Skip to main content

Advertisement

Log in

Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Mobile edge computing (MEC) is a promising computing model and has gained remarkable popularity, as it deploys the resources (e.g., computation, network, and storage) to the evolved NodeB (eNB) to provide enormous benefits such as low delay and energy consumption. More and more enterprises construct their edge computing platforms to store multimedia contents (i.e., video, audio, photos, and text data) for the user equipment (UE). However, both the eNB and UEs will experience serious security attacks when transmitting or receiving multimedia data via the wireless network. Existing MEC studies mainly focus on task offloading and performance improvement without considering the enterprise multimedia security problem. This paper proposes a security and performance-aware resource allocation (Spara) algorithm for enterprise multimedia in MEC environment. More specifically, we first build the architecture of enterprise multimedia security for sending the data requests to UEs, which mainly consists of computing and bandwidth resource allocation. Then, we formulate the stochastic data transmission problem to minimize the delay and energy consumption of UEs subject to the security guarantee. To achieve this goal, two queues, namely front-end queue and back-end queue, are used for each UE, and the Lyapunov optimization technique is applied to determine how to allocate the computing and bandwidth resources. Rigorous theoretical analysis shows that Spara algorithm meets the [O(1/V), O(V)] energy-delay tradeoff. Extensive simulation experiments validate this analysis result and the effectiveness of Spara algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Abbas N, Zhang Y, Taherkordi A, Skeie T (2018) Mobile edge computing: a survey. IEEE Internet Things J 5(1):450–465

    Article  Google Scholar 

  2. Mao Y, You C, Zhang J, Huang K, Letaief KB (2017) A survey on mobile edge computing: the communication perspective. IEEE Commun Surveys Tuts 19(4):2322–2358

    Article  Google Scholar 

  3. Hu H, Zhang H, Yang Y (2018) Security risk situation quantification method based on threat prediction for multimedia communication network. Multimed Tools Appl 77(16):21693–21723

    Article  Google Scholar 

  4. Liu Y, Li C, Luo Y, Shao Y, Zhang J (2018) Scheduling multimedia services in cloud computing environment. Enterprise IS 12(2):218–235

    Article  Google Scholar 

  5. Duncan B, Whittington M, Chang V (2017) Enterprise security and privacy: why adding IoT and big data makes it so much more difficult. In: International conference on engineering and technology (ICET), IEEE, pp 1-7

  6. Roman R, López J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698

    Article  Google Scholar 

  7. Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Sel Areas Commun 35(11):2586–2595

    Article  Google Scholar 

  8. Hsu RH, Lee J (2015) Group anonymous D2D communication with end-to-end security in LTE-A. In: IEEE conference on communications and network security (CNS), IEEE, pp 451-459

  9. Gupta BB, Yamaguchi S, Agrawal DP (2018) Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimed Tools Appl 77:9203–9208

    Article  Google Scholar 

  10. Sun G, Liao D, Li H, Yu H, Chang V (2017) L2P2: a location-label based approach for privacy preserving in LBS. Futur Gener Comput Syst 74:375–384

    Article  Google Scholar 

  11. Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J (2017) Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun Surveys Tuts 19(2):1054–1079

    Article  Google Scholar 

  12. Zeng LF, Veeravalli B, Li XR (2015) SABA: a security-aware and budget-aware workflow scheduling strategy in clouds. J Parallel Distrib Comput 75:141–151

    Article  Google Scholar 

  13. Li Z, Ge J, Yang H, Huang L, Hu HY, Hu H, Luo B (2016) A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Futur Gener Comput Syst 65:140–152

    Article  Google Scholar 

  14. Salodkar N, Karandikar N, Borkar VS (2010) A stable online algorithm for energy-efficient multiuser scheduling. IEEE Trans Mob Comput 9(10):1391–1406

    Article  Google Scholar 

  15. Lin X, Wang Y, Xie Q, Pedram M (2015) Task scheduling with dynamic voltage and frequency scaling for energy minimization in the mobile cloud computing environment. IEEE Trans Serv Comput 8(2):175–186

    Article  Google Scholar 

  16. Sun Y, Zhou S, Xu J (2017) EMM: energy-aware mobility management for mobile edge computing in ultra dense networks. IEEE J Sel Areas Commun 35(11):2637–2646

    Article  Google Scholar 

  17. Sun G, Chang V, Ramachandran M, Sun Z, Li G, Yu H, Liao D (2017) Efficient location privacy algorithm for internet of things (IoT) services and applications. J Netw Comput Appl 89:3–13

    Article  Google Scholar 

  18. Mao Y, Zhang J, Song SH, Letaief KB (2017) Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems. IEEE Trans Wirel Commun 16(9):5994–6009

    Article  Google Scholar 

  19. Tran TX, Pompili D (2019) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. IEEE Trans Veh Technol 68(1):856–868

    Article  Google Scholar 

  20. Liu CF, Bennis M, Vincent Poor H (2017) Latency and reliability-aware task offloading and resource allocation for mobile edge computing. In: IEEE global communications conference (GLOBECOM workshops), IEEE, pp 1-7

  21. Hu H, Cheng K, Li Z, Chen J, Hu H (2019) Workflow recognition with structured two-stream convolutional networks. Pattern Recogn Lett. https://doi.org/10.1016/j.patrec.2018.10.011

  22. Yu CH, Doppler K, Ribeiro CB, Tirkkonen O (2011) Resource sharing optimization for device-to-device communication underlaying cellular networks. IEEE Trans Wirel Commun 10(8):2752–2763

    Article  Google Scholar 

  23. Lee C (2017) A collaborative power control and resources allocation for D2D (device-to-device) communication underlaying LTE cellular networks. Clust Comput 20(1):559–567

