Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT

被引:17
作者
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Di Martino, Sergio [1 ]
Mazzocca, Nicola [1 ]
Starace, Luigi Libero Lucio [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, I-80125 Naples, Italy
关键词
Cloud computing; Security; Resource management; Optimization; Computer architecture; Cloud-edge architectures; cloud-edge service deployment optimization; secure Industrial Internet-of-Things (IIoT) application development; INTERNET; THINGS; MANAGEMENT;
D O I
10.1109/JIOT.2020.3004732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, edge computing, and the Internet of Things are significantly changing from the original architectural models with pure provisioning of virtual resources (and services) to a transparent and adaptive hosting environment, where cloud providers, as well as "on-premise" resources and end nodes, fully realize the "everything-as-a-service" provisioning concept. The optimal design of these architectures, including the selection of optimal services to acquire, is not trivial in the cloud-edge context due to the involvement of a variable number and the type of available resources offerings and to the impact on cost, performance, and other relevant features such as security, almost never considered. This article presents a novel formalization of the cloud-edge allocation problem for the industrial IoT context. The proposed optimization process takes explicitly into account two critical aspects that are often overlooked in similar approaches, namely, the new cloud-edge on-demand service offerings model for the allocation of resources and the impact on the deployed application, in terms of cost, performance, and security policies actually implemented. An efficient yet suboptimal deterministic solver is also presented and compared with a linear programming one. Results are the same in 86% of the cases on the considered data set while our solver is orders of magnitude faster than the linear one.
引用
收藏
页码:12724 / 12733
页数:10
相关论文
共 50 条
[21]   Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors [J].
Zheng, Danyang ;
Liu, Xiaorong ;
Tang, Wenyi ;
Xu, Honghui ;
Cao, Xiaojun .
IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, :2093-2098
[22]   Profit maximization for security-aware task offloading in edge-cloud environment [J].
Li, Zhongjin ;
Chang, Victor ;
Hu, Haiyang ;
Yu, Dongjin ;
Ge, Jidong ;
Huang, Binbin .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 157 :43-55
[23]   Dynamic Edge and Cloud Service Integration for Industrial IoT and Production Monitoring Applications of Industrial Cyber-Physical Systems [J].
Hastbacka, David ;
Halme, Jari ;
Barna, Laurentiu ;
Hoikka, Henrikki ;
Pettinen, Henri ;
Larranaga, Martin ;
Bjorkbom, Mikael ;
Mesia, Heikki ;
Jaatinen, Antti ;
Elo, Marko .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) :498-508
[24]   Security-Aware Provenance for Transparency in IoT Data Propagation [J].
Jaigirdar, Fariha Tasmin ;
Tan, Boyu ;
Rudolph, Carsten ;
Bain, Chris .
IEEE ACCESS, 2023, 11 :55677-55691
[25]   Performance Analysis of Blockchain-Enabled Data-Sharing Scheme in Cloud-Edge Computing-Based IoT Networks [J].
Okegbile, Samuel D. ;
Cai, Jun ;
Alfa, Attahiru S. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (21) :21520-21536
[26]   A High-Efficient Joint 'Cloud-Edge' Aware Strategy for Task Deployment and Load Balancing [J].
Dong, Yunmeng ;
Xu, Gaochao ;
Zhang, Meng ;
Meng, Xiangyu .
IEEE ACCESS, 2021, 9 :12791-12802
[27]   Security-Aware Design of Cyber-Physical Systems for Control over the Cloud [J].
Peng, Zebo .
2024 INTERNATIONAL SYMPOSIUM OF ELECTRONICS DESIGN AUTOMATION, ISEDA 2024, 2024, :786-786
[28]   A Security-aware Data Placement Mechanism for Big Data Cloud Storage Systems [J].
Kang, Seungmin ;
Veeravalli, Bharadwaj ;
Aung, Khin Mi Mi .
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, :327-332
[29]   Security-aware optimization for ubiquitous computing systems with SEAT graph approach [J].
Qiu, Meikang ;
Zhang, Lei ;
Ming, Zhong ;
Chen, Zhi ;
Qin, Xiao ;
Yang, Laurence T. .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (05) :518-529
[30]   On the Deployment of IoT Systems: An Industrial Survey [J].
Alkhabbas, Fahed ;
Spalazzese, Romina ;
Cerioli, Maura ;
Leotta, Maurizio ;
Reggio, Gianna .
2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2020), 2020, :17-24