Security modeling and efficient computation offloading for service workflow in mobile edge computing

Binbin Huang, Zhongjin Li*, Peng Tang, Shangguang Wang, Jun Zhao, Haiyang Hu, Wanqing Li, Victor Chang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

80 Citations (Scopus)

Abstract

It is a big challenge for resource-limited mobile devices (MDs) to execute various complex and energy-consumed mobile applications. Fortunately, as a novel computing paradigm, edge computing (MEC) can provide abundant computing resources to execute all or parts of the tasks of MDs and thereby can greatly reduce the energy of MD and improve the QoS of applications. However, offloading workflow tasks to the MEC servers are liable to external security threats (e.g., snooping, alteration). In this paper, we propose a security and energy efficient computation offloading (SEECO) strategy for service workflows in MEC environment, the goal of which is to optimize the energy consumption under the risk probability and deadline constraints. First, we build a security overhead model to measure the execution time of security services. Then, we formulate the computation offloading problem by incorporating the security, energy consumption and execution time of workflow application. Finally, based on the genetic algorithm (GA), the corresponding coding strategies of SEECO are devised by considering tasks execution order and location and security services selection. Extensive experiments with the variety of workflow parameters demonstrate that SEECO strategy can achieve the security and energy efficiency for the mobile applications.

Original languageEnglish
Pages (from-to)755-774
Number of pages20
JournalFuture Generation Computer Systems
Volume97
DOIs
Publication statusPublished - Aug 2019

Keywords

  • Energy efficient
  • Genetic algorithm (GA)
  • Mobile edge computing
  • Security modeling
  • Workflow scheduling

Fingerprint

Dive into the research topics of 'Security modeling and efficient computation offloading for service workflow in mobile edge computing'. Together they form a unique fingerprint.

Cite this