    Article  Google Scholar 

  24. Xu J, Guo C, Zhang H (2018) Joint channel allocation and power control based on PSO for cellular networks with D2D communications. Comput Netw 133:104–119

    Article  Google Scholar 

  25. Abdallah A, Mansour MM, Chehab A (2018) Power control and channel allocation for D2D underlaid cellular networks. IEEE Trans Commun 66(7):3217–3234

    Article  Google Scholar 

  26. Beraldi R, Mtibaa A, Alnuweiri HM (2017) Cooperative load balancing scheme for edge computing resources. In: International conference on fog and Mobile edge computing (FMEC), IEEE, pp 94-100

  27. Zhao T, Zhou S, Guo S, Niu Z (2017) Tasks scheduling and resource allocation in heterogeneous cloud for delay-bounded mobile edge computing. In: IEEE international conference on communications (ICC), IEEE pp 1-7

  28. Wang CM, Yu FR, Chen Q, Tang L (2017) Joint computation and radio resource management for cellular networks with mobile edge computing. In: IEEE International conference on communications (ICC), IEEE, pp 1-6

  29. Li J, Wen M, Zhang T (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408–417

    Article  Google Scholar 

  30. Zhang A, Chen J, Hu RQ, Qian Y (2016) SeDS: secure data sharing strategy for D2D communication in LTE-advanced networks. IEEE Trans Veh Technol 65(4):2659–2672

    Article  Google Scholar 

  31. Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimed Tools Appl 77:4477–4490

    Article  Google Scholar 

  32. Santhi S, Sheba Kezia Malarchelvi PD (2018) Self-similar key generation for secure communication in multimedia applications. Multimed Tools Appl 77:10329–10346

    Article  Google Scholar 

  33. Hussain M, Du Q, Sun L, Ren P (2016) Security enhancement for video transmission via noise aggregation in immersive systems. Multimed Tools Appl 75:5345–5357

    Article  Google Scholar 

  34. Xie T, Qin X (2006) Scheduling security-critical real-time applications on clusters. IEEE Trans Comput 55(7):864–879

    Article  Google Scholar 

  35. Song S, Hwang K, Kwok YK (2006) Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans Comput 55(6):703–719

    Article  Google Scholar 

  36. Tang X, Li K, Zeng Z, Veeravalli B (2011) A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems. IEEE Trans Comput 60(7):1017–1029

    Article  MathSciNet  Google Scholar 

  37. Li Z, Ge J, Li C, Yang H, Hu H, Luo B, Chang V (2017) Energy cost minimization with job security guarantee in internet data center. Futur Gener Comput Syst 73:63–78

    Article  Google Scholar 

  38. Chen H, Zhu X, Qiu D, Liu L, Du Z (2017) Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds. IEEE Trans Parallel Distrib Syst 28(9):2674–2688

    Article  Google Scholar 

  39. Jiang W, Jiang K, Zhang X, Ma Y (2015) Energy optimization of security-critical real-time applications with guaranteed security protection. J Syst Archit 61:282–292

    Article  Google Scholar 

  40. Huang B, Li Z, Tang P, Wang S, Zhao J, Hu H, Li W, Chang V (2019) Security modeling and efficient computation offloading for service workflow in mobile edge computing. Futur Gener Comput Syst 97:755–774

    Article  Google Scholar 

  41. Song W, Jacobsen HA (2018) Static and dynamic process change. IEEE Trans Serv Comput 11(1):215–231

    Article  Google Scholar 

  42. Song W, Chen F, Jacobsen HA, Xia X, Ye C, Ma X (2017) Scientific workflow mining in clouds. IEEE Trans Parallel Distrib Syst 28(10):2979–2992

    Article  Google Scholar 

  43. Yao Y, Huang L, Sharma AB, Golubchik L, Neely MJ (2014) Power cost reduction in distributed data centers: a two-time-scale approach for delay tolerant workloads. IEEE Trans Parallel Distrib Syst 25(1):200–211

    Article  Google Scholar 

  44. Xie T, Qin X (2008) Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans Parallel Distrib Syst 19(5):682–697

    Article  Google Scholar 

  45. Wang F, Xu J, Wang X, Cui S (2018) Joint offloading and computing optimization in wireless powered mobile-edge computing systems. IEEE Trans Wirel Commun 17(3):1784–1797

    Article  Google Scholar 

  46. Georgiadis L, Neely MJ, Tassiulas L (2006) Resource allocation and cross-layer control in wireless networks. Foundations and Trends in Networking 1(1):1–149

  47. Neely MJ (2010) Stochastic network optimization with application to communication and queueing systems. Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers

  48. Lyu X, Ni W, Tian H, Liu RP, Wang X, Giannakis GB, Paulraj A (2017) Optimal schedule of mobile edge computing for internet of things using partial information. IEEE J Sel Areas Commun 35(11):2606–2615

    Article  Google Scholar 

  49. Jiang W, Feng G, Qin S, Yum TSP (2018) Efficient D2D content caching using multi-agent reinforcement learning. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp 511-516

  50. Zhang W, Wen Y, Wu DO (2015) Collaborative task execution in mobile cloud computing under a stochastic wireless channel. IEEE Trans Wirel Commun 14(1):81–93

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (No. 61802095, 61802167, 61572162, 61702144), the Zhejiang Provincial Key Science and Technology Project Foundation (No. 2018C01012), the Zhejiang Provincial National Science Foundation of China (No. LQ19F020011, LQ17F020003), the Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (No. SKLNST-2019-2-15).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haiyang Hu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Z., Hu, H., Huang, B. et al. Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing. Multimed Tools Appl 79, 10751–10780 (2020). https://doi.org/10.1007/s11042-019-08557-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08557-2

Keywords

Navigation