A Trust-Aware Task Offloading Framework in Mobile Edge Computing

被引:17
作者
Wu, Dexiang [1 ]
Shen, Guohua [1 ,2 ,3 ]
Huang, Zhiqiu [1 ,2 ,3 ]
Cao, Yan [1 ]
Du, Tianbao [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Engn, Nanjing 211106, Jiangsu, Peoples R China
[2] Collaborat Innovat Ctr Novel Software Technol & I, Nanjing 210093, Jiangsu, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Minist Ind & Informat Technol, Key Lab Safety Crit Software, Nanjing 211106, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Task analysis; Edge computing; Energy consumption; Cloud computing; Privacy; Biological system modeling; Computational modeling; Mobile edge computing (MEC); task offloading; trust evaluation; machine learning; privacy protection; PRIVACY-PRESERVATION; COMMUNICATION; SECURITY;
D O I
10.1109/ACCESS.2019.2947306
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Task offloading in Mobile Edge Computing (MEC) is a solution to augment resource-limited mobile devices capabilities by migrating tasks to the edge of the network (i.e., edge servers and idle devices). At present, a lot of work is focused on optimizing policies to reduce latency or energy consumption for users. However, they mostly ignore that services are not necessarily trustworthy because the resource providers are complex, dynamic, and unreliable. The trustworthiness of a service in our paper mainly includes two aspects. One is that resource providers will not violate users privacy. The other is that resource providers will perform well to ensure the effectiveness of services. To solve this problem, we propose a trust-aware task offloading framework. The main purpose of the framework is to select a resource provider for a user to reduce latency or energy consumption and ensure service trustworthiness at the same time. The framework can be divided into three modules (i.e., trust evaluation, filtering and selection). By combining trust evaluation and filtering modules, some resource providers that are not trusted by users are filtered out to ensure that the services provided to users are trustworthy. In the selection module, we select an appropriate provider for a user from the qualified (i.e., left after the filtering process) resource providers based on an offloading policy. The experimental results show that our framework not only reduces latency or energy consumption for users, but also reduces the failure rate of tasks.
引用
收藏
页码:150105 / 150119
页数:15
相关论文
共 32 条
[1]   Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing [J].
Ahmad, Waqas ;
Wang, Shengling ;
Ullah, Ata ;
Sheharyar ;
Mahmood, Zahid .
IEEE ACCESS, 2018, 6 :46363-46381
[2]   Energy-Efficient Resource Allocation for Mobile Edge Computing-Based Augmented Reality Applications [J].
Al-Shuwaili, Ali ;
Simeone, Osvaldo .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (03) :398-401
[3]  
[Anonymous], THESIS
[4]  
Bonomi F., 2012, Proceedings of the first edition of the MCC workshop on Mobile cloud computing, P13, DOI [DOI 10.1145/2342509.2342513, 10.1145/2342509.2342513]
[5]  
Chang C. C., 2011, ACM T INTEL SYST TEC, V2, P1, DOI DOI 10.1145/1961189.1961199
[6]  
Chen MC, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATICS, MANAGEMENT ENGINEERING AND INDUSTRIAL APPLICATION (IMEIA 2016), P1, DOI 10.1109/PLASMA.2016.7534032
[7]  
Chen X., 2017, P IEEE ICC, P1
[8]   Socially-Motivated Cooperative Mobile Edge Computing [J].
Chen, Xu ;
Zhou, Zhi ;
Wu, Weigang ;
Wu, Di ;
Zhang, Junshan .
IEEE NETWORK, 2018, 32 (06) :177-183
[9]   EXPLOITING MASSIVE D2D COLLABORATION FOR ENERGY-EFFICIENT MOBILE EDGE COMPUTING [J].
Chen, Xu ;
Pu, Lingjun ;
Gao, Lin ;
Wu, Weigang ;
Wu, Di .
IEEE WIRELESS COMMUNICATIONS, 2017, 24 (04) :64-71
[10]  
Cuervo E., 2010, P 8 MOBISYS NEW YORK, P49, DOI [10.1145/1814433.1814441, DOI 10.1145/1814433.1814441]