Abstract
Mobile edge computing (MEC) is a promising computing model and has gained remarkable popularity, as it deploys the resources (e.g., computation, network, and storage) to the evolved NodeB (eNB) to provide enormous benefits such as low delay and energy consumption. More and more enterprises construct their edge computing platforms to store multimedia contents (i.e., video, audio, photos, and text data) for the user equipment (UE). However, both the eNB and UEs will experience serious security attacks when transmitting or receiving multimedia data via the wireless network. Existing MEC studies mainly focus on task offloading and performance improvement without considering the enterprise multimedia security problem. This paper proposes a security and performance-aware resource allocation (Spara) algorithm for enterprise multimedia in MEC environment. More specifically, we first build the architecture of enterprise multimedia security for sending the data requests to UEs, which mainly consists of computing and bandwidth resource allocation. Then, we formulate the stochastic data transmission problem to minimize the delay and energy consumption of UEs subject to the security guarantee. To achieve this goal, two queues, namely front-end queue and back-end queue, are used for each UE, and the Lyapunov optimization technique is applied to determine how to allocate the computing and bandwidth resources. Rigorous theoretical analysis shows that Spara algorithm meets the [O(1/V), O(V)] energy-delay tradeoff. Extensive simulation experiments validate this analysis result and the effectiveness of Spara algorithm.
Similar content being viewed by others
References
Abbas N, Zhang Y, Taherkordi A, Skeie T (2018) Mobile edge computing: a survey. IEEE Internet Things J 5(1):450–465
Mao Y, You C, Zhang J, Huang K, Letaief KB (2017) A survey on mobile edge computing: the communication perspective. IEEE Commun Surveys Tuts 19(4):2322–2358
Hu H, Zhang H, Yang Y (2018) Security risk situation quantification method based on threat prediction for multimedia communication network. Multimed Tools Appl 77(16):21693–21723
Liu Y, Li C, Luo Y, Shao Y, Zhang J (2018) Scheduling multimedia services in cloud computing environment. Enterprise IS 12(2):218–235
Duncan B, Whittington M, Chang V (2017) Enterprise security and privacy: why adding IoT and big data makes it so much more difficult. In: International conference on engineering and technology (ICET), IEEE, pp 1-7
Roman R, López J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698
Shirazi SN, Gouglidis A, Farshad A, Hutchison D (2017) The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J Sel Areas Commun 35(11):2586–2595
Hsu RH, Lee J (2015) Group anonymous D2D communication with end-to-end security in LTE-A. In: IEEE conference on communications and network security (CNS), IEEE, pp 451-459
Gupta BB, Yamaguchi S, Agrawal DP (2018) Advances in security and privacy of multimedia big data in mobile and cloud computing. Multimed Tools Appl 77:9203–9208
Sun G, Liao D, Li H, Yu H, Chang V (2017) L2P2: a location-label based approach for privacy preserving in LBS. Futur Gener Comput Syst 74:375–384
Haus M, Waqas M, Ding AY, Li Y, Tarkoma S, Ott J (2017) Security and privacy in device-to-device (D2D) communication: a review. IEEE Commun Surveys Tuts 19(2):1054–1079
Zeng LF, Veeravalli B, Li XR (2015) SABA: a security-aware and budget-aware workflow scheduling strategy in clouds. J Parallel Distrib Comput 75:141–151
Li Z, Ge J, Yang H, Huang L, Hu HY, Hu H, Luo B (2016) A security and cost aware scheduling algorithm for heterogeneous tasks of scientific workflow in clouds. Futur Gener Comput Syst 65:140–152
Salodkar N, Karandikar N, Borkar VS (2010) A stable online algorithm for energy-efficient multiuser scheduling. IEEE Trans Mob Comput 9(10):1391–1406
Lin X, Wang Y, Xie Q, Pedram M (2015) Task scheduling with dynamic voltage and frequency scaling for energy minimization in the mobile cloud computing environment. IEEE Trans Serv Comput 8(2):175–186
Sun Y, Zhou S, Xu J (2017) EMM: energy-aware mobility management for mobile edge computing in ultra dense networks. IEEE J Sel Areas Commun 35(11):2637–2646
Sun G, Chang V, Ramachandran M, Sun Z, Li G, Yu H, Liao D (2017) Efficient location privacy algorithm for internet of things (IoT) services and applications. J Netw Comput Appl 89:3–13
Mao Y, Zhang J, Song SH, Letaief KB (2017) Stochastic joint radio and computational resource management for multi-user mobile-edge computing systems. IEEE Trans Wirel Commun 16(9):5994–6009
Tran TX, Pompili D (2019) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. IEEE Trans Veh Technol 68(1):856–868
Liu CF, Bennis M, Vincent Poor H (2017) Latency and reliability-aware task offloading and resource allocation for mobile edge computing. In: IEEE global communications conference (GLOBECOM workshops), IEEE, pp 1-7
Hu H, Cheng K, Li Z, Chen J, Hu H (2019) Workflow recognition with structured two-stream convolutional networks. Pattern Recogn Lett. https://doi.org/10.1016/j.patrec.2018.10.011
Yu CH, Doppler K, Ribeiro CB, Tirkkonen O (2011) Resource sharing optimization for device-to-device communication underlaying cellular networks. IEEE Trans Wirel Commun 10(8):2752–2763
