450001, Henan, China
– sequence: 4
  givenname: Shouyi
  orcidid: 0000-0002-5149-5280
  surname: Yang
  fullname: Yang, Shouyi
  email: iesyyang@zzu.edu.cn
  organization: School of Electrical and Information Engineering, Zhengzhou University, Zhengzhou, 450001, Henan, China
– sequence: 5
  givenname: Xuandi
  surname: Sun
  fullname: Sun, Xuandi
  email: xuandisun@mail.nwpu.edu.cn
  organization: School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou, 450002, Henan, China
– sequence: 6
  givenname: Zhiqing
  surname: Tang
  fullname: Tang, Zhiqing
  email: iezqtang@zzu.edu.cn
  organization: School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou, 450002, Henan, China
BookMark eNp9kE1OwzAQhb0oEgV6Axa-QIodO38bpKr8SpVY0L3lOuPGoYkj21TKjjtwQ06Co7BmNk8z0nt6812hRW97QOiWkjUlNL9r10MzKtutU5Jm8ZSWlC3QkpYFT3hFiku08r4l0xQk5XyJ3Aa31vQBD86cpRqj2gAqGNtjeTpaZ0LTYW0dhvoIOGYPn8H0Rxyk_8BW65OV9bQfpIcaR9cDdIMP4H6-vt8bqSE6z6aGXgEODVg33qALLU8eVn96jfZPj_vtS7J7e37dbnaJSrMiJKwELZmqeJEzljGdU62qVFEu2YGXOa0YK0meFSyFA0hZ1TmDUinIgGecV-wa8TlWOeu9Ay3ii510o6BETLREK2ZaYqIlZlrRdj_bIFY7G3DCKzO1r42LXERtzf8Bv2pZe8o
Cites_doi 10.1109/ACCESS.2020.2991734
10.1109/TWC.2019.2958091
10.1109/IC_ASET49463.2020.9318269
10.1109/JSAC.2024.3459037
10.1109/TMC.2023.3239339
10.1109/MCOM.2016.7537180
10.1109/ICECCE.2014.7086627
10.1109/ACCESS.2019.2947306
10.1109/JIOT.2020.3039359
10.1109/ACCESS.2022.3224032
10.1109/JIOT.2016.2579198
10.1109/JIOT.2018.2878718
10.1109/JIOT.2018.2875241
10.1109/TNSM.2024.3355967
10.1109/TIFS.2025.3570202
10.1109/TIT.2008.921908
10.1109/JIOT.2023.3239944
10.1109/TNSM.2020.3010967
10.1109/JIOT.2019.2944007
10.1109/JSAC.2023.3240707
10.1109/ACCESS.2020.2970118
10.1109/JIOT.2019.2948888
10.1109/MCOM.2015.7321985
10.1109/COMST.2020.2973314
10.1109/TCC.2020.3030817
10.1109/TITS.2020.2995622
10.1109/ICC51166.2024.10622651
10.1109/JIOT.2018.2805263
10.1109/ICC.2019.8761370
10.1109/GLOCOM.2017.8253985
10.1109/TMC.2023.3298888
ContentType Journal Article
Copyright 2025 Elsevier B.V.
