A Digital Currency for Computation Offloading

Authors

  • F Sultana Dayananda Sagar College of Engineering ,Bengaluru, Karnataka
  • M Tajuddin Dayananda Sagar College of Engineering ,Bengaluru, Karnataka

DOI:

https://doi.org/10.26438/ijcse/v7i6.135139

Keywords:

Cryptocurrency, Computation offloading, Device to Device

Abstract

In the latest years, the analyst researchers have proposed answers for assistance phones improve execution time and decrease imperativeness use by offloading overpowering regular employment to remote components, of late, moved by the promising eventual outcomes of message sending in shrewd frameworks, various pros have proposed methods for undertaking offloading towards near to phones, delivering the Device-to-Device offloading perspective. None of these techniques, in any case, offers any instrument that considers narrow-minded customers and, specifically, that moves and settles the contribution devices who spend their benefits. In this paper, we address these issues and propose the structure of a system that incorporates a motivator conspire and a notoriety instrument. Our proposition pursues the standards of the Hidden Market Design approach, which enables clients to determine the measure of assets they are eager to forfeit while taking an interest in the offloading framework. The hidden calculation that clients don’t know about depends on an honest closeout procedure and a distributed notoriety trade conspire.

References

[1] L. Pu, X. Chen, J. Xu, and X. Fu, “D2D fogging: An energy-efficient and incentive-aware task offloading framework via network assisted d2d collaboration,” IEEE J. sel. A. commun., vol. 34, no. 12, pp. 3887–3901, Dec. 2016

[2] X. Chen, L. Jiao, W. Li, and X. Fu, “efficient multi-user computation offloading for mobile-edge cloud computing,” IEEE/ACM Trans. Network., vol. 24, no. 5, pp. 2795–2808, Oct. 2016.

[3] V. Cardellini, et al., “A game-theoretic approach to computation of- floading in mobile cloud computing,” Math. Program., vol. 157, no. 2, pp. 421–449, 2016.

[4] X. Chen, “Decentralized computation offloading game for mobile cloud computing,” IEEE Trans. Parallel Dist. System, vol. 26, no. 4, pp. 974–983, Apr. 2015

[5] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A simple, cheat-proof, credit-based system for mobile adhoc networks,” in Proc. IEEE Conf. Comput. Commun., 2003, vol. 3, pp. 1987–1997

[6] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “Smart: A secure multi- layer credit-based incentive scheme for delay-tolerant networks,” IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4628–4639, Oct. 2009

[7] B. B. Chen and M. C. Chan, “Mobicent: A credit-based incentive system for disruption tolerant network,” in Proc. IEEE Int. Conf. Comput. Commun., 2010, pp. 1

[8] H. Wu, D. Huang, S. Bouzefrane, ”Making offloading decisions resistant to network unavailability for mobile cloud collaboration”, Proc. IEEE Collaboratecom, pp. 168-177, 2013.

[9] G. Iosifidis, L. Gao, J. Huang, L. Tassiulas, ”An iterative double auc- tion mechanism for mobile data offloading”, Proc. 11th Int. Symp. Model. Optim. Mobile Ad Hoc Wireless Netw., pp. 154-161, 2013.

[10] Jia, M., Cao, J., Yang, L.: Heuristic offloading of concurrent tasks for computation-intensive applications in mobile cloud computing. In: Proceedings of IEEE INFOCOM Workshops, pp. 352–357 (2014).

[11] Y. Huang, A. Tomasic, Y. An, C. Garrod, and A. Steinfeld,“Energy efficient and accuracy aware (e2a2) location services via crowdsourc- ing,” in Proc. IEEE 9th Int. Conf. Wireless Mobile Comput. Netw. Commun., Oct. 2013.

Downloads

Published

2019-06-30
CITATION
DOI: 10.26438/ijcse/v7i6.135139
Published: 2019-06-30

How to Cite

[1]
F. Sultana and M. Tajuddin, “A Digital Currency for Computation Offloading”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 135–139, Jun. 2019.

Issue

Section

Research Article