Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT

被引:16
|
作者
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Di Martino, Sergio [1 ]
Mazzocca, Nicola [1 ]
Starace, Luigi Libero Lucio [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, I-80125 Naples, Italy
关键词
Cloud computing; Security; Resource management; Optimization; Computer architecture; Cloud-edge architectures; cloud-edge service deployment optimization; secure Industrial Internet-of-Things (IIoT) application development; INTERNET; THINGS; MANAGEMENT;
D O I
10.1109/JIOT.2020.3004732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, edge computing, and the Internet of Things are significantly changing from the original architectural models with pure provisioning of virtual resources (and services) to a transparent and adaptive hosting environment, where cloud providers, as well as "on-premise" resources and end nodes, fully realize the "everything-as-a-service" provisioning concept. The optimal design of these architectures, including the selection of optimal services to acquire, is not trivial in the cloud-edge context due to the involvement of a variable number and the type of available resources offerings and to the impact on cost, performance, and other relevant features such as security, almost never considered. This article presents a novel formalization of the cloud-edge allocation problem for the industrial IoT context. The proposed optimization process takes explicitly into account two critical aspects that are often overlooked in similar approaches, namely, the new cloud-edge on-demand service offerings model for the allocation of resources and the impact on the deployed application, in terms of cost, performance, and security policies actually implemented. An efficient yet suboptimal deterministic solver is also presented and compared with a linear programming one. Results are the same in 86% of the cases on the considered data set while our solver is orders of magnitude faster than the linear one.
引用
收藏
页码:12724 / 12733
页数:10
相关论文
共 50 条
  • [1] Latency-Aware Deployment of IoT Services in a Cloud-Edge Environment
    Zhang, Shouli
    Liu, Chen
    Wang, Jianwu
    Yang, Zhongguo
    Han, Yanbo
    Li, Xiaohong
    SERVICE-ORIENTED COMPUTING (ICSOC 2019), 2019, 11895 : 231 - 236
  • [2] Security-Aware Industrial Wireless Sensor Network Deployment Optimization
    Cao, Bin
    Zhao, Jianwei
    Gu, Yu
    Fan, Shanshan
    Yang, Peng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (08) : 5309 - 5316
  • [3] Security-Aware Resource Allocation in the Edge-Cloud Continuum
    Soumplis, Polyzois
    Kontos, Georgios
    Kretsis, Aristotelis
    Kokkinos, Panagiotis
    Nanos, Anastassios
    Varvarigos, Emmanouel
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 161 - 169
  • [4] Security-Aware and Efficient Data Deduplication for Edge-Assisted Cloud Storage Systems
    Xie, Qingyuan
    Zhang, Chen
    Jia, Xiaohua
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2191 - 2202
  • [5] Security-Aware Node Replacements and Incremental Updates in Industrial IoT Platforms
    Itani, Wassim
    Shamseddine, Maha
    Hosey-Stewart, Elisha J.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2002 - 2007
  • [6] Towards Security-Aware Virtual Server Migration Optimization to the Cloud
    Zhang, Bowu
    Hwang, Jinho
    Ma, Liran
    Wood, Timothy
    2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, 2015, : 71 - 80
  • [7] Resource-Aware Service Function Chain Deployment in Cloud-Edge Environment
    Li, Hao
    Li, Xin
    Qian, Zhuzhong
    Qin, Xiaolin
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [8] Security-Aware Design Methodology and Optimization for Automotive Systems
    Lin, Chung-Wei
    Zheng, Bowen
    Zhu, Qi
    Sangiovanni-Vincentelli, Alberto
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2015, 21 (01)
  • [9] An Advanced Security-Aware Cloud Architecture
    Bobelin, Laurent
    Bousquet, Aline
    Briffaut, Jeremy
    Couturier, Jean-Francois
    Toinard, Christian
    Caron, Eddy
    Lefray, Arnaud
    Rouzaud-Cornabas, Jonathan
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2014, : 572 - 579
  • [10] Security-Aware Resource Allocation for Mobile Cloud Computing Systems
    Liu, Yanchen
    Lee, Myung J.
    24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,