Copyright_xml – notice: 2025 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.phycom.2025.102813
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
ExternalDocumentID 10_1016_j_phycom_2025_102813
S1874490725002162
GrantInformation_xml – fundername: Major Science and Technology Special Project of Henan Province, China
  grantid: 24111020100
GroupedDBID --K
--M
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
5VS
7-5
71M
8P~
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
ABBOA
ABFRF
ABJNI
ABMAC
ABWVN
ABXDB
ACDAQ
ACGFO
ACGFS
ACLOT
ACNNM
ACRLP
ACRPL
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADMUD
ADNMO
AEBSH
AEFWE
AEIPS
AEKER
AEUPX
AFJKZ
AFPUW
AFTJW
AGHFR
AGUBO
AGYEJ
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APXCP
AXJTR
BKOJK
BLXMC
CS3
EBS
EFJIC
EFKBS
EFLBG
EJD
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
HVGLF
HZ~
J1W
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
SDF
SDG
SES
SPC
SPCBC
SSV
SSZ
T5K
UNMZH
~G-
~HD
AAYXX
CITATION
ID FETCH-LOGICAL-c257t-38efa3c94763353f61fc92c14a3b48619338065732ebeaa9d63e8cce5e454493
IEDL.DBID .~1
ISSN 1874-4907
IngestDate Wed Oct 01 05:16:52 EDT 2025
Sun Oct 19 01:36:35 EDT 2025
IsPeerReviewed true
IsScholarly true
Keywords Privacy
Internet of things
Evidence theory
Edge computing
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c257t-38efa3c94763353f61fc92c14a3b48619338065732ebeaa9d63e8cce5e454493
ORCID 0000-0002-5149-5280
0000-0002-4465-3447
ParticipantIDs crossref_primary_10_1016_j_phycom_2025_102813
elsevier_sciencedirect_doi_10_1016_j_phycom_2025_102813
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate October 2025
2025-10-00
PublicationDateYYYYMMDD 2025-10-01
PublicationDate_xml – month: 10
  year: 2025
  text: October 2025
PublicationDecade 2020
PublicationTitle Physical communication
PublicationYear 2025
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Cao, Liu, Meng, Sun (b9) 2020; 8
He, Jin, Dai (b16) 2020; 19
Wang, Du, Liu, Sun, Niyato, Mao, In Kim, Shen (b19) 2025; 20
J. S., Literature review: Dynamic resource allocation mechanism in cloud computing environment, in: 2014 International Conference on Electronics, Communication and Computational Engineering, ICECCE, 2014, pp. 279–281.
X. He, J. Liu, R. Jin, H. Dai, Privacy-Aware Offloading in Mobile-Edge Computing, in: GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017, pp. 1–6.
Wu, Shen, Huang, Cao, Du (b24) 2019; 7
Li, Sun, Duan, Wu (b23) 2024; 23
Shi, Cao, Zhang, Li, Xu (b8) 2016; 3
Zhang, Du, Liu, Niyato, Kang, Xiong, Jamalipour, In Kim (b22) 2024; 42
Zhang, Xiong, Lu, Fan, Ng, Letaief (b21) 2023; 41
Hou, Gregory, Li (b11) 2022; 10
Dempster (b31) 2008
Chettri, Bera (b1) 2020; 7
Zhang, An, Zhang, Zhang, Dong, Jiang (b29) 2024; 21
Wu, Shi, Ni, Qian, Zhu, Shi, Meng (b15) 2019; 6
Xu, He, Xu, Qi, Wan, Bhuiyan (b14) 2020; 7
Y. Zhu, Y. Dai, J. Wang, J. Wang, S. Zhao, Optimal Power Allocation for Location Privacy Security in Wireless Localization, in: ICC 2024 - IEEE International Conference on Communications, 2024, pp. 1214–1218.
Xie, He, Guo, Wang, Zhang, Zhang, Xiang (b20) 2025
Xu, Wu, Qi, Dou, Tsai, Bhuiyan (b30) 2021; 22
Zhang, Tao (b3) 2021; 8
Nguyen, Pathirana, Ding, Seneviratne (b18) 2020; 17
Sun, Sun, Liu, Wang, Cao (b12) 2024; 23
Y. Wang, Z. Tian, S. Su, Y. Sun, C. Zhu, Preserving Location Privacy in Mobile Edge Computing, in: ICC 2019 - 2019 IEEE International Conference on Communications, ICC, 2019, pp. 1–6.
Zheng, Cai, Shen, Zheng, Yang (b34) 2015; 53
Premsankar, Di Francesco, Taleb (b7) 2018; 5
He, Jin, Dai (b26) 2019; 6
Qadri, Nauman, Zikria, Vasilakos, Kim (b2) 2020; 22
Bloch, Barros, Rodrigues, McLaughlin (b25) 2008; 54
Wang, Peng, Zhang, Letaief (b33) 2016; 54
Zheng, Cai, Shen, Zheng, Yang (b32) 2015; 53
Ko, Lee, Kim, Pack (b28) 2022; 10
Shafique, Khawaja, Sabir, Qazi, Mustaqim (b4) 2020; 8
A.-E. Bouaouad, A. Cherradi, S. Assoul, N. Souissi, Architectures and emerging trends in Internet of Things and Cloud computing: a literature review, in: 2020 4th International Conference on Advanced Systems and Emergent Technologies, IC_ASET, 2020, pp. 147–151.
