A Light-weight Trust Mechanism for Cloud-Edge Collaboration Framework

被引:10
作者
Gao, Zhipeng [1 ]
Xia, Chenxi [1 ]
Jin, Zhuojun [1 ]
Wang, Qian [1 ]
Huang, Junmeng [1 ]
Yang, Yang [1 ]
Rui, Lanlan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP) | 2019年
关键词
Cloud-Edge collaboration; improved LightGBM algorithm; mixed malicious attacks; weighted adaptively;
D O I
10.1109/icnp.2019.8888037
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of the edge computing and cloud computing technology, the cloud-edge collaboration framework is proposed as a new effective computing architecture and applied in many fields. However, due to the openness of the edge networks, the security of cloud-edge framework is an unavoidable problem and most recent trust mechanism could not resist mixed malicious attacks at the same time. In this work, a light-weight and reliable trust mechanism based on the improved LightGBM algorithm is originally proposed to evaluate the credibility of edge devices. First, we design a light-weight trust mechanism for edge devices to process raw interaction data and extract trust features, which reduces the amount of data transmission and the pressure on the communication networks. In addition, an evaluation algorithm based on the entropy weight method (EWM) and punishment factors is designed for edge brokers to distinguish the malicious devices from the normal ones, which performs great against mixed malicious attacks. At last, we propose an improved LightGBM algorithm developed in the centralized cloud to learn other researchers' evaluation methods and check the evaluation uploaded from edge brokers, which could make the punishment factors of edge networks weighted adaptively with the change of edge networks. The experimental results show the proposed trust mechanism outperforms existing methods in the accuracy and discriminating speed under mixed malicious attacks.
引用
收藏
页数:6
相关论文
共 19 条
[1]   Feedback behavior and its role in trust assessment for peer-to-peer systems [J].
Azzedin, Farag ;
Ridha, Ahmad .
TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) :253-266
[2]  
Chen J, 2018, IEEE ACCESS
[3]   XGBoost: A Scalable Tree Boosting System [J].
Chen, Tianqi ;
Guestrin, Carlos .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :785-794
[4]  
Gao Y., 2017, 10 US NATL COMBUST M, P1, DOI DOI 10.1109/MWP.2017.8168701
[5]   Poster: Towards a Distributed and Self-Adaptable Cloud-Edge Middleware [J].
Gascon-Samson, Julien ;
Jung, Kumseok ;
Pattabiraman, Karthik .
2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, :338-340
[6]   Three architectures for trusted data dissemination in edge computing [J].
Goh, Shen-Tat ;
Pang, HweeHwa ;
Deng, Robert H. ;
Bao, Feng .
DATA & KNOWLEDGE ENGINEERING, 2006, 58 (03) :381-409
[7]   Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks [J].
Huang, Xumin ;
Yu, Rong ;
Kang, Jiawen ;
Zhang, Yan .
IEEE ACCESS, 2017, 5 :25408-25420
[8]  
Iandola Forrest, 2014, DENSENET IMPLEMENTIN
[9]  
Ju Y, 2019, IEEE ACCESS
[10]  
Ke G., 2017, ADV NEURAL INFORM PR, V30, P3146