Security-Aware Deployment Optimization of Cloud-Edge Systems in Industrial IoT

被引:18
作者
Casola, Valentina [1 ]
De Benedictis, Alessandra [1 ]
Di Martino, Sergio [1 ]
Mazzocca, Nicola [1 ]
Starace, Luigi Libero Lucio [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, I-80125 Naples, Italy
关键词
Cloud computing; Security; Resource management; Optimization; Computer architecture; Cloud-edge architectures; cloud-edge service deployment optimization; secure Industrial Internet-of-Things (IIoT) application development; INTERNET; THINGS; MANAGEMENT;
D O I
10.1109/JIOT.2020.3004732
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing, edge computing, and the Internet of Things are significantly changing from the original architectural models with pure provisioning of virtual resources (and services) to a transparent and adaptive hosting environment, where cloud providers, as well as "on-premise" resources and end nodes, fully realize the "everything-as-a-service" provisioning concept. The optimal design of these architectures, including the selection of optimal services to acquire, is not trivial in the cloud-edge context due to the involvement of a variable number and the type of available resources offerings and to the impact on cost, performance, and other relevant features such as security, almost never considered. This article presents a novel formalization of the cloud-edge allocation problem for the industrial IoT context. The proposed optimization process takes explicitly into account two critical aspects that are often overlooked in similar approaches, namely, the new cloud-edge on-demand service offerings model for the allocation of resources and the impact on the deployed application, in terms of cost, performance, and security policies actually implemented. An efficient yet suboptimal deterministic solver is also presented and compared with a linear programming one. Results are the same in 86% of the cases on the considered data set while our solver is orders of magnitude faster than the linear one.
引用
收藏
页码:12724 / 12733
页数:10
相关论文
共 50 条
[31]   Security-aware optimization for ubiquitous computing systems with SEAT graph approach [J].
Qiu, Meikang ;
Zhang, Lei ;
Ming, Zhong ;
Chen, Zhi ;
Qin, Xiao ;
Yang, Laurence T. .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (05) :518-529
[32]   On the Deployment of IoT Systems: An Industrial Survey [J].
Alkhabbas, Fahed ;
Spalazzese, Romina ;
Cerioli, Maura ;
Leotta, Maurizio ;
Reggio, Gianna .
2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C 2020), 2020, :17-24
[33]   Security-aware job allocation in mobile cloud computing [J].
Nawrocki, Piotr ;
Pajor, Jakub ;
Sniezynski, Bartlomiej ;
Kolodziej, Joanna .
21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, :713-719
[34]   Security-Aware Scheduling of Multiple Scientific Workflows in Cloud [J].
Roy, Shubhro ;
Gharote, Mangesh ;
Ramamurthy, Arun ;
Pawar, Anand ;
Lodha, Sachin .
CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2022, CLOSER 2023, 2024, 1845 :1-24
[35]   Security-aware intermediate data placement strategy in scientific cloud workflows [J].
Liu, Wei ;
Peng, Su ;
Du, Wei ;
Wang, Wei ;
Zeng, Guo Sun .
KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 41 (02) :423-447
[36]   Parallel Scheduling of Large-Scale Tasks for Industrial Cloud-Edge Collaboration [J].
Laili, Yuanjun ;
Guo, Fuqiang ;
Ren, Lei ;
Li, Xiang ;
Li, Yulin ;
Zhang, Lin .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) :3231-3242
[37]   Risk and Compliance in IoT-Health Data Propagation : A Security-Aware Provenance based Approach [J].
Jaigirdar, Fariha Tasmin ;
Rudolph, Carsten ;
Bain, Chris .
2021 IEEE INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (ICDH 2021), 2021, :27-37
[38]   Microservices Scheduling Model Over Heterogeneous Cloud-Edge Environments As Support for IoT Applications [J].
Filip, Ion-Dorinel ;
Pop, Florin ;
Serbanescu, Cristina ;
Choi, Chang .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2672-2681
[39]   Optimization of Resource Management for NFV-Enabled IoT Systems in Edge Cloud Computing [J].
Pham, Tuan-Minh ;
Nguyen, Thi-Thuy-Lien .
IEEE ACCESS, 2020, 8 :178217-178229
[40]   A Security-Aware Framework for Designing Industrial Engineering Processes [J].
Dedousis, Panagiotis ;
Stergiopoulos, George ;
Arampatzis, George ;
Gritzalis, Dimitris .
IEEE ACCESS, 2021, 9 :163065-163085