Security and energy aware scheduling for service workflow in mobile edge computing

被引:0
|
作者
Li W. [1 ]
Liu H. [1 ]
Li Z. [1 ]
Yuan Y. [1 ]
机构
[1] College of Computer and Technology, Hangzhou Dianzi University, Hangzhou
来源
Li, Zhongjin (lizhongjin@hdu.edu.cn) | 1831年 / CIMS卷 / 26期
基金
中国国家自然科学基金;
关键词
Mobile edge computing; Particle swarm optimization algorithm; Security model; Workflow scheduling;
D O I
10.13196/j.cims.2020.07.012
中图分类号
学科分类号
摘要
In the Mobile Edge Computing (MEC) environment, users migrate application tasks to MEC for execution to effectively reduce delay and reduce energy consumption. However, the MEC still faces data security problems, and the potential malicious attacks can result in the loss or disclosure of private data. On this basis, a Security and Energy Aware (SEA) scheduling for service workflow was proposed in MEC environment, which could minimize the energy consumption of mobile devices under the risk rate and deadline constraints of mobile applications. Based on Particle Swarm Optimization (PSO) algorithm, SEA algorithm considered the scheduling position, confidentiality service and integrity service of the tasks. In addition, a new security model was constructed, which included the relationship among data volume, multi-core CPU, computing frequency and security overhead. Simulation experiments demonstrated the feasibility and effectiveness of the proposed algorithm. © 2020, Editorial Department of CIMS. All right reserved.
引用
收藏
页码:1831 / 1842
页数:11
相关论文
共 31 条
  • [1] CHEN Xu, JIAO Lei, LI Wenzhong, Et al., Efficientmulti-user computation offloading for mobile-edge cloud computing, IEEE/ACM Transactions on Networking, 24, 5, pp. 2795-2808, (2016)
  • [2] HU Y C, PATEL M, SABELLA D, Et al., Mobile edge computing-A key technology towards 5G
  • [3] MACH P, BECVAR Z., Mobileedge computing: a survey on architecture and computation offloading, IEEE Communications Surveys & Tutorials, 19, 3, pp. 1628-1656, (2017)
  • [4] ABBAS N, ZHANG Y, TAHERKORDI A, Et al., Mobileedge computing: A survey, IEEE Internet of Things Journal, 5, 1, pp. 450-465, (2018)
  • [5] LI Zhongjin, GE Jidong, LI Chuanyi, Et al., Energy cost minimization with job security guarantee in Internet data center, Future Generation Computer Systems, 73, C, pp. 63-78, (2016)
  • [6] LIU C F, BENNIS M, POOR H V., Latency andreliability-aware task offloading and resource allocation for mobile edge computin
  • [7] JIANG W, JIANG K, ZHANG X, Et al., Energyoptimization of security-critical real-time applications with guaranteed security protection, Journal of Systems Architecture, 61, 7, pp. 282-292, (2015)
  • [8] LI Z, YU J, HU H, Et al., Fault-tolerant scheduling for scientific workflow with task replication method in cloud
  • [9] CHEN Huangke, ZHU Xiaomin, QIU Dishan, Et al., Scheduling forworkflows with security-sensitive intermediate data by selective tasks duplication in clouds, IEEE Transactions on Parallel & Distributed Systems, 28, 9, pp. 2674-2688, (2017)
  • [10] ZHU Zhaomeng, ZHANG Gongxuan, LI Miqing, Et al., Evolutionary multi-objective workflow scheduling in cloud, IEEE Transactions on Parallel & Distributed Systems, 27, 5, pp. 1344-1357, (2016)