Advertisement

Towards Reliable Computation Offloading in Mobile Ad-Hoc Clouds Using Blockchain

  • Saqib RasoolEmail author
  • Muddesar Iqbal
  • Tasos Dagiuklas
  • Zia ul Qayyum
  • Adnan Noor Mian
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 263)

Abstract

Mobile Ad-hoc Cloud (MAC) refers to the computation offloading of a mobile device among the multiple co-located mobile devices. However, it is difficult to convince the randomly participating mobile devices to offer their resources for performing the computation offloading of other mobile devices. These devices can be convinced for resource sharing by limiting the compute shedding of a device nearly equal to the computation that same device has already performed for other mobile devices. However, this cannot be achieved without establishing the trust among the randomly co-located mobile devices.

Blockchain has been already proven for the trust-establishment between multiple independent stakeholders. However, to the best of our knowledge, no one has used blockchain for reliable computation offloading among the independently operating co-located mobile devices of MAC. In this position paper, we proposed the mapping of blockchain concepts for the realization of reliable computation offloading in MAC. We have also identified the future research directions that can be focused for improving the proposed integration of blockchain and MAC.

Keywords

Mobile Ad-hoc Cloud Mobile Cloud Computing Mobile edge computing Multi-access Edge Computing Blockchain 

Notes

Acknowledgment

The present work was undertaken in the context of the “Self-OrganizatioN towards reduced cost and eNergy per bit for future Emerging radio Technologies” with contract number 734545. The project has received research funding from the H2020-MSCA-RISE-2016 European Framework Program.

References

  1. 1.
    Afonso, J.: Edge computing: learn to delegate—octo talks! January 2018. https://blog.octo.com/en/edge-computing-learn-to-delegate/). Accessed 8 Apr 2018
  2. 2.
    Cohen, B.: Incentives build robustness in bittorrent. In: Workshop on Economics of Peer-to-Peer systems, vol. 6, pp. 68–72 (2003)Google Scholar
  3. 3.
    Dasu, T., Kanza, Y., Srivastava, D.: Unchain your blockchain. In: Proceedings of Symposium on Foundations and Applications of Blockchain, vol. 1, pp. 16–23 (2018)Google Scholar
  4. 4.
    Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: Blockchain: a distributed solution to automotive security and privacy. IEEE Commun. Mag. 55(12), 119–125 (2017)CrossRefGoogle Scholar
  5. 5.
    Fernando, N., Loke, S.W., Rahayu, W.: Mobile cloud computing: a survey. Future Gener. Comput. Syst. 29(1), 84–106 (2013)CrossRefGoogle Scholar
  6. 6.
    Gai, F., Wang, B., Deng, W., Peng, W.: Proof of reputation: a reputation-based consensus protocol for peer-to-peer network. In: Pei, J., Manolopoulos, Y., Sadiq, S., Li, J. (eds.) DASFAA 2018, Part II. LNCS, vol. 10828, pp. 666–681. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-91458-9_41CrossRefGoogle Scholar
  7. 7.
    Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. ACM (2016)Google Scholar
  8. 8.
    Gipp, B., Meuschke, N., Gernandt, A.: Decentralized trusted timestamping using the crypto currency bitcoin (2015). arXiv preprint: arXiv:1502.04015
  9. 9.
    Kang, X., Wu, Y.: Incentive mechanism design for heterogeneous peer-to-peer networks: a stackelberg game approach. IEEE Trans. Mob. Comput. 14(5), 1018–1030 (2015)CrossRefGoogle Scholar
  10. 10.
    Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017, Part I. LNCS, vol. 10401, pp. 357–388. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-63688-7_12CrossRefGoogle Scholar
  11. 11.
    Miller, H.G., Mork, P.: From data to decisions: a value chain for big data. IT Prof. 15(1), 57–59 (2013)CrossRefGoogle Scholar
  12. 12.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)Google Scholar
  13. 13.
    Neisse, R., Steri, G., Nai-Fovino, I.: A blockchain-based approach for data accountability and provenance tracking. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, p. 14. ACM (2017)Google Scholar
  14. 14.
    Pilkington, M.: 11 blockchain technology: principles and applications. In: Research Handbook on Digital Transformations, p. 225 (2016)Google Scholar
  15. 15.
    Porambage, P., Okwuibe, J., Liyanage, M., Ylianttila, M., Taleb, T.: Survey on multi-access edge computing for internet of things realization (2018). arXiv preprint: arXiv:1805.06695
  16. 16.
    Sankar, L.S., Sindhu, M., Sethumadhavan, M.: Survey of consensus protocols on blockchain applications. In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1–5. IEEE (2017)Google Scholar
  17. 17.
    Snow, P., Deery, B., Lu, J., Johnston, D., Kirby, P.: Factom business processes secured by immutable audit trails on the blockchain. Whitepaper, Factom, November 2014Google Scholar
  18. 18.
    Underwood, S.: Blockchain beyond bitcoin. Commun. ACM 59(11), 15–17 (2016)CrossRefGoogle Scholar
  19. 19.
    Yannuzzi, M., Milito, R., Serral-Gracià, R., Montero, D., Nemirovsky, M.: Key ingredients in an IoT recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 325–329. IEEE (2014)Google Scholar
  20. 20.
    Yaqoob, I., Ahmed, E., Gani, A., Mokhtar, S., Imran, M., Guizani, S.: Mobile ad hoc cloud: a survey. Wirel. Commun. Mob. Comput. 16(16), 2572–2589 (2016)CrossRefGoogle Scholar
  21. 21.
    Yousefpour, A., Ishigaki, G., Gour, R., Jue, J.P.: On reducing IoT service delay via fog offloading. IEEE Internet of Things J. (2018)Google Scholar
  22. 22.
    Zhang, Y., van der Schaar, M.: Reputation-based incentive protocols in crowdsourcing applications. In: 2012 Proceedings IEEE INFOCOM, pp. 2140–2148. IEEE (2012)Google Scholar
  23. 23.
    Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 2017 IEEE International Congress on Big Data (BigData Congress), pp. 557–564. IEEE (2017)Google Scholar
  24. 24.
    Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, INFOCOM 2003. IEEE Societies, vol. 3, pp. 1987–1997. IEEE (2003)Google Scholar
  25. 25.
    Zhu, Y., Qin, Y., Gan, G., Shuai, Y., Chu, W.C.C.: TBAC: transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 535–544. IEEE (2018)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Saqib Rasool
    • 1
    • 2
    Email author
  • Muddesar Iqbal
    • 1
    • 3
  • Tasos Dagiuklas
    • 3
  • Zia ul Qayyum
    • 1
  • Adnan Noor Mian
    • 2
  1. 1.University of GujratGujratPakistan
  2. 2.Information Technology UniversityLahorePakistan
  3. 3.London South Bank UniversityLondonUK

Personalised recommendations