Skip to main content

Advertisement

Log in

Data Security Aware and Effective Task Offloading Strategy in Mobile Edge Computing

  • Research
  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

With the research and development of 5G technology, emerging markets such as Wise Information Technology of med, smart transportation and industrial Internet are gradually growing, which not only provide convenience to people’s life, but also put forward increasingly urgent demand for efficient parallel and distributed technologies. Therefore, in order to meet the need of high computing amount for application diversification, this paper proposes a novel scheduling solution with data security, aiming at simultaneously optimizing the system response time and the user’s energy consumption. First, we model the scheduling problem in a mobile edge computing (MEC) environment as a Markov decision process (MDP) problem, and a three-tier collaboration model considering data security in the MEC environment is constructed. Second, the system response time and the energy consumption are simultaneously optimized in this paper, with objective weights which change in real-time. At the same time, load balancing at the edge layer is considered. Third, a deep reinforcement learning (DRL)-based secure offloading (DRLSO) algorithm is given as the solution for the research problem. In experiments from multiple angles, the proposed algorithm has good performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Anoop, S., Singh, J.: Multi-user energy efficient secured framework with dynamic resource allocation policy for mobile edge network computing. J. Ambient Int. Humanized Comput. 12(7), 7317–7332 (2021)

    Article  Google Scholar 

  2. Chai, X.: Task scheduling based on swarm intelligence algorithms in high performance computing environment. J. Ambient Int. Humanized Comput. 1–9 (2020)

  3. Chowdhary, S.K., Rao, A.L.N.: Qos enhancement in cloud-iot framework for educational institution with task allocation and scheduling with task-vm matching approach. Wirel. Personal Commun. 121(1), 267–286 (2021)

    Article  Google Scholar 

  4. Geng, X., Mao, Y., Xiong, M., Liu, Y.: An improved task scheduling algorithm for scientific workflow in cloud computing environment. Cluster Comput. 22(3), 7539–7548 (2019)

    Article  Google Scholar 

  5. Guo, K., Quek, T.Q.S.: On the asynchrony of computation offloading in multi-user mec systems. IEEE Trans. Commun. 68(12), 7746–7761 (2020)

    Article  Google Scholar 

  6. Guo, X.: Multi-objective task scheduling optimization in cloud computing based on fuzzy self-defense algorithm. Alexandria Eng. J. 60(6), 5603–5609 (2021)

    Article  Google Scholar 

  7. Hagras, T., Atef, A., Mahdy, Y.B.: Greening duplication-based dependent-tasks scheduling on heterogeneous large-scale computing platforms. J. Grid Comput. 19(1), 13 (2021)

    Article  Google Scholar 

  8. Haines, R., Scamell, R.W., Shah, J.R.: The impact of technology availability and structural guidance on group development in workgroups using computer-mediated communication. Inf. Syst. Manag. 35(4), 348–368 (2018)

    Article  Google Scholar 

  9. Han, M., Zhang, T., Lin, Y., Deng, Q.: Federated scheduling for typed dag tasks scheduling analysis on heterogeneous multi-cores. J. Syst. Architecture 112, 101870 (2021)

    Article  Google Scholar 

  10. Islam, N., Azim, A.: A situation-aware task model for adaptive real-time systems. J. Ambient Int. Humanized Comput. 11(10), 4249–4259 (2020)

    Article  Google Scholar 

  11. Kanemitsu, H,. Kanai, K., Katto, J., Nakazato, H.: A containerized task clustering for scheduling workflows to utilize processors and containers on clouds. J. Supercomput. pp 1–45 (2021)

  12. Ke, Y., Xia, X.: Timed automaton-based quantitative feasibility analysis of symmetric cipher in embedded rtos: A case study of aes. Sec. Commun. Netw. 2022 (2022)

  13. Li, M., Liu, C., Li, K., Liao, X., Li, K.: Multi-task allocation with an optimized quantum particle swarm method. Appl. Soft Comput. 96, 106603 (2020)

    Article  Google Scholar 

  14. Li, M., Wang, Z., Li, K., Liao, X., Hone, K., Liu, X.: Task allocation on layered multiagent systems: When evolutionary many-objective optimization meets deep q-learning. IEEE Trans. Evol. Comput. 25(5), 842–855 (2021)

    Article  Google Scholar 

  15. Liu,S., Ma, X., Jia, Y., Liu, Y.: An energy-saving task scheduling model via greedy strategy under cloud environment. Wirel. Commun. Mob. Comput. pp 1–13, (2022)

  16. Mao, Y., Zhang, J., Song, S.H., Letaief, K.B.: Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems. IEEE Trans. Wirel. Commun. 16(9), 5994–6009 (2017)

    Article  Google Scholar 

  17. Naik, B.B., Singh, D., Samaddar, A.B.: Multi-objective virtual machine selection in cloud data centers using optimized scheduling. Wirel. Personal Commun. 116(3), 2501–2524 (2021)

    Article  Google Scholar 

  18. Nawrocki, P., Pajor, J., Sniezynski, B., Kolodziej, J.: Modeling adaptive security-aware task allocation in mobile cloud computing. Simul. Model. Pract. Theory. 116, 102491 (2022)

    Article  Google Scholar 

  19. Niu, M., Cheng, B., Feng, Y., Chen, J.: Gmta: a geo-aware multi-agent task allocation approach for scientific workflows in container-based cloud. IEEE Trans. Netw. Serv. Manag. 17(3), 1568–1581 (2020)

    Article  Google Scholar 

  20. Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: the case of aes. In Cryptographers’ track at the RSA conference, pp 1–20 Springer, (2006)