Lu, Lu, An, Wang, He (b10) 2023; 10
Premsankar (10.1016/j.phycom.2025.102813_b7) 2018; 5
Lu (10.1016/j.phycom.2025.102813_b10) 2023; 10
Chettri (10.1016/j.phycom.2025.102813_b1) 2020; 7
Zhang (10.1016/j.phycom.2025.102813_b22) 2024; 42
Xie (10.1016/j.phycom.2025.102813_b20) 2025
Zhang (10.1016/j.phycom.2025.102813_b21) 2023; 41
He (10.1016/j.phycom.2025.102813_b16) 2020; 19
Qadri (10.1016/j.phycom.2025.102813_b2) 2020; 22
Wang (10.1016/j.phycom.2025.102813_b19) 2025; 20
Zhang (10.1016/j.phycom.2025.102813_b29) 2024; 21
10.1016/j.phycom.2025.102813_b13
He (10.1016/j.phycom.2025.102813_b26) 2019; 6
10.1016/j.phycom.2025.102813_b17
Xu (10.1016/j.phycom.2025.102813_b14) 2020; 7
Zhang (10.1016/j.phycom.2025.102813_b3) 2021; 8
Dempster (10.1016/j.phycom.2025.102813_b31) 2008
Xu (10.1016/j.phycom.2025.102813_b30) 2021; 22
Shi (10.1016/j.phycom.2025.102813_b8) 2016; 3
Bloch (10.1016/j.phycom.2025.102813_b25) 2008; 54
Nguyen (10.1016/j.phycom.2025.102813_b18) 2020; 17
Wang (10.1016/j.phycom.2025.102813_b33) 2016; 54
Ko (10.1016/j.phycom.2025.102813_b28) 2022; 10
Sun (10.1016/j.phycom.2025.102813_b12) 2024; 23
Cao (10.1016/j.phycom.2025.102813_b9) 2020; 8
Zheng (10.1016/j.phycom.2025.102813_b34) 2015; 53
Shafique (10.1016/j.phycom.2025.102813_b4) 2020; 8
10.1016/j.phycom.2025.102813_b27
Wu (10.1016/j.phycom.2025.102813_b15) 2019; 6
Wu (10.1016/j.phycom.2025.102813_b24) 2019; 7
Li (10.1016/j.phycom.2025.102813_b23) 2024; 23
Hou (10.1016/j.phycom.2025.102813_b11) 2022; 10
Zheng (10.1016/j.phycom.2025.102813_b32) 2015; 53
10.1016/j.phycom.2025.102813_b6
10.1016/j.phycom.2025.102813_b5
References_xml – volume: 21
  start-page: 3598
  year: 2024
  end-page: 3608
  ident: b29
  article-title: Novel privacy awareness task offloading approach based on privacy entropy
  publication-title: IEEE Trans. Netw. Serv. Manag.
– volume: 53
  start-page: 150
  year: 2015
  end-page: 157
  ident: b32
  article-title: Green energy optimization in energy harvesting wireless sensor networks
  publication-title: Commun. Mag. IEEE
– volume: 7
  start-page: 150105
  year: 2019
  end-page: 150119
  ident: b24
  article-title: A trust-aware task offloading framework in mobile edge computing
  publication-title: IEEE Access
– volume: 20
  start-page: 5195
  year: 2025
  end-page: 5210
  ident: b19
  article-title: Generative AI based secure wireless sensing for ISAC networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 22
  start-page: 1121
  year: 2020
  end-page: 1167
  ident: b2
  article-title: The future of healthcare internet of things: A survey of emerging technologies
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 17
  start-page: 2536
  year: 2020
  end-page: 2549
  ident: b18
  article-title: Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning
  publication-title: IEEE Trans. Netw. Serv. Manag.
– volume: 7
  start-page: 2622
  year: 2020
  end-page: 2629
  ident: b14
  article-title: Joint optimization of offloading utility and privacy for edge computing enabled IoT
  publication-title: IEEE Internet Things J.
– volume: 42
  start-page: 3581
  year: 2024
  end-page: 3596
  ident: b22
  article-title: Generative AI agents with large language model for satellite networks via a mixture of experts transmission
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 54
  start-page: 77
  year: 2016
  end-page: 83
  ident: b33
  article-title: Mobility-aware caching for content-centric wireless networks: modeling and methodology
  publication-title: IEEE Commun. Mag.
