摘要
提出了基于安全管理的边缘计算卸载方案,并基于量子进化算法(QEA)设计了卸载决策方案。该方案保证了用户在边缘计算网络中进行计算卸载的安全性。仿真结果表明,与常规计算卸载方案对比,本方案能在保证计算卸载安全的情况下有效降低整个系统的开销。
In this paper, a computation offloading scheme based on security management in edge computing network is proposed, which uses quantum evolution algorithm(QEA) to make reasonable offloading decisions. The scheme can perform secure computing offloading in the edge computing network. The simulation results show that this strategy can effectively reduce the cost of the whole system under the condition of ensuring security.
引文
[1]HU Y C,PATEL M,SABELLA D,et al.Mobile Edge Computing-A Key Technology towards5G[J].ETSI White Paper,201 5,11(11):1-16
[2]KHAN A U R,OTHMAN M,MADANI S A,et al.A Survey of Mobile Cloud Computing Application Models[J].IEEE Communications Surveys&Tutorials,2014,16(1):393-413.DOI:10.1109/SURV.2013.062613.00160
[3]LIU J,MAO Y Y,ZHANG J,et al.DelayOptimal Computation Task Scheduling for Mobile-Edge Computing Systems[C]//2016IEEE International Symposium on Information Theory(ISIT).Spain:IEEE,2016:1451-1455.DOI:10.1109/ISIT.2016.7541539
[4]REN J K,YU G D,CAI Y L,et al.Latency Optimization for Resource Allocation in Mobile-Edge Computation Offloading[J].IEEETransactions on Wireless Communications,2018,17(8):5506-5519.DOI:10.1109/TWC.2018.2845360
[5]ZHANG K,MAO Y M,LENG S P,et al.Optimal Delay Constrained Offloading for Vehicular Edge Computing Networks[C]//2017IEEE International Conference on Communications(ICC),2017.France:IEEE,2017:1-6.DOI:10.1109/ICC.2017.7997360
[6]JIA M K,CAO J N,YANG L.Heuristic Offloading of Concurrent Tasks for Computation Intensive Applications in Mobile Cloud Computing[C]//2014 IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).Canada:IEEE,2014:352-357.DOI:10.1109/INFCOMW.2014.6849257
[7]KAO Y H,KRISHNAMACHARI B,RA M R,et al.Hermes:Latency Optimal Task Assignment for Resource-Constrained Mobile Computing[C]//2015 IEEE Conference on Computer Communications(INFOCOM),2015.Hong Kong,China:IEEE,2015:1894-1902.DOI:10.1109/INFOCOM.2015.7218572
[8]KAMOUN M,LABIDI W,SARKISS M.Joint Resource Allocation and Offloading Strategies in Cloud Enabled Cellular Networks[C]//2015IEEE International Conference on Communications(ICC),2015.UK:IEEE,2015:5529-5534.DOI:10.1109/ICC.2015.7249203
[9]LABIDI W,SARKISS M,KAMOUN M.EnergyOptimal Resource Scheduling and Computation Offloading in Small Cell Networks[C]//2015 22nd International Conference on?Telecommunications(ICT).Australia:IEEE,2015:313-318.DOI:10.1109/ICT.2015.7124703
[10]ZHANG H L,GUO J,YANG L C,et al.Computation Offloading Considering Fronthaul and Backhaul in Small-Cell Networks Integrated with MEC[C]//2017 IEEEConference on Computer Communications Workshops(INFOCOM WKSHPS),2017.USA:IEEE,2017:115-120.DOI:10.1109/INFCOMW.2017.8116362
[11]QIN X,XU T G,WANG C.DDoS Attack Detection Using Flow Entropy and Clustering Technique[C]//2015 11th International Conference on Computational Intelligence and Security(CIS).China:IEEE,2015:412-415.DOI:10.1109/CIS.2015.105
[12]SHARMA V,YOU I,KUMAR R,et al.Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing[J].IEEEAccess,2017,5:5084-5103.DOI:10.1109/access.2017.2683159
[13]HAN K H,KIM J H.Quantum-Inspired Evolutionary Algorithm for a Class of Combinatorial Optimization[J].IEEETransactions on Evolutionary Computation,2002,6(6):580-593.DOI:10.1109/tevc.2002.804320
[14]LABIDI W,SARKISS M,KAMOUN M.Energy-Optimal Resource Scheduling and Computation Offloading in Small Cell Networks[C]//2015 22nd International Conference on Telecommunications(ICT).Australia:IEEE,2015:313-318.DOI:10.1109/ICT.2015.7124703