  21. Qiao, X., Ren, P., Dustdar, S., Liu, L., Ma, H., Chen, J.: Web ar: A promising future for mobile augmented reality-state of the art, challenges, and insights. Proceed. IEEE 107(4), 651–666 (2019)

    Article  Google Scholar 

  22. Rekha, P.M., Dakshayini, M.: Efficient task allocation approach using genetic algorithm for cloud environment. Cluster Comput. 22(4), 1241–1251 (2019)

    Article  Google Scholar 

  23. Shao, S., Zhang, Q., Guo, S., Qi, F.: Task allocation mechanism for cable real-time online monitoring business based on edge computing. IEEE Syst. J. 15(1), 1344–1355 (2020)

    Article  Google Scholar 

  24. Sklavos, N., Kaaniche, N.: On the design of secure primitives for real world applications. Microprocess. Microsyst. 80, 103614 (2021)

    Article  Google Scholar 

  25. Sujaudeen, N., Mirnalinee, T.T.: Tarnn: Task-aware autonomic resource management using neural networks in cloud environment. Concurr. Comput. Pract. Exp. 34(8), e5463 (2022)

    Article  Google Scholar 

  26. Tabuada, P.: Event-triggered real-time scheduling of stabilizing control tasks. IEEE Trans. Autom. Control 52(9), 1680–1685 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  27. Tang, Z., Zeng, A., Zhang, X., Yang, L., Li, K.: Dynamic memory-aware scheduling in spark computing environment. J. Parallel Distrib. Comput. 141, 10–22 (2020)

    Article  Google Scholar 

  28. Tong, Z., Chen, H., Deng, X., Li, K., Li, K.: A scheduling scheme in the cloud computing environment using deep q-learning. Inf. Sci. 512, 1170–1191 (2020)

    Article  Google Scholar 

  29. Tong, Z., Deng, X., Chen, H., Mei, J.: Ddmts: A novel dynamic load balancing scheduling scheme under sla constraints in cloud computing. J. Parallel Distrib. Comput. 149, 138–148 (2021)

    Article  Google Scholar 

  30. Wang, K., Fang, F., Da Costa, D.B., Ding, Z.: Sub-channel scheduling, task assignment, and power allocation for oma-based and noma-based mec systems. IEEE Trans. Commun. 69(4), 2692–2708 (2020)

    Article  Google Scholar 

  31. Wang, Z., Wang, G., Jin, X., Wang, X., Wang, J.: Caching-based task scheduling for edge computing in intelligent manufacturing. J. Supercomput. 1–23 (2022)

  32. Xu, J., Zhang, Z., Hu, Z., Du, L., Cai, X.: A many-objective optimized task allocation scheduling model in cloud computing. Appl. Int. 51(6), 3293–3310 (2021)

    Article  Google Scholar 

  33. Xue, T., Chen, B., Wu, J., Wei, D., Freeman, W.T.: Video enhancement with task-oriented flow. Int. J. Comput. Vision 127(8), 1106–1125 (2019)

    Article  Google Scholar 

  34. Yao, W., Qi, N., Liu, Y., Xu, S., Du, D.: Homotopic approach for robot allocation optimization coupled with path constraints. IEEE Robot. Autom. Lett. 5(1), 88–95 (2020)

    Article  Google Scholar 

  35. Yuan, H., Tang, G., Li, X., Guo, D., Luo, L., Luo, X.: Online dispatching and fair scheduling of edge computing tasks: A learning-based approach. IEEE Intern. Things J. 8(19), 14985–14998 (2021)

  36. Zhang, J., Zhou, X., Ge, T., Wang, X., Hwang, T.: Joint task scheduling and containerizing for efficient edge computing. IEEE Trans. Parallel Distrib. Syst. 32(8), 2086–2100 (2021)

  37. Zhang, W.-Z., Elgendy, I.A., Hammad, M., Iliyasu, A.M., Du, X., Guizani, M., Abd El-Latif, A.A.: Secure and optimized load balancing for multitier iot and edge-cloud computing systems. IEEE Int. Things J. 8(10), 8119–8132 (2021)

    Article  Google Scholar 

  38. Zhu, M., Wang, A.I.: Model-driven game development: A literature review. ACM Comput. Surv. (CSUR) 52(6), 1–32 (2019)

    Google Scholar 

Download references

Acknowledgements

The authors thank the editor and reviewers for their insightful comments and valuable suggestions

Funding

This work was supported by the Program of National Natural Science Foundation of China (grant No. 62072174, 61502165), Outstanding Youth of Hunan Province (grant No. 2023JJ10030), National Natural Science Foundation of Hunan Province, China (grant No. 2022JJ40278, 2020JJ5370), Scientific Research Fund of Hunan Provincial Education Department, China (Grant No. 22A0026)

Author information

Authors and Affiliations

Authors

Contributions

Zhao Tong contributed to the conception of the study and wrote fifty percentage of the manuscript. Bilan Liu wrote fifty percentage of the manuscript, performed modeling design and construction, and also conducted part of the experiment. Jing Mei contributed significantly to the conception, analysis and algorithms design of the study. Jiake Wang performed the data analyses and English grammar checking. Xin Peng helped perform the analysis with constructive discussions. Keqin Li helped improve the English grammar and checked spelling

Corresponding author

Correspondence to Zhao Tong.

Ethics declarations

Competing Interests

The authors declare that they have no competing interests

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tong, Z., Liu, B., Mei, J. et al. Data Security Aware and Effective Task Offloading Strategy in Mobile Edge Computing. J Grid Computing 21, 41 (2023). https://doi.org/10.1007/s10723-023-09673-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10723-023-09673-y

Keywords

Navigation