– volume: 10
  start-page: 123436
  year: 2022
  end-page: 123451
  ident: b11
  article-title: A survey of multi-access edge computing and vehicular networking
  publication-title: IEEE Access
– volume: 19
  start-page: 1814
  year: 2020
  end-page: 1824
  ident: b16
  article-title: Peace: Privacy-preserving and cost-efficient task offloading for mobile-edge computing
  publication-title: IEEE Trans. Wirel. Commun.
– volume: 6
  start-page: 4201
  year: 2019
  end-page: 4213
  ident: b15
  article-title: Secrecy-based delay-aware computation offloading via mobile edge computing for internet of things
  publication-title: IEEE Internet Things J.
– reference: Y. Zhu, Y. Dai, J. Wang, J. Wang, S. Zhao, Optimal Power Allocation for Location Privacy Security in Wireless Localization, in: ICC 2024 - IEEE International Conference on Communications, 2024, pp. 1214–1218.
– reference: J. S., Literature review: Dynamic resource allocation mechanism in cloud computing environment, in: 2014 International Conference on Electronics, Communication and Computational Engineering, ICECCE, 2014, pp. 279–281.
– volume: 5
  start-page: 1275
  year: 2018
  end-page: 1284
  ident: b7
  article-title: Edge computing for the internet of things: A case study
  publication-title: IEEE Internet Things J.
– volume: 6
  start-page: 4547
  year: 2019
  end-page: 4555
  ident: b26
  article-title: Deep PDS-learning for privacy-aware offloading in MEC-enabled IoT
  publication-title: IEEE Internet Things J.
– reference: Y. Wang, Z. Tian, S. Su, Y. Sun, C. Zhu, Preserving Location Privacy in Mobile Edge Computing, in: ICC 2019 - 2019 IEEE International Conference on Communications, ICC, 2019, pp. 1–6.
– reference: A.-E. Bouaouad, A. Cherradi, S. Assoul, N. Souissi, Architectures and emerging trends in Internet of Things and Cloud computing: a literature review, in: 2020 4th International Conference on Advanced Systems and Emergent Technologies, IC_ASET, 2020, pp. 147–151.
– volume: 54
  start-page: 2515
  year: 2008
  end-page: 2534
  ident: b25
  article-title: Wireless information-theoretic security
  publication-title: IEEE Trans. Inform. Theory
– volume: 7
  start-page: 16
  year: 2020
  end-page: 32
  ident: b1
  article-title: A comprehensive survey on internet of things (IoT) toward 5G wireless systems
  publication-title: IEEE Internet Things J.
– volume: 3
  start-page: 637
  year: 2016
  end-page: 646
  ident: b8
  article-title: Edge computing: Vision and challenges
  publication-title: IEEE Internet Things J.
– volume: 41
  start-page: 1413
  year: 2023
  end-page: 1430
  ident: b21
  article-title: Energy efficiency maximization in RIS-assisted SWIPT networks with RSMA: A PPO-based approach
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 10
  start-page: 11093
  year: 2023
  end-page: 11116
  ident: b10
  article-title: Edge computing on IoT for machine signal processing and fault diagnosis: A review
  publication-title: IEEE Internet Things J.
– volume: 23
  start-page: 4890
  year: 2024
  end-page: 4907
  ident: b23
  article-title: Multi-objective optimization for UAV swarm-assisted IoT with virtual antenna arrays
  publication-title: IEEE Trans. Mob. Comput.
– volume: 10
  start-page: 2729
  year: 2022
  end-page: 2738
  ident: b28
  article-title: LPGA: Location privacy-guaranteed offloading algorithm in cache-enabled edge clouds
  publication-title: IEEE Trans. Cloud Comput.
– start-page: 57
  year: 2008
  end-page: 72
  ident: b31
  article-title: Upper and lower probabilities induced by a multivalued mapping
  publication-title: Classic Works of the Dempster-Shafer Theory of Belief Functions
– volume: 8
  start-page: 85714
  year: 2020
  end-page: 85728
  ident: b9
  article-title: An overview on edge computing research
  publication-title: IEEE Access
– volume: 23
  start-page: 1655
  year: 2024
  end-page: 1673
  ident: b12
  article-title: BARGAIN-MATCH: A game theoretical approach for resource allocation and task offloading in vehicular edge computing networks
  publication-title: IEEE Trans. Mob. Comput.