Lee C (2017) A collaborative power control and resources allocation for D2D (device-to-device) communication underlaying LTE cellular networks. Clust Comput 20(1):559–567
Xu J, Guo C, Zhang H (2018) Joint channel allocation and power control based on PSO for cellular networks with D2D communications. Comput Netw 133:104–119
Abdallah A, Mansour MM, Chehab A (2018) Power control and channel allocation for D2D underlaid cellular networks. IEEE Trans Commun 66(7):3217–3234
Beraldi R, Mtibaa A, Alnuweiri HM (2017) Cooperative load balancing scheme for edge computing resources. In: International conference on fog and Mobile edge computing (FMEC), IEEE, pp 94-100
Zhao T, Zhou S, Guo S, Niu Z (2017) Tasks scheduling and resource allocation in heterogeneous cloud for delay-bounded mobile edge computing. In: IEEE international conference on communications (ICC), IEEE pp 1-7
Wang CM, Yu FR, Chen Q, Tang L (2017) Joint computation and radio resource management for cellular networks with mobile edge computing. In: IEEE International conference on communications (ICC), IEEE, pp 1-6
Li J, Wen M, Zhang T (2016) Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks. IEEE Internet Things J 3(3):408–417
Zhang A, Chen J, Hu RQ, Qian Y (2016) SeDS: secure data sharing strategy for D2D communication in LTE-advanced networks. IEEE Trans Veh Technol 65(4):2659–2672
Hong H, Sun Z (2018) Achieving secure data access control and efficient key updating in mobile multimedia sensor networks. Multimed Tools Appl 77:4477–4490
Santhi S, Sheba Kezia Malarchelvi PD (2018) Self-similar key generation for secure communication in multimedia applications. Multimed Tools Appl 77:10329–10346
Hussain M, Du Q, Sun L, Ren P (2016) Security enhancement for video transmission via noise aggregation in immersive systems. Multimed Tools Appl 75:5345–5357
Xie T, Qin X (2006) Scheduling security-critical real-time applications on clusters. IEEE Trans Comput 55(7):864–879
Song S, Hwang K, Kwok YK (2006) Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Trans Comput 55(6):703–719
Tang X, Li K, Zeng Z, Veeravalli B (2011) A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems. IEEE Trans Comput 60(7):1017–1029
Li Z, Ge J, Li C, Yang H, Hu H, Luo B, Chang V (2017) Energy cost minimization with job security guarantee in internet data center. Futur Gener Comput Syst 73:63–78
Chen H, Zhu X, Qiu D, Liu L, Du Z (2017) Scheduling for workflows with security-sensitive intermediate data by selective tasks duplication in clouds. IEEE Trans Parallel Distrib Syst 28(9):2674–2688
Jiang W, Jiang K, Zhang X, Ma Y (2015) Energy optimization of security-critical real-time applications with guaranteed security protection. J Syst Archit 61:282–292
Huang B, Li Z, Tang P, Wang S, Zhao J, Hu H, Li W, Chang V (2019) Security modeling and efficient computation offloading for service workflow in mobile edge computing. Futur Gener Comput Syst 97:755–774
Song W, Jacobsen HA (2018) Static and dynamic process change. IEEE Trans Serv Comput 11(1):215–231
Song W, Chen F, Jacobsen HA, Xia X, Ye C, Ma X (2017) Scientific workflow mining in clouds. IEEE Trans Parallel Distrib Syst 28(10):2979–2992
Yao Y, Huang L, Sharma AB, Golubchik L, Neely MJ (2014) Power cost reduction in distributed data centers: a two-time-scale approach for delay tolerant workloads. IEEE Trans Parallel Distrib Syst 25(1):200–211
Xie T, Qin X (2008) Security-aware resource allocation for real-time parallel jobs on homogeneous and heterogeneous clusters. IEEE Trans Parallel Distrib Syst 19(5):682–697
Wang F, Xu J, Wang X, Cui S (2018) Joint offloading and computing optimization in wireless powered mobile-edge computing systems. IEEE Trans Wirel Commun 17(3):1784–1797
Georgiadis L, Neely MJ, Tassiulas L (2006) Resource allocation and cross-layer control in wireless networks. Foundations and Trends in Networking 1(1):1–149
Neely MJ (2010) Stochastic network optimization with application to communication and queueing systems. Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers
Lyu X, Ni W, Tian H, Liu RP, Wang X, Giannakis GB, Paulraj A (2017) Optimal schedule of mobile edge computing for internet of things using partial information. IEEE J Sel Areas Commun 35(11):2606–2615
Jiang W, Feng G, Qin S, Yum TSP (2018) Efficient D2D content caching using multi-agent reinforcement learning. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS), IEEE, pp 511-516
Zhang W, Wen Y, Wu DO (2015) Collaborative task execution in mobile cloud computing under a stochastic wireless channel. IEEE Trans Wirel Commun 14(1):81–93
Acknowledgments
This work was supported by the National Natural Science Foundation of China (No. 61802095, 61802167, 61572162, 61702144), the Zhejiang Provincial Key Science and Technology Project Foundation (No. 2018C01012), the Zhejiang Provincial National Science Foundation of China (No. LQ19F020011, LQ17F020003), the Open Foundation of State Key Laboratory of Networking and Switching Technology (Beijing University of Posts and Telecommunications) (No. SKLNST-2019-2-15).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Li, Z., Hu, H., Huang, B. et al. Security and performance-aware resource allocation for enterprise multimedia in mobile edge computing. Multimed Tools Appl 79, 10751–10780 (2020). https://doi.org/10.1007/s11042-019-08557-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08557-2