{"id":"https://openalex.org/W4232995878","doi":"https://doi.org/10.1109/jiot.2021.3099018","title":"Communication-Aware Secret Share Placement in Hierarchical Edge Computing","display_name":"Communication-Aware Secret Share Placement in Hierarchical Edge Computing","publication_year":2021,"publication_date":"2021-07-21","ids":{"openalex":"https://openalex.org/W4232995878","doi":"https://doi.org/10.1109/jiot.2021.3099018"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2021.3099018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3099018","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037378130","display_name":"Hengrun Zhang","orcid":"https://orcid.org/0000-0002-7405-9588"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hengrun Zhang","raw_affiliation_strings":["Department of Computer Science, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078480632","display_name":"Kai Zeng","orcid":"https://orcid.org/0000-0003-3279-0695"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kai Zeng","raw_affiliation_strings":["Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037378130"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.2719,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.65604501,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"9","issue":"5","first_page":"3717","last_page":"3728"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.87308669090271},{"id":"https://openalex.org/keywords/heuristics","display_name":"Heuristics","score":0.7890527248382568},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6592706441879272},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.631930410861969},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4552913308143616},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.44326314330101013},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.42241576313972473},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.4133751690387726},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.33743059635162354},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33418741822242737},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.28861668705940247},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22125226259231567},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10671722888946533},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0776648223400116}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.87308669090271},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.7890527248382568},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6592706441879272},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.631930410861969},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4552913308143616},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.44326314330101013},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.42241576313972473},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.4133751690387726},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.33743059635162354},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33418741822242737},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.28861668705940247},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22125226259231567},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10671722888946533},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0776648223400116},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2021.3099018","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2021.3099018","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1494774797","https://openalex.org/W1556155774","https://openalex.org/W1572479227","https://openalex.org/W1579771234","https://openalex.org/W1635361314","https://openalex.org/W1659842140","https://openalex.org/W1999721188","https://openalex.org/W2032728524","https://openalex.org/W2088492763","https://openalex.org/W2088723799","https://openalex.org/W2129749111","https://openalex.org/W2141420453","https://openalex.org/W2152195021","https://openalex.org/W2156812944","https://openalex.org/W2316339787","https://openalex.org/W2402235285","https://openalex.org/W2493746814","https://openalex.org/W2535690855","https://openalex.org/W2558116332","https://openalex.org/W2591882872","https://openalex.org/W2701059868","https://openalex.org/W2767079719","https://openalex.org/W2781091734","https://openalex.org/W2892978152","https://openalex.org/W2895865029","https://openalex.org/W2920743100","https://openalex.org/W2956355137","https://openalex.org/W2963456518","https://openalex.org/W2970606380","https://openalex.org/W2973261831","https://openalex.org/W2977274812","https://openalex.org/W2979258553","https://openalex.org/W3004923726","https://openalex.org/W3033686777","https://openalex.org/W3084128899","https://openalex.org/W3098197413","https://openalex.org/W3169412867","https://openalex.org/W6630750119","https://openalex.org/W6728757088"],"related_works":["https://openalex.org/W2280422768","https://openalex.org/W3143197806","https://openalex.org/W3177062893","https://openalex.org/W3125143773","https://openalex.org/W2007032764","https://openalex.org/W803550684","https://openalex.org/W2483226803","https://openalex.org/W4352977312","https://openalex.org/W1536056491","https://openalex.org/W2041180560"],"abstract_inverted_index":{"Secret":[0],"sharing":[1],"(SS)":[2],"and":[3,70,95,108,115],"secure":[4],"multiparty":[5],"computation":[6],"(MPC)":[7],"are":[8],"now":[9],"widely":[10],"considered":[11],"for":[12],"privacy-preserving":[13],"data":[14],"processing.":[15],"However,":[16],"related":[17],"applications":[18],"can":[19,57,74,112,131],"suffer":[20],"from":[21],"large":[22],"transmission":[23,42],"overhead.":[24],"In":[25],"this":[26,82],"article,":[27],"we":[28,84,101,121],"propose":[29,122],"a":[30,46],"communication-aware":[31],"secret":[32,147],"share":[33],"placement":[34],"strategy":[35],"to":[36,77,150],"optimize":[37],"communication":[38,140],"overhead":[39],"by":[40],"minimizing":[41],"hop":[43],"counts":[44],"in":[45,55,117],"hierarchical":[47],"edge":[48],"computing":[49],"architecture.":[50],"Meanwhile,":[51],"relevant":[52],"privacy":[53],"constraints":[54],"SS":[56],"still":[58],"be":[59,75],"guaranteed.":[60],"We":[61],"show":[62],"that":[63,151],"the":[64,91,135,145,159,162],"constructed":[65],"optimization":[66,98],"problem":[67],"is":[68,148],"NP-hard,":[69],"efficient":[71],"heuristic":[72],"algorithms":[73],"applied":[76],"find":[78],"suboptimal":[79],"solutions.":[80],"With":[81],"consideration,":[83],"first":[85],"evaluate":[86],"two":[87,103],"traditional":[88],"heuristics,":[89,105],"i.e.,":[90,106],"genetic":[92],"algorithm":[93],"(GA)":[94],"particle":[96],"swarm":[97],"(PSO).":[99],"Besides,":[100],"introduce":[102],"basic":[104],"top-down":[107,127],"bottom-up":[109,126],"heuristic,":[110,129],"which":[111,130],"outperform":[113,132],"GA":[114],"PSO":[116],"certain":[118],"cases.":[119],"Finally,":[120],"an":[123],"algorithm,":[124],"called":[125],"(BUTD)":[128],"all":[133],"of":[134,144,161],"above":[136],"four":[137],"heuristics":[138],"when":[139],"among":[141,152],"different":[142,153],"shares":[143],"same":[146],"comparable":[149],"secrets.":[154],"Comprehensive":[155],"experimental":[156],"results":[157],"demonstrate":[158],"advantage":[160],"proposed":[163],"algorithms.":[164]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