– year: 2025
  ident: b20
  article-title: Disrupting vision-language model-driven navigation services via adversarial object fusion
– volume: 8
  start-page: 23022
  year: 2020
  end-page: 23040
  ident: b4
  article-title: Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios
  publication-title: IEEE Access
– volume: 8
  start-page: 7789
  year: 2021
  end-page: 7817
  ident: b3
  article-title: Empowering things with intelligence: A survey of the progress, challenges, and opportunities in artificial intelligence of things
  publication-title: IEEE Internet Things J.
– reference: X. He, J. Liu, R. Jin, H. Dai, Privacy-Aware Offloading in Mobile-Edge Computing, in: GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 2017, pp. 1–6.
– volume: 22
  start-page: 1787
  year: 2021
  end-page: 1796
  ident: b30
  article-title: Trust-aware service offloading for video surveillance in edge computing enabled internet of vehicles
  publication-title: IEEE Trans. Intell. Transp. Syst.
– volume: 53
  start-page: 150
  year: 2015
  end-page: 157
  ident: b34
  article-title: Green energy optimization in energy harvesting wireless sensor networks
  publication-title: IEEE Commun. Mag.
– year: 2025
  ident: 10.1016/j.phycom.2025.102813_b20
– volume: 8
  start-page: 85714
  year: 2020
  ident: 10.1016/j.phycom.2025.102813_b9
  article-title: An overview on edge computing research
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2991734
– volume: 19
  start-page: 1814
  issue: 3
  year: 2020
  ident: 10.1016/j.phycom.2025.102813_b16
  article-title: Peace: Privacy-preserving and cost-efficient task offloading for mobile-edge computing
  publication-title: IEEE Trans. Wirel. Commun.
  doi: 10.1109/TWC.2019.2958091
– ident: 10.1016/j.phycom.2025.102813_b5
  doi: 10.1109/IC_ASET49463.2020.9318269
– volume: 42
  start-page: 3581
  issue: 12
  year: 2024
  ident: 10.1016/j.phycom.2025.102813_b22
  article-title: Generative AI agents with large language model for satellite networks via a mixture of experts transmission
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2024.3459037
– volume: 23
  start-page: 1655
  issue: 2
  year: 2024
  ident: 10.1016/j.phycom.2025.102813_b12
  article-title: BARGAIN-MATCH: A game theoretical approach for resource allocation and task offloading in vehicular edge computing networks
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2023.3239339
– volume: 54
  start-page: 77
  issue: 8
  year: 2016
  ident: 10.1016/j.phycom.2025.102813_b33
  article-title: Mobility-aware caching for content-centric wireless networks: modeling and methodology
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2016.7537180
– ident: 10.1016/j.phycom.2025.102813_b6
  doi: 10.1109/ICECCE.2014.7086627
– volume: 7
  start-page: 150105
  year: 2019
  ident: 10.1016/j.phycom.2025.102813_b24
  article-title: A trust-aware task offloading framework in mobile edge computing
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2947306
– volume: 8
  start-page: 7789
  issue: 10
  year: 2021
  ident: 10.1016/j.phycom.2025.102813_b3
  article-title: Empowering things with intelligence: A survey of the progress, challenges, and opportunities in artificial intelligence of things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3039359
– volume: 10
  start-page: 123436
  year: 2022
  ident: 10.1016/j.phycom.2025.102813_b11
  article-title: A survey of multi-access edge computing and vehicular networking
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3224032
– volume: 3
  start-page: 637
  issue: 5
  year: 2016
  ident: 10.1016/j.phycom.2025.102813_b8
  article-title: Edge computing: Vision and challenges
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2016.2579198
– volume: 6
  start-page: 4547
  issue: 3
  year: 2019
  ident: 10.1016/j.phycom.2025.102813_b26
  article-title: Deep PDS-learning for privacy-aware offloading in MEC-enabled IoT
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2878718
– volume: 6
  start-page: 4201
  issue: 3
  year: 2019
  ident: 10.1016/j.phycom.2025.102813_b15
  article-title: Secrecy-based delay-aware computation offloading via mobile edge computing for internet of things
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2875241
– volume: 21
  start-page: 3598
