Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification

被引:0
作者
Marwan, Mbarek [1 ]
Temghart, Abdelkarim Ait [2 ]
Ouhmi, Said [3 ]
Lazaar, Mohamed [1 ]
机构
[1] Mohammed V Univ Rabat, ENSIAS, Rabat, Morocco
[2] Sultan Moulay Slimane Univ, TIAD Lab, BP 523, Beni Mellal, Morocco
[3] Ibn Tofail Univ, Fac Sci, LRI Lab, Kenitra, Morocco
关键词
Cloud-edge data centers; Data processing; Resource allocation management; Homomorphic encryption; Game theory; Nash equilibrium; Best-response strategy; Security; Energy; PLACEMENT; ALLOCATION; SHARE;
D O I
10.1016/j.rineng.2024.102902
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Privacy and efficient data processing are crucial research areas in the field of outsourcing computing. Thus, the contribution of the paper is twofold. First of all, we develop a secure offloading technique that can process data while preserving privacy. Although RSA and Paillier cryptosystems are highly beneficial for mathematical operations on basic encrypted data due to their homomorphic properties, images are processed using permutationordered binary (POB) and Shamir's secret sharing (SSS). Second, a non-cooperative game theory model was formulated to examine the interactions between service providers, characterizing each edge as an M/M/1 system with an infinite queue. Through formal verification using rigorous mathematical reasoning, the suggested strategies for task offloading and resource allocation are shown to be effective in terms of security, quality of service (QoS), and energy consumption. The best-response dynamics approach is used to calculate the final strategy for each participant and assess how fairly resources are allocated. Finally, the potential of our approach is demonstrated numerically, revealing a faster convergence towards attaining Nash equilibrium in a duopoly cloud-edge data center market, granted that the necessary and sufficient conditions are met.
引用
收藏
页数:16
相关论文
共 52 条
  • [1] Almeer M.H., 2012, Journal of Emerging Trends in Computing and Information Sciences, V3, P637
  • [2] Banaei Seyyed Mojtaba., 2014, OPEN J MAR SCI, V4, P239, DOI DOI 10.4236/ojms.2014.44022
  • [3] BENALOH JC, 1987, LECT NOTES COMPUT SC, V263, P251
  • [4] Energy-efficiency and sustainability in new generation cloud computing: A vision and directions for integrated management of data centre resources and workloads
    Buyya, Rajkumar
    Ilager, Shashikant
    Arroba, Patricia
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2024, 54 (01) : 24 - 38
  • [5] Challa R, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES
  • [6] Blockchains for constrained edge devices
    Douglas, Antonyo
    Holloway, Richard
    Lohr, Jonathan
    Morgan, Elijah
    Harfoush, Khaled
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2020, 1 (1-2):
  • [7] Farah Shahzadi., 2012, Recent Advances in Information Science, Proceeding of the 3rd European Conf. of Computer Science, P121
  • [8] Gabay D., 1980, Applied stochastic control in econometrics and management science, P271
  • [9] Blend Arithmetic Operations on Tensor-Based Fully Homomorphic Encryption Over Real Numbers
    Gai, Keke
    Qiu, Meikang
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3590 - 3598
  • [10] Galindo D, 2003, LECT NOTES COMPUT SC, V2567, P279