Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT

被引:16
|
作者
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Di Martino, Sergio [1 ]
Mazzocca, Nicola [1 ]
Starace, Luigi Libero Lucio [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, I-80125 Naples, Italy
关键词
Cloud computing; Security; Resource management; Optimization; Computer architecture; Cloud-edge architectures; cloud-edge service deployment optimization; secure Industrial Internet-of-Things (IIoT) application development; INTERNET; THINGS; MANAGEMENT;
D O I
10.1109/JIOT.2020.3004732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, edge computing, and the Internet of Things are significantly changing from the original architectural models with pure provisioning of virtual resources (and services) to a transparent and adaptive hosting environment, where cloud providers, as well as "on-premise" resources and end nodes, fully realize the "everything-as-a-service" provisioning concept. The optimal design of these architectures, including the selection of optimal services to acquire, is not trivial in the cloud-edge context due to the involvement of a variable number and the type of available resources offerings and to the impact on cost, performance, and other relevant features such as security, almost never considered. This article presents a novel formalization of the cloud-edge allocation problem for the industrial IoT context. The proposed optimization process takes explicitly into account two critical aspects that are often overlooked in similar approaches, namely, the new cloud-edge on-demand service offerings model for the allocation of resources and the impact on the deployed application, in terms of cost, performance, and security policies actually implemented. An efficient yet suboptimal deterministic solver is also presented and compared with a linear programming one. Results are the same in 86% of the cases on the considered data set while our solver is orders of magnitude faster than the linear one.
引用
收藏
页码:12724 / 12733
页数:10
相关论文
共 50 条
  • [31] A Privacy-Aware PUFs-Based Multiserver Authentication Protocol in Cloud-Edge IoT Systems Using Blockchain
    Zhang, Yan
    Li, Bing
    Liu, Bo
    Hu, Yuanyuan
    Zheng, Haipeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (18): : 13958 - 13974
  • [32] A Security-aware Data Placement Mechanism for Big Data Cloud Storage Systems
    Kang, Seungmin
    Veeravalli, Bharadwaj
    Aung, Khin Mi Mi
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 327 - 332
  • [33] Security-aware optimization for ubiquitous computing systems with SEAT graph approach
    Qiu, Meikang
    Zhang, Lei
    Ming, Zhong
    Chen, Zhi
    Qin, Xiao
    Yang, Laurence T.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (05) : 518 - 529
  • [35] Privacy and security-aware workflow scheduling in a hybrid cloud
    Lei, Jian
    Wu, Quanwang
    Xu, Jin
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 131 : 269 - 278
  • [36] Security-aware job allocation in mobile cloud computing
    Nawrocki, Piotr
    Pajor, Jakub
    Sniezynski, Bartlomiej
    Kolodziej, Joanna
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 713 - 719
  • [37] Security-Aware Scheduling of Multiple Scientific Workflows in Cloud
    Roy, Shubhro
    Gharote, Mangesh
    Ramamurthy, Arun
    Pawar, Anand
    Lodha, Sachin
    CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2022, CLOSER 2023, 2024, 1845 : 1 - 24
  • [38] Security-Aware Deployment of SDN-NFV in TELCOS Networks
    Alshaer, Mohammad M.
    Al-Akhras, Mousa
    Albesher, Abdulaziz
    PROCEEDINGS OF 2019 IEEE 4TH WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS' 19), 2019, : 252 - 256
  • [39] Cloud-Edge Collaboration Framework for IoT data analytics
    Moon, Jaewon
    Cho, Sangyeon
    Kum, Seungweoo
    Lee, Sangwon
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 1414 - 1416
  • [40] A Security-Aware Framework for Designing Industrial Engineering Processes
    Dedousis, Panagiotis
    Stergiopoulos, George
    Arampatzis, George
    Gritzalis, Dimitris
    IEEE ACCESS, 2021, 9 : 163065 - 163085