  issue: 3
  year: 2024
  ident: 10.1016/j.phycom.2025.102813_b29
  article-title: Novel privacy awareness task offloading approach based on privacy entropy
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2024.3355967
– volume: 20
  start-page: 5195
  year: 2025
  ident: 10.1016/j.phycom.2025.102813_b19
  article-title: Generative AI based secure wireless sensing for ISAC networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2025.3570202
– volume: 54
  start-page: 2515
  issue: 6
  year: 2008
  ident: 10.1016/j.phycom.2025.102813_b25
  article-title: Wireless information-theoretic security
  publication-title: IEEE Trans. Inform. Theory
  doi: 10.1109/TIT.2008.921908
– volume: 10
  start-page: 11093
  issue: 13
  year: 2023
  ident: 10.1016/j.phycom.2025.102813_b10
  article-title: Edge computing on IoT for machine signal processing and fault diagnosis: A review
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2023.3239944
– volume: 17
  start-page: 2536
  issue: 4
  year: 2020
  ident: 10.1016/j.phycom.2025.102813_b18
  article-title: Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2020.3010967
– volume: 7
  start-page: 2622
  issue: 4
  year: 2020
  ident: 10.1016/j.phycom.2025.102813_b14
  article-title: Joint optimization of offloading utility and privacy for edge computing enabled IoT
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2944007
– volume: 41
  start-page: 1413
  issue: 5
  year: 2023
  ident: 10.1016/j.phycom.2025.102813_b21
  article-title: Energy efficiency maximization in RIS-assisted SWIPT networks with RSMA: A PPO-based approach
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2023.3240707
– volume: 8
  start-page: 23022
  year: 2020
  ident: 10.1016/j.phycom.2025.102813_b4
  article-title: Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2970118
– volume: 7
  start-page: 16
  issue: 1
  year: 2020
  ident: 10.1016/j.phycom.2025.102813_b1
  article-title: A comprehensive survey on internet of things (IoT) toward 5G wireless systems
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2019.2948888
– volume: 53
  start-page: 150
  issue: 11
  year: 2015
  ident: 10.1016/j.phycom.2025.102813_b34
  article-title: Green energy optimization in energy harvesting wireless sensor networks
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2015.7321985
– volume: 22
  start-page: 1121
  issue: 2
  year: 2020
  ident: 10.1016/j.phycom.2025.102813_b2
  article-title: The future of healthcare internet of things: A survey of emerging technologies
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2020.2973314
– volume: 53
  start-page: 150
  issue: 11
  year: 2015
  ident: 10.1016/j.phycom.2025.102813_b32
  article-title: Green energy optimization in energy harvesting wireless sensor networks
  publication-title: Commun. Mag. IEEE
  doi: 10.1109/MCOM.2015.7321985
– volume: 10
  start-page: 2729
  issue: 4
  year: 2022
  ident: 10.1016/j.phycom.2025.102813_b28
  article-title: LPGA: Location privacy-guaranteed offloading algorithm in cache-enabled edge clouds
  publication-title: IEEE Trans. Cloud Comput.
  doi: 10.1109/TCC.2020.3030817
– volume: 22
  start-page: 1787
  issue: 3
  year: 2021
  ident: 10.1016/j.phycom.2025.102813_b30
  article-title: Trust-aware service offloading for video surveillance in edge computing enabled internet of vehicles
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2020.2995622
– ident: 10.1016/j.phycom.2025.102813_b27
  doi: 10.1109/ICC51166.2024.10622651
– volume: 5
  start-page: 1275
  issue: 2
  year: 2018
  ident: 10.1016/j.phycom.2025.102813_b7
  article-title: Edge computing for the internet of things: A case study
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2805263
– ident: 10.1016/j.phycom.2025.102813_b17
  doi: 10.1109/ICC.2019.8761370
– start-page: 57
  year: 2008
  ident: 10.1016/j.phycom.2025.102813_b31
  article-title: Upper and lower probabilities induced by a multivalued mapping
– ident: 10.1016/j.phycom.2025.102813_b13
  doi: 10.1109/GLOCOM.2017.8253985
– volume: 23
  start-page: 4890
  issue: 5
  year: 2024
  ident: 10.1016/j.phycom.2025.102813_b23
  article-title: Multi-objective optimization for UAV swarm-assisted IoT with virtual antenna arrays
  publication-title: IEEE Trans. Mob. Comput.
