Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing

被引:149
作者
Puthal, Deepak [1 ]
Obaidat, Mohammad S. [4 ]
Nanda, Priyadarsi [2 ]
Prasad, Mukesh [3 ]
Mohanty, Saraju P. [5 ]
Zomaya, Albert Y. [6 ]
机构
[1] Univ Technol Sydney, Fac Engn & IT, Sydney, NSW, Australia
[2] Univ Technol Sydney, Sch Comp & Commun, Sydney, NSW, Australia
[3] Univ Technol Sydney, Sydney, NSW, Australia
[4] Univ Jordan, King Abdullah II Sch Informat Technol, Amman, Jordan
[5] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[6] Univ Sydney, Ctr Distributed & High Performance Comp, Sydney, NSW, Australia
关键词
CLOUD; AUTHENTICATION;
D O I
10.1109/MCOM.2018.1700795
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Fog computing a recent research trend to bring cloud computing services to network edges. EDCs are deployed to decrease the latency and network congestion by processing data streams and user requests in near real time. FDC deployment is distributed in nature arid positioned between cloud data centers and data sources. Load balancing is the process of redistributing the work load among EDCs to improve both resource utilization and job response time. Load balancing also avoids a situation where some LDCs are heavily loaded while others are in idle state or doing little data processing. In such scenarios, load balancing between the EDCs plays a vital role for user response and real-lime event detection. As the EDCs are deployed in an unattended environment, secure authentication of EDCs is an important issue to address before performinL, load balancing. This article proposes a novel load balancing technique to authenticate the EDCs and find less loaded EDCs for task allocation. The proposed load balancing technique is more efficient than other existing approaches in finding less loaded LDCs for task allocation. The proposed approach riot only improves efficiency of load balancing; it also strengthens the security by authenticating the destination EDCs.
引用
收藏
页码:60 / 65
页数:6
相关论文
共 15 条
  • [1] Alakeel AM, 2010, INT J COMPUT SCI NET, V10, P153
  • [2] [Anonymous], 2016, IEEE INFOCOM
  • [3] [Anonymous], 2016, CHINESE MED J-PEKING, DOI DOI 10.1109/INFOCOM.2016.7524411
  • [4] Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks
    Butun, Ismail
    Erol-Kantarci, Melike
    Kantarci, Burak
    Song, Houbing
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) : 47 - 53
  • [5] A foggy research future: Advances and future opportunities in fog computing research
    Choo, Kim-Kwang Raymond
    Lu, Rongxing
    Chen, Liqun
    Yi, Xun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 677 - 679
  • [6] Authentication Protocol for an Ambient Assisted Living System
    He, Debiao
    Zeadally, Sherali
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (01) : 71 - 77
  • [7] Obaidat M., 2016, Smart cities and homes: Key enabling technologies
  • [8] Obaidat MS, 2014, PRINCIPLES OF WIRELESS SENSOR NETWORKS
  • [9] From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework
    Osanaiye, Opeyemi
    Chen, Shuo
    Yan, Zheng
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    Dlodlo, Mqhele
    [J]. IEEE ACCESS, 2017, 5 : 8284 - 8300
  • [10] Puthal D., 2017, IEEE CONSUM ELECTR M, V6, P71