4.7 Article

Security modeling and efficient computation offloading for service workflow in mobile edge computing

Publisher

ELSEVIER
DOI: 10.1016/j.future.2019.03.011

Keywords

Mobile edge computing; Workflow scheduling; Security modeling; Energy efficient; Genetic algorithm (GA)

Funding

  1. National Science Foundation of China [61572162, 61572251, 61802095]
  2. Zhejiang Provincial National Science Foundation of China [Q19F020035]
  3. Zhejiang Provincial Key Science and Technology Project Foundation [.2018C01012]
  4. National Key R&D Program of China [2016YFC0800803]

Ask authors/readers for more resources

It is a big challenge for resource-limited mobile devices (MDs) to execute various complex and energy-consumed mobile applications. Fortunately, as a novel computing paradigm, edge computing (MEC) can provide abundant computing resources to execute all or parts of the tasks of MDs and thereby can greatly reduce the energy of MD and improve the QoS of applications. However, offloading workflow tasks to the MEC servers are liable to external security threats (e.g., snooping, alteration). In this paper, we propose a security and energy efficient computation offloading (SEECO) strategy for service workflows in MEC environment, the goal of which is to optimize the energy consumption under the risk probability and deadline constraints. First, we build a security overhead model to measure the execution time of security services. Then, we formulate the computation offloading problem by incorporating the security, energy consumption and execution time of workflow application. Finally, based on the genetic algorithm (GA), the corresponding coding strategies of SEECO are devised by considering tasks execution order and location and security services selection. Extensive experiments with the variety of workflow parameters demonstrate that SEECO strategy can achieve the security and energy efficiency for the mobile applications. (C) 2019 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available