  doi: 10.1109/TMC.2023.3298888
SSID ssj0000070244
Score 2.3596087
Snippet Edge computing reduces system latency by offloading tasks from cloud servers to Internet of Things (IoT) devices. This architecture decreases network...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 102813
SubjectTerms Edge computing
Evidence theory
Internet of things
Privacy
Title A joint privacy protection algorithm for edge computing task offloading based on Dempster–Shafer evidence theory
URI https://dx.doi.org/10.1016/j.phycom.2025.102813
Volume 72
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  issn: 1874-4907
  databaseCode: GBLVA
  dateStart: 20110101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0000070244
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals [SCFCJ]
  issn: 1874-4907
  databaseCode: AIKHN
  dateStart: 20080301
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0000070244
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  issn: 1874-4907
  databaseCode: .~1
  dateStart: 20080301
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0000070244
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  issn: 1874-4907
  databaseCode: ACRLP
  dateStart: 20080301
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0000070244
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  issn: 1874-4907
  databaseCode: AKRWK
  dateStart: 20080301
  customDbUrl:
  isFulltext: true
  mediaType: online
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000070244
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NT4NAEN009aIH42esH80evGKFXRY4NtWmauylNemNLMuupbZAKpr0YvwP_kN_ibMLmJoYDx4hTAJvYOYNmZmH0LnQ-q8eZ5YbE9eirsMt7oBDCAM6yj3GyvGx-yEbPNDbiTtpoF49C6PbKqvYX8Z0E62rM50KzU6eJJ2RVpOjUNtBEodEZeIwpZ5WMbh4s7__s-h9No7RdNXXW9qgnqAzbV7wMLptxIHcr9cY-Db5PUOtZZ3-Dtqu6CLulne0ixoy3UNba0sE99Gyi2dZkhY4XyavXKxwtXoBAMd8_phB9T9dYOCmWP86w8LIOIAlLvjzE86Ummemjx7rhBZjsLqSi1zvT_h8_xhNuZJgWWmPYjP3uDpA4_71uDewKiUFS8AnWVjEl4oTEVCIJsQlitlKBI6wKScR9aGGgkIVuIhHHPAp50HMiPSFkK6kLmBMDlEzzVJ5hLAt5KUSLIbiE7hIEAVKxTaPgBSCiyPOWsiqwQvzcl9GWDeSzcIS7FCDHZZgt5BXIxz-8HsIIf1Py-N_W56gTX1UtuSdomaxfJFnQC2KqG3enTba6N7cDYZfeIrPxg
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3LToNAFJ00daEujM9Yn7NwO1YYGGDZVJuqbTetSXdkGGYstQVS0aQb4z_4h36Jd3iYmhgXbiEnwLlw77nkPhC6EHr_q8MZsUNqE8s2OeEmGIQykKPcYaxoH-sPWPfBuhvb4xpqV70wuqyy9P2FT8-9dXmkWbLZTKOoOdTb5CzI7SCIQ6DSfngNruXoDOzyzfj-0aIH2pj5UlcNIBpRtdDldV7wNLpuxITgr-cYuAb9PUSthJ3ONtoq9SJuFbe0g2oy3kWbK1ME99CihadJFGc4XUSvXCxxOXsBGMd89phA-j-ZYxCnWP87wyLf4wBInPHnJ5woNUvyQnqsI1qIAXUt56keoPD5_jGccCUBWS4fxXnj43IfjTo3o3aXlKsUiIBvMiPUlYpT4VngTqhNFTOU8ExhWJwGlgtJFGSqIEYcaoJROfdCRqUrhLSlZQPJ9ADV4ySWhwgbQl4pwULIPkGMeIGnVGjwAFQh2DjgrIFIRZ6fFgMz_KqSbOoXZPuabL8gu4GcimH_h-F98Ol_Io_-jTxH691Rv-f3bgf3x2hDnynq805QPVu8yFPQGVlwlr9HX3QU0Vs
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+joint+privacy+protection+algorithm+for+edge+computing+task+offloading+based+on+Dempster%E2%80%93Shafer+evidence+theory&rft.jtitle=Physical+communication&rft.au=Chen%2C+Tian&rft.au=Hao%2C+Wanming&rft.au=Yang%2C+Wencong&rft.au=Yang%2C+Shouyi&rft.date=2025-10-01&rft.issn=1874-4907&rft.volume=72&rft.spage=102813&rft_id=info:doi/10.1016%2Fj.phycom.2025.102813&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_phycom_2025_102813
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1874-4907&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1874-4907&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1874-4907&client=summon